Loading...

Table of Content

    15 August 2014, Volume 0 Issue 8
    Frequency-adaptive Technology Implementing in Internet of Things System
    LOU Liang-liang1,2,3, XIONG Yong1,2,4, ZHOU Miao1,2,4, BAO Xing-he1,2,4, GU Yu-zhang1,2,4
    2014, 0(8):  1-4+10.  doi:10.3969/j.issn.1006-2475.2014.08.001
    Asbtract ( 284 )  
    References | Related Articles | Metrics
    The license-free ISM 2.4 GHz band is widely used on a global scale, and the new access of wireless systems in the ISM band is interfered by other wireless systems. Aiming at this disadvantages described above, this paper presents a method based on technology of adaptive frequency hopping(AFH), avoiding using those frequency points interfered to improve the reliability and antijamming capability of communication. At first, this paper introduced two algorithms to support AFH technology:time synchronization algorithm and channel estimation algorithm, then introduced the specific implementation process of CC2500-based IOT devices, and made a specific practice on the CC2500-based devices. And at last, experimental analysis shows that the frequency hopping algorithm is of a certain practicality and advanced.
    An Anomaly Detection Method of Airport-noise Time Series #br# Based on Improved SAX Measurement
    WANG Wei, WANG Jian-dong, ZHANG Xia
    2014, 0(8):  5-10.  doi:10.3969/j.issn.1006-2475.2014.08.002
    Asbtract ( 275 )  
    References | Related Articles | Metrics
    With the expansion of airport transportation scale, the airport noise issue is becoming one of the obstacles for the sustainable development of the aviation industry. Anomalies in the airport noise are of great significance for the timely improvement of the equipments of aircraft and airports. In this paper, according to the characteristics of airport noise, a time series anomaly detection method for single monitoring point is proposed, which is based on the improved symbolic aggregate approximation similarity measurement. This method calculates the measure by applying the improved similarity measure, and finally finds anomalies using the k-nearest neighbor anomaly detection method. The proposed method is applied in practice after the theoretical verification of its feasibility.
    Situation Sharing System Based on Mobile Internet
    CHENG Hui-fang, YUAN Shi-jun, ZHANG Peng-fei
    2014, 0(8):  11-15+20.  doi:10.3969/j.issn.1006-2475.2014.08.003
    Asbtract ( 221 )  
    References | Related Articles | Metrics
    In order to promote the management competence of emergency and solve the problems of mass information collecting, updating and sharing, a situation sharing system based on mobile Internet is put forward, so that it can suit the mobile Internet. Isolating the transmitting and sharing, the system shares the information by employing data project and SOA. This paper then puts forward a mode of intelligent distribution and optimizes the way to register and transmit the information. According to the feature of task teams, information can be subscribed and pushed. These meet the mobile communication information obtaining and distribution requirement in effect.
    Robotic Path Planning and Navigation Based on Task Breakdown
    JIANG Mei-yun, GUO Lei, ZHONG Yi-xing
    2014, 0(8):  16-20.  doi:10.3969/j.issn.1006-2475.2014.08.004
    Asbtract ( 213 )  
    References | Related Articles | Metrics
    This paper presents a robotic navigation system based on work breakdown structure, in which Pioneer II-Dx robot gets data from laser and sonar sensors. Through calculating it, the system controls the robot to move along the planning path, in the end, to find and catch the ball. By analyzing why there is some difference in the data from simulator and real environment, it proves that this system can make robot complete its tasks.
    Mining of Topic Communities in Social Networks Based on LDA Model
    OU Wei1, XIE Zan-fu1, XIE Bin-bin1, OU Bin-yi2
    2014, 0(8):  21-25+29.  doi:10.3969/j.issn.1006-2475.2014.08.005
    Asbtract ( 302 )  
    References | Related Articles | Metrics
    Social networks has gained huge popularity in particular microblogs in recent years. The discovery of latent topic communities in social networks carries high value in commercial promotion, public opinion monitoring, etc. In recent years, probabilistic generative topic model (Latent Dirichlet Allocation, LDA) has been widely applied in the field of data mining. Generally, LDA can process text or digital signal data, however, without any modification, it lacks the capability to properly process the relation data between users in a social network. By modifying the original LDA model, this essay proposes a new model, Tri-LDA and applies it to dig the hidden topic communities in a social network. The experiment result shows that the topic communities found by Tri-LDA is basically consistent with the realistic topic communities that hand-labeled by the authors.
