Loading...

Table of Content

    03 November 2014, Volume 0 Issue 10
    Study of Auto Evasion Time Based on Video Detection
    TIAN Shuang1, LIU Jing-pei2
    2014, 0(10):  1-4.  doi:10.3969/j.issn.1006-2475.2014.10.001
    Asbtract ( 287 )  
    References | Related Articles | Metrics
    The purpose of the study is to find out the appropriate evasion time of collision avoidance system. By using the video cameras mounted on tall structures to acquire 10.5 hour video records of traffic streams at no-signal intersection, the thesis extracted and analyzed 808 samples with the aid of video detection. Based on the traffic conflict technology, conclusions were drawn as follows: 1) the basis for avoidance decision is time to collision (TTC); 2) the activation time of CAS should be restricted within a definite range, whose upper limit is the evasion time of normal driving and lower limit is the critical time.
    Courseware for Online Plotting Experiment Based on MATLAB WebFigure
    CAI Yun-lu1,2, YANG Jie-xia1,2, LIN Zhi-guang1,2
    2014, 0(10):  5-7,15.  doi:10.3969/j.issn.1006-2475.2014.10.002
    Asbtract ( 322 )  
    References | Related Articles | Metrics
    By using the component of MATLAB Compiler Runtime of MATLAB, we provide MATLAB Web service, and realize the function of online space curve courseware with MATLAB WebFigure. The ideas and methods of design are introduced, and the key technology for online plot with WebFigure is summarized. Using the WebFigure feature in MATLAB Web application, users can display MATLAB figures on a Web site for graphical manipulation as same as in real. The online plotting resources are significative to both teachers and students.
    System of Multi-sensor and Multi-target Tracking and Track Fusion
    FU Lin, WAN Xiao-dong, WANG Bao-zeng
    2014, 0(10):  8-11.  doi:10.3969/j.issn.1006-2475.2014.10.003
    Asbtract ( 380 )  
    References | Related Articles | Metrics
    Multi-sensor data fusion nowadays is widespreadly concerned because of the improving tracking accuracy, the ability to identify and the strengthen immunity system through complementary information. This paper mainly described various algorithms including target tracking, track association and track fusion based on radar and infrared data fusion architecture. The simulation results show that the effect of the fusion of radar and infrared tracking is better than that of single sensor tracking.
    Trusted Component Measurement Model Based on Specific Areas
    TANG Ying, ZHANG Yu-ping, CHEN Hai-yan
    2014, 0(10):  12-15.  doi:10.3969/j.issn.1006-2475.2014.10.004
    Asbtract ( 287 )  
    References | Related Articles | Metrics
    The reuse of component-based software is an effective way to improve productivity and quality, and it has been widely used in the computer system. With the improvement of software quality, the research of trusted component has got more and more attention. The credibility of component determines the quality of software. Only those components with high credibility will meet the need of high quality software. So, this paper introduces the ISO/IEC25010 software quality model firstly, then studies the properties of components, and finally a trusted component model based on specific areas is established. After that, this paper explores the selection process of its metrics and describes the credibility of the model with the method of formalization.
    Chronic Kidney Disease Stages and SMS Alerts System
    TANG Yan, WANG Ping
    2014, 0(10):  16-19.  doi:10.3969/j.issn.1006-2475.2014.10.005
    Asbtract ( 249 )  
    References | Related Articles | Metrics
    This paper introduced the design and implementation of chronic kidney disease stage and short message notification system based on B/S three layer architecture according to the requirements of hospital department of nephropathy requirements. The system manages patient information of chronic kidney disease according to glomerular filtration rate (GFR), sends treatment and nursing guidance information by a mobile phone text messages according to the different levels of patients to help patients better control and treatment of the disease. The system design and implementation of chronic kidney disease and SMS alerts are introduced from the system requirements analysis, system design and to system architecture, business processes, database implementation of key technology and so on. At present, the system is in the stage of trial operation. If it gets good effect, the system can be extended to other chronic disease prevention and control, which is of great significance.
