Loading...
主 管:江西省科学技术厅
主 办:江西省计算机学会
江西省计算中心
编辑出版:《计算机与现代化》编辑部
Toggle navigation
Home
About Journal
Editorial Board
Journal Online
Online First
Current Issue
Archive
Most Read Articles
Most Download Articles
Most Cited Articles
Subscription
FAQ
Self Recommendation
Contact Us
Email Alert
中文
Office Online
Submission or Manuscript
Peer Review
Editor-in-Chief
Office Work
Instruction
More>>
Instruction
Submit Flow
Template
Copyright Agreement
The Author Changes the Application
Highlights
More>>
Links
More>>
Visited
Total visitors:
Visitors of today:
Now online:
Table of Content
28 May 2013, Volume 1 Issue 5
Previous Issue
Next Issue
算法设计与分析
An Efficient Query Processing Algorithm Based on Time Slice Fitting on Wireless Sensor Networks
TAN Ai-ping;CHENG Ya-ling
2013, 1(5): 1-6. doi:
10.3969/j.issn.1006-2475.2013.05.001
Asbtract
(
310
)
Related Articles
|
Metrics
On data-centric distributed sensor network, users often submit queries about the interested sensing region such as gathering the data in region F during a specified period of time. In order to enhance monitoring accuracy, sensor networks rely on high density deploying node and sampling frequency, so there are lots of redundant data. Therefore, guaranteeing querying data accuracy and reducing energy consumption of transmitting redundant data are an urgent problem to be resolved at present. This paper proposes an single node sensor data time slice fitting algorithm, the proposed algorithm can balance the energy consumption of node in query region; secondly, an slice model fitting algorithm, which can find optimal fitting model sets meeting the error threshold in querying time. Combining the above tow algorithms, this paper finally proposes an efficient and confidence query processing algorithm based on spatial-temporal correlations, theoretical and experimental results show that this method can return high confident querying results and is energy efficient.
算法分析与设计
Eigenvector Selection Algorithm for Spectral Clustering Based on Mean
WANG Sen-hong;DAI Qing-yun;CAO Jiang-zhong;ZHU Jing
2013, 1(5): 7-9. doi:
10.3969/j.issn.1006-2475.2013.05.002
Asbtract
(
385
)
Related Articles
|
Metrics
Spectral clustering is one of the most popular methods for data clustering, and its performance is determined by the quality of the eigenvectors of the related graph Laplacian matrix. For a K clustering problem, Ng-Jordan-Weiss(NJW) spectral clustering method adopts the eigenvectors corresponding to the K largest eigenvalues of the Laplacian matrix derived from a dataset as a novel representation of the original data. However, these K eigenvectors can not always reflect the information of the original data for some classification problems. This paper proposes an eigenvector selection method for spectral clustering. First this method calculates the mean of the 3K largest eigenvalues from Laplacian matrix, and then select K eigenvectors whose eigenvalues are the nearest the mean eigenvalue. Experiments show that it can get better cluster results on UCI datasets and obtain more satisfying performance than classical spectral clustering algorithms.
算法设计与分析
Top-k Shortest Path Query Algorithm Based on Tree Decomposition Structure
CHONG Hao-min;CHEN He
2013, 1(5): 10-15. doi:
10.3969/j.issn.1006-2475.2013.05.003
Asbtract
(
411
)
Related Articles
|
Metrics
Based on the principle and property of tree decomposition, this paper converts a graph into a tree structure using a heuristic tree decomposition method. It preprocesses the decomposition tree and stores the index for further Top-k shortest path query. Through the solving of constraint path query in tree decomposition(Top-1 shortest path query) , Top-k algorithm computes the first topk shortest path one by one. It applies tree decomposition method into Yen algorithm. Though Top-k algorithm don’t optimize the worst case time complexity, it can recursively compute the shortest path efficiently through using the stored index. Proved by experiment, Top-k algorithm based on tree decomposition is faster than Yen algorithm, and the size of index is acceptable.
Study on Airport Surface Conflict Detection Algorithm Under ADS-B Surveillance
ZHANG Rui;ZHANG Yong;ZHANG You-hui
2013, 1(5): 16-18,2. doi:
10.3969/j.issn.1006-2475.2013.05.004
Asbtract
(
338
)
Related Articles
|
Metrics
ADS-B is an important surveillance technology which is recommended by ICAO, it can be used for route and airport surface surveillance. This paper puts forward a shortterm airport surface conflict detection algorithm based on ADS-B highprecision surveillance data. This algorithm analyzes the conflict scenarios on the airport surface, detectes the runway incursion by areadivided and the taxiway or apron conflict by computing the estimate conflict time and distance between two airplanes, finally a conflict detection simulation program is used to verify the effectiveness of the algorithm.