    Method of Mark Meyer’s Curvature Based on Improved Voronoi Area
    LI Qian, XU Yong-an, MA Xiao, MIAO Jing-jiao
    2014, 0(8):  26-29.  doi:10.3969/j.issn.1006-2475.2014.08.006
    Asbtract ( 271 )  
    References | Related Articles | Metrics
    Taking on the calculation formula of differential geometric curvature as theoretical foundation, Mark
    Meyer’s estimation methods of discrete point cloud curvature are improved, the thesis puts forward an improved
    Mark Meyer algorithm on the basis of Voronoi area. The calculation of Mark Meyer algorithm on the basis of Voronoi
    area is improved, the existence of an obtuse angle in Voronoi area situation is discussed in detail and the
    formula of the obtuse triangle is improved, at the same time, it gives a more accurate method of calculating the
    area.The algorithm is applied in spherical, cylindrical, parabolic, saddle surface. The calculation results show
    that this algorithm enhances the estimation accuracy and stability of discrete point cloud curvature.
    Method of Abstracting Feature Words of Generalized Spatial Entity Relationship #br# Based on Synthesis Supporting Probability
    JIANG Wei, ZHONG Zhi-nong, WU Ye, CHEN Luo, LI Jie
    2014, 0(8):  30-33+45.  doi:10.3969/j.issn.1006-2475.2014.08.007
    Asbtract ( 207 )  
    References | Related Articles | Metrics
     Feature words of relation between generalized spatial entities can express these relations and semantics
    of them accurately. In order to abstract feature words precisely, firstly, based on location, speech and frequency
    of candidate word around entities, this paper defined synthesis supporting probability, aiming at evaluating the
    likelihood of becoming feature word. Secondly, a mode for abstracting feature words was proposed. Finally,
    experiments were carried on ORG-PER data and LOC-PER data in Sohu news, which achieved a precision about 90%.
    A Group Key Management Scheme Based on Grade-tree Model
    GAO Bao-yang, PAN Jin, KANG Lian-rui
    2014, 0(8):  34-37.  doi:10.3969/j.issn.1006-2475.2014.08.008
    Asbtract ( 241 )  
    References | Related Articles | Metrics
    Secure and highly-efficient group key management is critical in secure group communication. A group key
    management scheme based on grade-tree model was proposed according to the characteristic of military secret
    communications and the need of group key management. The grade-tree model was established firstly according to
    relationship of administrative subordination.Then keys among levels were generated by one-way hash function in
    order to guarantee accessing popedom and a reformative LKH arithmetic was used to manage members in lowest
    subgroups. The performance of scheme is analysed, the result indicates:this scheme is better than other congener
    schemes in communications cost and key storage cost.
    A Top-k Closest Pairs Data Search Scheme  Based on MapReduce
    LIU Shu-ying
    2014, 0(8):  38-45.  doi:10.3969/j.issn.1006-2475.2014.08.009
    Asbtract ( 259 )  
    References | Related Articles | Metrics
    There is a wide range of applications that require finding the top-k most similar pairs of records in a
    given database. However, computing such top-k similarity joins is a challenging problem today, as there is an
    increasing trend of applications that expect to deal with vast amounts of data. This paper proposes a top-k
    closest pairs data search scheme based on MapReduce, firstly, the proposed scheme splits conceptually all pairs of
    points into partitions, and then the all pair partitioning and the essential pair partitioning methods are
    proposed, we can correctly find the top-k closest pairs by computing the top-k closest pairs in each partition
    separately and selecting the top-k closest pairs among the top-k closest pairs from all partitions. We finally
    perform the experiments with not only synthetic but also real-life data sets. The performance study confirms the
    effectiveness and scalability of the proposed MapReduce algorithms.