    Course-oriented Chinese FAQ Auto Question Answering System Model
    HOU Li-min, ZHANG Yong-qiang
    2014, 0(10):  20-24.  doi:10.3969/j.issn.1006-2475.2014.10.006
    Asbtract ( 282 )  
    References | Related Articles | Metrics
    The course-oriented Chinese FAQ auto question answering system is a subsystem of network teaching platform, which can realize automatic question answering, but the FAQ base is almost built artificially, which is time-consuming and laborious, so an approach for automatic extraction from the Baidu know platform is proposed. The similarity calculation method of question similarity semantic and syntactic dependency relations combined is also proposed. We can get the keywords vector, dependency relation pairs of the question and FAQ library’s retrieval subset from the question, the former two are used by similarity calculation algorithm to obtain the similar question from the subset, and return the answer as a solution. For the questions beyond this set, this system uses artificial service to return the answer. The experimental results show that this system model has the ability of FAQ library automatic construction and a higher response rate of accuracy and continuously strengthen the response ability, so it has broad application prospects.
    Architecture of Cloud Media Server in Video Surveillance Networking System
    WANG Xin1, CHANG Jing-kun2
    2014, 0(10):  25-30,41.  doi:10.3969/j.issn.1006-2475.2014.10.007
    Asbtract ( 219 )  
    References | Related Articles | Metrics
    In Video Surveillance Networking System, the traditional independent deployed media servers have many problems caused by concurrency of access including serious I/O load, insufficient network bandwidth, uneven distribution of load and so on. By the combination of overall scheduling, unified management and performance optimization, the cloud based media server can maximize the performance and resource utilization. The overall architecture of cloud media server was designed and the load evaluation method of the media server in server cluster was also designed based on this architecture. The experimental results show that compared with the traditional media server architecture, the cloud media server can handle the load balancing and fault tolerance switching well. It can deal with the sudden high concurrent access to the video sources of media servers.
    Configuration Management Database Model Based on Cloud Computing Operation and Maintenance Service
    XIAO Jian-ming, DAI Sheng
    2014, 0(10):  31-36.  doi: 10.3969/j.issn.1006-2475.2014.10.008
    Asbtract ( 302 )  
    References | Related Articles | Metrics
    Configuration management database (CMDB) is a data center of infrastructure. It plays a vital core role in operation and maintenance processes. In the environment of cloud computing, there is a lack of CMDB model which can support the cloud-based operation and maintenance service. In order to solve this problem, based on cloud computing operation and maintenance scene, a research was made about how to build a cloud platform CMDB that provides operation and maintenance service. With this foundation, a basic model of CMDB including the relationship between each configuration item (CI) and the high performance external query and analysis capabilities was provided. It turned out to be a theoretical data-supported practical standard model for operation and maintenance. The model has been applied and validated in a cloud-based project for a telecom operator.
    System of Semantics-based Keyword Search over Relational Database
    WAN Chang-lin1, XU De-ming2
    2014, 0(10):  37-41.  doi:10.3969/j.issn.1006-2475.2014.10.009
    Asbtract ( 333 )  
    References | Related Articles | Metrics
    KSORD (Key Search over Relational Database) is currently an important research direction, it unions the efficient storing of structured data in traditional databases and the user-friendly and efficient unstructured data query in information retrieval systems. This paper introduces the design and implementation of a semantics based KSORD system. The system, which can utilize the semantics of ontology to do key search over relational database, is based on the enterprise development standard: J2EE, with the integration of database, semantic Web and keyword search technologies. The main implementation technology issues: reverted index, concept similarity, semantic scoring formula are further analyzed. A revised inverted index structure and a new semantics based information retrieval scoring formula are proposed.
    Application of Association Rule Mining in Market Supervision and Management
    YANG Bin
    2014, 0(10):  42-45.  doi:10.3969/j.issn.1006-2475.2014.10.010
    Asbtract ( 246 )  
    References | Related Articles | Metrics
    Association rule mining is to dig out hidden relationships in data, it can find out all the relationship of a set of events or data items with another set of events or data items, which assist policymaker to make decisions. Combining with market supervision and management department’s situation, this paper generated transaction database from the basic market information, violations and illegal entry data of market entities, converted this transaction database to a Boolean matrix, and then generated frequent item sets and association rules by the method based on vector inner product. The result shows that it can find out association rules from the transaction database correctly and meet to the actual situation of market supervision and management department.
    Safety Analysis and Verification on Civil Aviation Business System
    XING Ni-zhou, WANG Li-song
    2014, 0(10):  46-51,65.  doi:10.3969/j.issn.1006-2475.2014.10.011
    Asbtract ( 238 )  
    References | Related Articles | Metrics
    The safety of the civil aviation business system is very important because it is a necessary condition for civil aviation enterprise to run. Formal verification method is an important approach to insuring system safety. In this paper, firstly, the fault tree analysis technology is introduced to analyze the safety requirements and the new ABPD modeling language is promoted. Secondly, six kinds of safety properties are defined through analyzing the model. Thirdly, safety verification is achieved through graph search algorithm and the concrete implementation of the algorithm is provided. Lastly, the experiment results explain the completed verification process and the validity of the method.