Research on Data Skew Join Algorithm Based on MapReduce Model
JIN Jian;CHEN Qun;ZHAO Bao-xue
2013, 1(5): 22-27. doi:
10.3969/j.issn.1006-2475.2013.05.006
Asbtract
(
367
)
Related Articles
|
Metrics
The study of join algorithm based on MapReduce is a hot topic in massive data research area. However, most current optimization work is based on the assumption that the data are evenly distributed. In practical applications, the data to be processed are often skew in distribution. This paper proposes a MapReduce join algorithm called Skew Control Join, which is adaptive for serious skew data. The algorithm gets the overall data distribution by sampling, then partitions the data by total partitioner to distribute the data evenly to all Reduce tasks. Experiment results show that the algorithm is of good performance when the processed data are skew.
计算机仿真
Design and Implementation of Skeletal Animation for Marine Life System Based on VTF
SONG Li-li;TIAN Feng-lin;CHEN Ge
2013, 1(5): 28-31,4. doi:
10.3969/j.issn.1006-2475.2013.05.007
Asbtract
(
330
)
Related Articles
|
Metrics
Most data formats of skeletal animation are not suitable for high performance system, because they aim at data exchange and have low speed of the loading and parsing. In addition, due to the limited number of constant registers, GPU cannot be utilized fully. This paper presents an optimized scheme for data management and rendering of the skeletal animation. Firstly, in data preprocessing stage the system converts the FBX data format into data format which it employed. Secondly, in rendering stage, a GPU-accelerated approach based on VTF (Vertex Texture Fetch) technology is used by pre-creating the matrixes of bones, weights and offsets into the textures to reduce the bandwidth of communication between CPU and GPU. The paper finally realizes the simulation system of skeletal animation for marine life.
Research on Realization of Disaster Scene Based on Unreal 3 Engine
WANG Le;GENG Lu;TANG You-chun
2013, 1(5): 32-35,4. doi:
10.3969/j.issn.1006-2475.2013.05.008
Asbtract
(
359
)
Related Articles
|
Metrics
With natural disasters or man-made disasters occurring frequently, a lot of game designers hope in the design of virtual disaster scenes to increase people’s consciousness of disaster prevention and self and mutual rescue. The requirements to produce the disaster scene are put forward, to improve the immersion feeling of the game players. This paper implements the strong assembly functions of mainstream Unreal 3 engine visualization of Unreal Development Kit (UDK) to show the disaster scene, and realizes the production of volcanic eruption, lava flow and thick smoke effect.
Research on Modeling and Simulation for High-speed Switch Fabric
ZHENG Ruo-yi;CHEN Wen
2013, 1(5): 36-40. doi:
10.3969/j.issn.1006-2475.2013.05.009
Asbtract
(
316
)
Related Articles
|
Metrics
When researching on the performance of switch fabric and scheduling algorithm, simulation test has such character as low cost, flexibility, reliability, simplicity of being compared. This paper analyzes traffic pattern, high-speed switch fabric and typical scheduling algorithms. As to the system, the object-oriented design method is applied and described with UML, which constructs reconfigurable and scalable simulation software.
数据库
Design of Broadband Billing System Based on SSH Framework
JI Xiao-juan;SHEN Yu-li;ZHANG Lei
2013, 1(5): 41-46. doi:
10.3969/j.issn.1006-2475.2013.05.010
Asbtract
(
375
)
Related Articles
|
Metrics
Broadband billing system takes the open, advanced Intranet/ Web technology as the core of a new generation of information processing integrated system. Using SSH framework, the system realizes the sharing of information resources and circulation. It provides convenient and efficient service for leaders at all levels to understand the situation in time, macroeconomic management and scientific decisionmaking. Different departments and individuals have different information access privileges, and employees can grasp dynamic information of all aspects, which improves working conditions and achieves the efficiency, standardized, scientific and platform of the unit’s management. The system completely meets the needs of users; users can planning and establish the all broadband operators’ content with their own ideals. According to the units of information management needs, it uses the commercialization of product price to sure users enjoying a tailor made service; with the changes of the information management needs, administrators can increase or adjustment broadband operators system structure and user rights on their own.