    A Digital Audio Watermarking Algorithm Based on Chaotic Encrypting in DWT
    CHEN Xue-song1, LI Hao-tian1, JIA Rui-cheng2, SUN Li-na2, BU Guang-long1
    2014, 0(8):  46-49+74.  doi:10.3969/j.issn.1006-2475.2014.08.010
    Asbtract ( 221 )  
    References | Related Articles | Metrics
    An algorithm based on the chaos theory of digital audio watermarking algorithm is proposed. For the
    security of digital audio watermark, the chaos theory in the high dimensional chaos theory is applied to the
    watermark encryption. For the first time, we use chaotic sequence to encrypt watermark signal, and the second
    time, we use high dimension chaotic system to encrypt the encrypted watermark again. In order to improve the
    robustness of the algorithm, the algorithm was embed the same watermark information repeatedly by the way. The
    principle of majority was used to enhance the error correction capability of watermark information when the
    watermark information was extracted. Simulation results showed that the algorithm is of better robustness and
    security.
    Dual-threshold Adaboost Face Detection Algorithm Based on Feature Pruning
    SHEN Ke-lei1, YANG Zheng-li2, OUYANG Guang-shuai1
    2014, 0(8):  50-53+95.  doi:10.3969/j.issn.1006-2475.2014.08.011
    Asbtract ( 263 )  
    References | Related Articles | Metrics
    Aiming at the problem of too much training time by using traditional Adaboost, this paper proposes a
    novel dual-Adaboost face deteetion algorithm based feature pruning. On the one hand, the usage of dual-threshold
    weak classifiers which replaced the traditional single-threshold weak classifier improves the classification
    capability on individual weak classifier. On the other hand, the algorithm uses only the samples with small error
    rate to train the weak classifier. Experimental results show that the training speed is increased by using less
    features and a small proportion of the features in this dual-Adaboost algorithm.
    Big Data Application Mode and Security Risk Analysis
    YAN Zhi1, ZHAN Jing1,2,3
    2014, 0(8):  58-61.  doi:10.3969/j.issn.1006-2475.2014.08.013
    Asbtract ( 235 )  
    References | Related Articles | Metrics
    Traditional equipments and tools can not meet the requirements of big data application in scalability
    and analysis. People currently always use Hadoop to store and analyze big data in cloud computing environment. The
    risks of big data application on cloud come from cloud service providers and remote users who access data with
    unauthorized right. The paper presented the threats under different deployment of cloud, and analysed the risk at
    different stages of operation in Hadoop. The paper gave a thread model for big data application and finally gave
    the corresponding security policy.
    Hybrid Storage Strategy with MongoDB and MySQL for E-government
    WU Xiu-jun
    2014, 0(8):  62-66.  doi:10.3969/j.issn.1006-2475.2014.08.014
    Asbtract ( 332 )  
    References | Related Articles | Metrics
    For the defects of relational database used in traditional e-government platform when storing
    unstructured data, the advantages of MongoDB in storing mass unstructured data are used to put forward a hybrid
    storage strategy with MongoDB and MySQL. MongoDB is responsible for storing unstructured data such as pictures,
    video. MySQL is responsible for storing structured data such as user registration information, payroll. Both
    of them work together to provide data cloud storage services and query operations of e-government data, thereby
    reducing the load on the database server of MySQL, saving the storage space and enhancing the scalability of e-
    government back-end database. Comparative tests show that the hybrid strategy can greatly improve the query
    efficiency of e-government platform.
    Vulnerability Database Maintenance System Based on Topic Web Crawler
    LIU Hai-yan, HUANG Rui, HUANG Xuan
    2014, 0(8):  67-70+80.  doi:10.3969/j.issn.1006-2475.2014.08.015
    Asbtract ( 282 )  
    References | Related Articles | Metrics
    Vulnerability database is an important part of information security infrastructure used for storing
    vulnerability information. This paper introduced topic Web crawler into the vulnerability database maintenance
    system, in which the webpages that are related to vulnerabilities can be accessed through topic Web crawler and
    the vulnerability information can be abstracted so as to update the vulnerability database. This technology
    reduced the workload of maintenance and resolved the problems of coverage incompletion and lack of information in
    the existing vulnerability database. By analyzing the structure of the existing vulnerability database at home and
    abroad, studying the association of vulnerability attributes, and implementing group classification description
    method, this paper built a vulnerability database syntactic model. It also came up with a dynamic topic
    construction scheme for vulnerability topic, introducing design and implementation of vulnerability database
    maintenance system.