    Android/Matlab Data Exchange Middleware Architecture
    CHEN Guo-liang, WU Yun-ping
    2014, 0(10):  52-54.  doi:10.3969/j.issn.1006-2475.2014.10.012
    Asbtract ( 250 )  
    References | Related Articles | Metrics
    This paper presents an information exchange method to communicate between Android embedded devices and Matlab. Firstly, the method uses Socket to establish communication between the Android and Java server, and then calls the Matlab dynamic libraries to complete the data analysis by the Java server, so as to realize the complementary advantages between Android and Matlab, helps shorten the verification time of Android project development, improves the efficiency of research and development. The experimental results demonstrate the feasibility of the method.
    Exploration on Mobile Phone QR Code in Multimedia Classroom Equipment Management System
    LIN Chao
    2014, 0(10):  55-57,75.  doi:10.3969/j.issn.1006-2475.2014.10.013
    Asbtract ( 324 )  
    References | Related Articles | Metrics
    For the problems of the management of multimedia classrooms in our school, a multimedia classroom equipment management system was designed and developed. The system used C/S architecture based on the Android platform, using mobile phone QR code technology, realized the quick query of multimedia classroom software and hardware information, and equipment operation manuals, so improved greatly the efficiency of management of multimedia classrooms.
    Campus Fault Repair System Based on Android Platform
    ZHOU Qiao-kou, LI Xia, XU Rui
    2014, 0(10):  58-60,70.  doi:10.3969/j.issn.1006-2475.2014.10.014
    Asbtract ( 352 )  
    References | Related Articles | Metrics
    In order to make it convenient for teachers and students to report campus failure equipment, this paper designs a fault repair system based on Android platform. The system uses ASP.NET technology and C# programming language to construct the major of fault repair system. It can provide online fault repair management function. At the same time, this system provides fault repair service for intelligent mobile phone terminal by using Web Service Technology. On the other hand, the use of Eclipse integrated development environment Java programming language developed Android mobile phone terminal repair system. The realization of the system provides great convenience for teachers and students.
    Testing Method of Embedded Software Based on DSP
    YANG Ke-yao, ZHANG Xiao-fang, ZENG Lei-jie
    2014, 0(10):  61-65.  doi: 10.3969/j.issn.1006-2475.2014.10.015
    Asbtract ( 208 )  
    References | Related Articles | Metrics
    Because of perfect efficiency and real-time performance, embedded system based on DSP is applied to many fields, like communication, military industry, and aviation. However, the hardware environment of embedded software is complex. There is no effective methods or tools of embedded software testing. In this paper, the point of embedded software testing based on DSP is analyzed deeply. The general method of embedded software testing based on DSP is introduced with the case of LDRA Testbed. And at last, the validity of the testing method by using LDRA Testbed is verified.
    Implementation Analysis and Performance Optimization for JavaScript Array in Chrome V8
    LIU Xu
    2014, 0(10):  66-70.  doi:10.3969/j.issn.1006-2475.2014.10.016
    Asbtract ( 454 )  
    References | Related Articles | Metrics
    With the complexity of JavaScript applications increasing, performance issues of JavaScript become increasingly prominent, but to optimize the use of JavaScript array can improve program efficiency. This paper, by analyzing the characteristics of JavaScript arrays and reviewing the source code of Chrome V8 JavaScript engine, describes the implementation details for JavaScript array in V8, and focuses on the Fast Elements and Dictionary Elements array storage modes. It also gives the basic principles of performance optimization of JavaScript array and four examples to show how to analyze and optimize programs in practical applications.
    Human Vital Signs Monitoring System Using Wearable Sensors in Daily Life
    ZHU Peng1, JIANG Ping2, ZHU Jin1, CHENG Yong-qiang2, WANG Xiao-nian1
    2014, 0(10):  71-75.  doi: 10.3969/j.issn.1006-2475.2014.10.017
    Asbtract ( 246 )  
    References | Related Articles | Metrics
    We designed a human vital signs monitoring system based on multiple wearable sensors. It consists of an MSP430 micro-controller for the central processing and a CC2540 SoC for the Bluetooth low-energy based on wireless data transmission. This paper presented its working principles, hardware design, software design and experiments. Experimental results show that the system can reliably capture and monitor the users ECG (electrocardiogram), PPG (photoplethysmography), heart rate, spO2 (oxygen saturation), body temperature and blood pressure. It also can communicate with smart phones and then upload the data to a remote monitoring center for further analysis and diagnosis. This system provides a reliable solution for tele-healthcare supported by the technologies of Internet of things and embedded systems.