    A Kind of VOD System Based on Cloud Storage
    YU Zheng-rong, XIA Xiao-ling
    2014, 0(8):  71-74.  doi:10.3969/j.issn.1006-2475.2014.08.016
    Asbtract ( 208 )  
    References | Related Articles | Metrics
    For VOD system’s I/O bottlenecks and network congestion problems under conditions of high concurrent
    network access, this paper presents a new solution based on cloud storage. On the basis of the structure on VOD,
    the solution uses cloud storage and CDN to provide storage service and network access service, improving the load
    capacity for high concurrent access to the system. While for VOD video transcode module, this paper presents a
    whole solution based on FFMPEG, which can reduce development costs and technical difficulties in the practical
    application. It has practical significance and application value for VOD system’s upgrading and optimization.
    Network Intrusion Detection Model Based on Combination Algorithm Selecting Features
    LIU Chun
    2014, 0(8):  75-80.  doi:10.3969/j.issn.1006-2475.2014.08.017
    Asbtract ( 264 )  
    References | Related Articles | Metrics
    In order to improve the detection accuracy of network intrusion, this paper proposed a network intrusion
    detection model based on combination algorithm selecting features. Firstly, the mathematical model of network
    intrusion detection features selecting problem is established, and then genetic algorithm is used to find the
    feasible sub-features, and the optimal sub-features is obtained by particle swarm optimization algorithm, finally,
    the network intrusion detection model is established by relevance vector machine, and the performance is test by
    simulation experiments. The test results show that the proposed model can not only improved the detection speed,
    but also can improve the network intrusion detection accuracy.
    Improvement and Optimization on Radar Extrapolation Algorithm Based on OpenCL
    WANG Xing1, MIAO Chun-sheng1, WANG Xiu-jun2, FAN Zhong-xin1
    2014, 0(8):  81-86+90.  doi:10.3969/j.issn.1006-2475.2014.08.018
    Asbtract ( 265 )  
    References | Related Articles | Metrics
     Extrapolation based on radar data is one of the important methods for weather nowcasting. With the
    increasing scale of the national weather radar network construction, and the enhancing about the refinement of
    meteorological observational data, the extrapolation forecast based on regional and even national radar puzzle,
    the computation time is very long. The time waiting for extrapolation computation usually lags behind the data’s
    observation frequency which is once every six minutes. To solve the problem that the traditional extrapolation
    algorithm is of high computational complexity and poor real-time, this paper discusses the heterogeneous computing
    model based on GPU, and presents a parallel algorithm with OpenCL to achieve high performance, then analyzes the
    bottlenecks of this application, and discusses how to bring up the computation speed by algorithm process
    improvement and test data comparison. Some methods such as optimizing the mapping relationship of memory and
    threads, utilizing local memory as high speed cache, and hiding CPU execution time, not only bring the efficiency
    of the algorithm significantly improved, but also provide a reference for other optimization based on OpenCL
    heterogeneous computing. Using AMD Graphic Core Next and Northern Islands which are two generation GPU
    architectures as test platforms, and using Intel CPU parallel computing as a test reference, the test results show
    that the improved algorithm consuming the same power dissipation under different hardware, the computing
    performance is improved 15-22 times.
    #br# Multi-valued Model Checking of Software Product Line with χChek
    HUANG Ming-yu, SHI Yu-feng
    2014, 0(8):  87-90.  doi:10.3969/j.issn.1006-2475.2014.08.019
    Asbtract ( 210 )  
    References | Related Articles | Metrics
    Software Product Line (SPL) keeps the flexibility of products and improves the reuse of the common base
    at the same time. But SPL includes much uncertain and inconsistent information, thus there will be some potential
    risks for software product. Formal validation technology has been used for validating the SPL. But the traditional
    model based on boolean logic can’t well describe the nondeterminacy and inconsistency of SPL. Therefore combined
    with a muti-valued logic model checker, an action-based for specifying SPL was proposed. Then the new model was
    converted into the model which can be checked by χChek and a lattice of multi-valued logic was
    generated. At last, Computation Tree Logic (CTL) was used to describe temporal properties of the SPL and
    χChek can validate those properties.
    A Load Balance Algorithm Based on Prediction Model
    QIAO Guo-juan, CHEN Guang
    2014, 0(8):  91-95.  doi:10.3969/j.issn.1006-2475.2014.08.020
    Asbtract ( 236 )  
    References | Related Articles | Metrics
     A load balancing model based on WPLS-SVM (Wavelet Packet and LS-SVM) of Linux server cluster system is
    presented, using the uncertainty and randomness characteristics of load changing in cluster system. First, WPLS-
    SVM prediction model is constructed and training sample of load is known. Then, the arriving requests are
    distributed according to the results of load prediction by random interval scheduling algorithm. The simulation
    results show that this model overcomes the slow response and poor prediction accuracy shortcomings and improves
    the overall performance of the cluster system.
    Function Dependence Algorithm Based on Water Census Data
    QIAN Zhen-xing, WAN Ding-sheng, LI Shi-jin, CHENG Xi-feng
    2014, 0(8):  96-100.  doi:10.3969/j.issn.1006-2475.2014.08.021
    Asbtract ( 255 )  
    References | Related Articles | Metrics
    Conditional Functional Dependencies (CFDs) can be made extensive use of data inconsistency and data
    cleaning. In order to check the consistency of water conservancy survey data, this paper, according to the
    characteristics of the data, divided the data into two parts, including measurement and dimensions, and clustered
    the measurement data, imported the concept of Conditional Functional Dependencies(CFDs),redefined the Conditional
    Functional Dependencies, improved CTANE algorithm which finds the functional dependencies; taking reservoir
    engineering data for example, this paper verified that the improved algorithm could accurately find the
    Conditional Functional Dependencies of water conservancy survey data, which is good for the detection of data
    consistency.
    Collaborative Compression Algorithms with Pure Digit of GPS Data
    CHEN Yao-li, JIN Min
    2014, 0(8):  101-105+123.  doi:10.3969/j.issn.1006-2475.2014.08.022
    Asbtract ( 262 )  
    References | Related Articles | Metrics
    To reduce the amount of data transmission and maximizely maintain the integrity of the original data, we
    compress the GPS positioning data for real-time transmission. The paper processes the data into a pure numerical
    sequence by lossless preprocessing, which is based on the features of GPS positioning data. The paper introduces
    Golomb-Rice algorithm and presents a collaborative compression algorithm idea. The experiment shows that the half
    byte coding collaborated with real-time binary arithmetic is the best. The collaborative algorithm meets the real
    -time transmission of GPS data, and ensures the compression rate at least 85%, decreasing the GPS data
    transmission, reducing the traffic cost. It also can adapt to a variety of types of GPS data compression.
    Meanwhile, it can be used in any countries around the world without the use limitation.
    Improved Optimal Link State Routing Protocol Algorithm
    CAI Ya-su
    2014, 0(8):  106-109.  doi:10.3969/j.issn.1006-2475.2014.08.023
    Asbtract ( 235 )  
    References | Related Articles | Metrics
    This paper improved the inadequacy of optimal link state routing protocol on wireless Mesh network and
    designed an improved algorithm of OLSR protocol. The simulation results of comparative experiments showed that:
    with the increasing speed of the node, the improved algorithm is of obvious advantages in the success rate of data
    transmission, the stability of wireless Ad hoc network, and other aspects. A practical engineering application
    showed that: the new protocol improved the performance of the system in the stability of wireless network
    bandwidth and packet loss rate.
    Import and Export Trade Prediction Algorithm Based on #br# Multi-kernel Weighting RVM Model Optimized by PSO
    BAI Shuang
    2014, 0(8):  110-112+118.  doi:10.3969/j.issn.1006-2475.2014.08.024
    Asbtract ( 224 )  
    References | Related Articles | Metrics
    Because of high fluctuation and many influence factors, common algorithm cannot get precise predictions.
    According to the problem, the article presents a new import and export trade prediction algorithm based on multi-
    kernel RVM model optimized by PSO. Firstly, the article finds factors influencing import and export trade and
    extracting main factors with PCA. Then on the basis of training of several single kernel RVM models based on
    different kernel functions, multi-kernel RVM model is built according to the prediction error. Lastly, parameters
    of multi-kernel RVM model are optimized by PSO to heighten precision of prediction. The emulation experiment shows
    that this method can gain more accurate prediction result in the prediction of Shenzhen import and export trade.
    An Interactive Oriented and Incremental Algorithm for Graph Layout
    LI Jie, ZHONG Zhi-nong, WU Ye, JIANG Wei
    2014, 0(8):  113-118.  doi:10.3969/j.issn.1006-2475.2014.08.025
    Asbtract ( 242 )  
    References | Related Articles | Metrics
    Aiming at the force-directed algorithm lacking of interactivity and aesthetics and low efficiency, an
    interaction oriented and incremental algorithm for graph visualization is proposed. Firstly, the algorithm
    visualizes a small portion of the graph data, secondly, extends the visualized data by user’s selection, and then
    draws the extended data with the new algorithm. The new algorithm can not only interact with users, but also
    improve the efficiency of visualization and the aesthetics.