    A Method of Service Evolution for Controlling Risk of Privacy Exposure
    LIU Bo, HUANG Zhi-qiu, WANG Shan-shan
    2014, 0(10):  76-80,107.  doi:10.3969/j.issn.1006-2475.2014.10.018
    Asbtract ( 323 )  
    References | Related Articles | Metrics
    In the Web services composition, users privacy protection has been received widespread attention. When the requirement for users privacy data by one or more member services in the service composition is beyond the range of users willing to give, Web services composition need to be adjusted to ensure that the expose of privacy data is meeting the demand of the users. In this paper, we propose a new method of service evolution, which is based on the users privacy requirements. The key to this method is by controlling the scope of privacy datas references to achieve the purpose of reducing the risk of privacy exposure. Finally, through a travel agency case study, the feasibility of the proposed evolutionary approach is verified.
    Improvement and Implementation on Schnyder Routing Algorithm on Wireless Sensor Networks
    SUN Quan, WANG Li-song
    2014, 0(10):  81-84,91.  doi:10.3969/j.issn.1006-2475.2014.10.019
    Asbtract ( 244 )  
    References | Related Articles | Metrics
    The virtual coordinate-based geometric routing protocol is an important direction of research on wireless sensor networks. At present, when the nodes in the network topology failure, the algorithm is no longer applicable because the structure of Schnyder wood was destroyed and the probability of greed condition will decrease sharply with the increasing of node failure rate. Inspired by the compass in real life, a novel algorithm called Greedy-Compass Double Model Routing Algorithm is proposed in order to solve the problem of node failure. The angle is the basic of choice by calculating the source nodes with neighbor nodes and destination node. Finally, an experiment demonstrated that the improved algorithm can effectively solve the node failure problem in geometric routing algorithm.
    Applications of 802.11n Wireless LAN for Building Environment
    GAO Ming, QIU Quan, QI Ji-yun, YU Hong-bo
    2014, 0(10):  85-91.  doi:10.3969/j.issn.1006-2475.2014.10.020
    Asbtract ( 249 )  
    References | Related Articles | Metrics
    Inherited and improved the physical layer and media access control (MAC) layer technology of 802.11, 802.11n wireless protocol improved throughput. However, facing with a complex indoor environment and radio interference around, the wireless throughput will be affected. In this paper, the wireless network throughput of 802.11n with the rate of 300 Mbps and 450 Mbps are measured and compared in an office environment with different bandwidth of 20 MHz and 40 MHz. Whats more, the throughput of the different clients with Android, Windows7 and Windows XP systems are analyzed. The result provides an efficient reference for 802.11n wireless LAN deployment in the building environment.

     

    Study on APT Network Attack Technology
    MI Qi1,2, ZHU Jie1,2, XU Chao2, ZONG Jun-jun2
    2014, 0(10):  92-94,122.  doi:10.3969/j.issn.1006-2475.2014.10.021
    Asbtract ( 248 )  
    References | Related Articles | Metrics
    As a result of lagging means of defense, APT network attack has been become more and more harmful. This paper introduced the concept of APT network attack, analyzed the invasion way and the specific process, summarized the characteristics of network attacking behavior and the development trend of APT network attack, and presented a security defense strategy against it.
    Overview of Intelligent Data Retrieval Methods for Similar Waveforms in Fusion Databases
    LIU Ying, HUANG Jian-jun, QI Bing, RU Li-li, WANG Fan
    2014, 0(10):  95-99.  doi:10.3969/j.issn.1006-2475.2014.10.022
    Asbtract ( 234 )  
    References | Related Articles | Metrics
    There has been drastic data growth in many fusion plasma experiments. Some intelligent data retrieval methods to find similar waveforms have become indispensable for accelerating data recognition and analysis. Two very general approaches to search for similar waveforms are considered: searching for entire waveforms and searching subsequences within waveforms. LABCOM group of Japan and JET-EFDA group of the EU have done a lot of research in this area, and got many achievements. This paper reviews the fundamental idea and key technologies of data retrieval methods for similar waveforms, compares and shows their advantages as well as limitations. Finally, some future research trends are given.