    Safe Producing and Quality Traceability for Food Additive BHT Based on J2EE
    SHAN Ping1, WAN Chang-lin2,3, QIU Feng2,3, WANG Lei2,3, DAI Huan2,3
    2014, 0(8):  119-123.  doi:10.3969/j.issn.1006-2475.2014.08.026
    Asbtract ( 225 )  
    References | Related Articles | Metrics
    This paper introduces the main application of Butylated Hydroxytoluene (BHT) as a food additive; for
    making sure of the reliability and effectiveness of food safety traceability data source in our country, this
    paper analyses the safe producing and quality traceability requirement elements and defines the key producing
    points based on the purchase, producing and sales processes of BHT manufactories. Therefore, the BHT safe
    producing and quality traceability system that confirms to related standards was designed and implemented based on
    a free and open-source J2EE framework. With the integration of Spring, Hibernate and RFID technologies, this
    system managed the material purchasing, producing, inventorying, and product selling information, could realize
    the monitoring and quality tracing of BHT producing and sales.
    Study and Practice of Mobile Web Rapid Development
    GAO Guang-yin, CUI Meng-xin, WANG Wei-jia
    2014, 0(8):  124-127.  doi:10.3969/j.issn.1006-2475.2014.08.027
    Asbtract ( 200 )  
    References | Related Articles | Metrics
    To explain how to rapidly develop mobile website which is fashionable, completely functional and
    strongly compatible, this paper put forward an efficient solution based on the analysis of the latest mobile
    website development technologies recently. With the technologies consisting of MVC4, Entity Framework and jQuery
    Mobile, we designed and implemented a mobile course website. The website possesses simple and beautiful interface,
    easy navigation, compatibility. It had already been applied in Taizhou College of Science and Technology, NJUST
    with the result that students’ enthusiasm and efficiency are both improved.
    Research and Prospect of Deep Auto-encoders
    QU Jian-ling, DU Chen-fei, DI Ya-zhou, GAO Feng, GUO Chao-ran
    2014, 0(8):  128-134.  doi:10.3969/j.issn.1006-2475.2014.08.028
    Asbtract ( 398 )  
    References | Related Articles | Metrics
    Deep learning, which is a branch of machine learning, inaugurates new era in the development of neural
    network. As a key component of deep structure, the deep auto-encoder is used to fulfill a task of transforming
    learning and plays important role in both unsupervised learning and non-linear characters extraction. We firstly
    introduced the origin of deep auto-encoder as well as its basic concept and principle, secondly, the construction
    procedure, pre-training and fine-tune procedure of depth auto-encoders were generally introduced, meanwhile, a
    comprehensive summarization of different kinds of DAE was made. At last, the direction of future work was proposed
    based on an in-depth study of current DAE researches.
    Application of Pywinauto in Software Performance Test
    HE Bim, WANG Min-shuai
    2014, 0(8):  135-138.  doi:10.3969/j.issn.1006-2475.2014.08.029
    Asbtract ( 265 )  
    References | Related Articles | Metrics
    This paper discusses the performance test which is applied to software based on Pywinauto automation
    test scripts module. This paper firstly introduces the basic concepts of Pywinauto, and then introduces how
    Pywinauto is used in the implementation of automation testing by a best case. The test results show that this
    solution is simple, can rapidly achieve time-related performance of Windows applications. At the same time, this
    solution greatly improves the efficiency of test, reduces the cost of test.
    Research and Application of SVG in Wiring Data Analysis System
    ZHU Hua-yuan, SHI Feng-long, GAO Wan-chun, TENG Yue
    2014, 0(8):  139-142.  doi:10.3969/j.issn.1006-2475.2014.08.030
    Asbtract ( 261 )  
    References | Related Articles | Metrics
    This paper researched the key technology of SVG application in wiring data analysis system based on
    Ajax, for the requirement of complicated circuit quick analysis and high efficiency in aviation arming ensure
    domain. We united wiring data model and SVG data dynamic issue model, and applied and analyzed the research
    results.