    A Specific Pedestrian Tracking Method Based on Particle Filter and Multi-Feature Fusion
    YU Gui-lan
    2014, 0(10):  100-103.  doi:10.3969/j.issn.1006-2475.2014.10.023
    Asbtract ( 234 )  
    References | Related Articles | Metrics
    For the target tracking of specific pedestrians, a particular pedestrian tracking approach based on multi-feature fusion and particle filter is proposed. The approach uses the space pyramid matching model for reference to divide the target in space, then extracts color features and LTP features from each sub-region of the target, finally, integrates particle filter to determine the location of the target pedestrians. The experimental results show that the approach can effectively distinguish between target and background. Moreover, it can effectively track the target in the case of occluded.
    Distributed AP Clustering Algorithm Based on MapReduce
    LENG Yong-lin
    2014, 0(10):  104-107.  doi:10.3969/j.issn.1006-2475.2014.10.024
    Asbtract ( 286 )  
    References | Related Articles | Metrics
    With the extensive application of network, and the data of network grows rapidly, the process of big data faces severe challenge. After studying the AP clustering algorithm, we improved the AP clustering algorithm based on MapReduce model and designed a distributed AP clustering algorithm based on MapReduce in the cloud platform of Hadoop. We examined the distributed AP clustering algorithm on different size of graph data. The result shows that the distributed AP clustering algorithm is of good efficiency and speedup time.
    Improved Adaptive Wavelet Threshold Method and Its Application in Well Logging Curves Denoising
    CHEN Xue-song1, ZHAO Zi-hao1, ZHANG Hui-yu1, CAI Hong-kai2
    2014, 0(10):  108-111,118.  doi:10.3969/j.issn.1006-2475.2014.10.025
    Asbtract ( 216 )  
    References | Related Articles | Metrics
    The purpose is mainly to denoise the logging curve. After summarizing various denoising methods, we propose an improved adaptive wavelet threshold denoising method according to the advantages of wavelet threshold denoising method, and select 〖JP2〗Matlab toolboxs curve and well logging curve to test wavelet threshold denoising. The improved adaptive wavelet threshold denosing method is of good performance. The novel method can not only filter out noise, but also reserve the details of the signal better.〖JP〗
    HTM-based Genetic Time Series Segmentation Algorithm
    WU Da-hua
    2014, 0(10):  112-118.  doi:10.3969/j.issn.1006-2475.2014.10.026
    Asbtract ( 305 )  
    References | Related Articles | Metrics
    This paper proposes a time series segmentation approach by combining the advantages of hierarchical temporal memory (HTM) model and the pattern-based genetic time series segmentation algorithm. The approach is a HTM-based genetic algorithm which replaces the pattern-based fitness value function with the HTM-based fitness value function. The approach can be applied to find segments from a time series and to identify the class of sub series. In addition, a pattern-based algorithm of HTM sample generation is proposed for generating sample set with HTM trait. Experimental results show that the two algorithms are effective on the time series of stocks.
    Study of Improved Algorithm of Gas Concentration Based on the Largest Lyapunov Exponent
    ZHANG Xin-yu1, LI Ru1,2, WANG Jin-yu3
    2014, 0(10):  119-122.  doi:10.3969/j.issn.1006-2475.2014.10.027
    Asbtract ( 247 )  
    References | Related Articles | Metrics
    Based on chaos theory, the symbol is uncertain when using the largest Lyapunov exponent to predict the gas concentration. In order to solve this problem, the simplified C-C method is used to reconstruct the sequence of gas concentration and the Wolf method is used to calculate the largest Lyapunov exponent. Then uses the weighted local thought to establish the gas concentration predict model. The emulation experiment shows the prediction algorithm is optimal when the weighted number is 5, and more accurate than the traditional Lyapunov exponent prediction.
    An Improved Algorithm of Image Compression Based on Wavelet Transform
    YANG Ting1,2, GUAN Hong-yun1,2, ZHANG Wen-kang1,2, FAN Xiao-qing1,2
    2014, 0(10):  123-126.  doi:10.3969/j.issn.1006-2475.2014.10.028
    Asbtract ( 253 )  
    References | Related Articles | Metrics
    With the advent of the digital age, the data of image becomes more and more big, people have higher requirement for the quality of image, so a good image compression technology is also becoming more and more important. An algorithm of high compression ratio and low distortion is the focus of the field of image compression. And for the image compression based on wavelet transform, the distortion of image would become more obvious with the improvement of compression ratio. The low-frequency of sub-band images which comes from wavelet decomposition is applied into the fourth order of DPMC linear prediction to improve the distortion problem. Experimental results show that the problem of the distortion is improved under the conditions of the same compression ratio.