Research and Implementation of Distributed Heterogeneous Database Transparent Access System
WANG Ya-lan;TAN Xian-hai;ZHAO Jin-ling
2013, 1(5): 47-51. doi:
10.3969/j.issn.1006-2475.2013.05.011
Asbtract
(
396
)
Related Articles
|
Metrics
With the quickly development of enterprise informationized, it is urgently required to study a distributed heterogeneous database transparent access system with low price, high efficiency and high reusability. Conbing with the current data integration and access to technology, this paper proposes a way to establish the distributed heterogeneous database transparent access system by using middleware architecture, virtual database strategy and XML as a means of data interchange, aiming to develop a database transparent access system that is easy-to-use, high efficiency, and transplanted reusable. The system has been used in the digital simulation platform of high-speed trains, and the experimental results show that the scheme is an optimal solution.
Property and Query Optimization of Temporal Paraconsistent Database
HUANG Hui
2013, 1(5): 52-56. doi:
10.3969/j.issn.1006-2475.2013.05.012
Asbtract
(
295
)
Related Articles
|
Metrics
In order to deal with the incomplete and contradictory information in data over time, the academia proposes a data model basd on temporal paraconsistent database. Based on this model, this paper preliminary discusses and gives the related properties of relational operators, and according to the established relationship between certain properties of operators the query language is optimized, so as it improves the query speed.
控制技术
Control Technology of Network File System Access Rate Based on Network QoS Management Layer
ZHANG Xi;LIN Yi;WANG Hui-wen;ZHANG Yan-yuan
2013, 1(5): 57-61. doi:
10.3969/j.issn.1006-2475.2013.05.013
Asbtract
(
343
)
Related Articles
|
Metrics
CA-NFS meets the requirement of the QoS of NFS for different applications by delaying or accelerating the application of the file operations. It achieves good performance. However, it does not consider the impaction of the network delay jitter of NFS packets. This paper designs and implements a module for managing QoS, offers the guarantee ablility for the QoS of NFS with less cost by exploiting the existing mechanisms of CGroup and QoS of Linux. From the experimental results, the improved NFS reduces the range of delay jitter of network packets. Its performances better than before. It provides a certain of capability for assuring the QoS of NFS.
Design of Control Terminal for Field Drip Irrigation Based on ZigBee Wireless Network
LIU Xiang;YANG Hong-ying;QU Xing-hua;ZHANG Dong;LI Bo
2013, 1(5): 62-65,6. doi:
10.3969/j.issn.1006-2475.2013.05.014
Asbtract
(
326
)
Related Articles
|
Metrics
Bring ZigBee technology into automatic control system of drip irrigation in field, making every controller terminal of system in field has capability of ZigBee communication, and founds a wireless Ad-hoc network in field, in order to remote control and collect system state. It is an energy saving plan in drip irrigation. So, design of a perfect function and high efficient ZigBee terminal controller is an indispensable and important link for large field drip irrigation. This paper gives a scheme of control terminal based on ZigBee wireless network, designs the controller hardware, software, and meets the requirements of large field drip irrigation. It makes the ZigBee wireless network in the drip irrigation technology better application.
图像处理
Study on Real-time Tablets Image Detection and Processing System Basedon Image Processing and Its Application
LIU Sheng-xiao;
2013, 1(5): 66-69. doi:
10.3969/j.issn.1006-2475.2013.05.015
Asbtract
(
306
)
Related Articles
|
Metrics
On the automatic packaging lines which uses the aluminum-plastic blister packaging machine, in the tablets packaging process, tablet plate often appears empty, unqualified tablets(such as unfilled tablet, impurities, fragments, sticky tablets). Aiming at this problem, the paper develops a real-time tablets image detection and processing system by using the VC image processing technology. It is mainly used to detect unqualified tablets and tablet images detect with the improved median filtering, the difference image method, then classifies tablets with image identification and classification. This paper is more effect than traditional median filtering in getting rid of salt and pepper noise, it can resolve the defect of the gray cross between pills and pills, in the process of real production. It has detection ratio of 90% for tablet board which contains unqualified tablets(such as unfilled tablet, impurities, fragments、sticky tablets),meets the needs of actual production.
Face Feature Extraction Based on Fast 2D-DCT Algorithm
LIN Jing-liang;LI Zu-yu
2013, 1(5): 70-72. doi:
10.3969/j.issn.1006-2475.2013.05.016
Asbtract
(
382
)
Related Articles
|
Metrics
Discrete cosine transform (DCT) has an advantage that is the image signal processing without affecting image quality. The paper proposes a new algorithm for face feature extraction. The face image is the first segmented in average, and the fast 2D-DCT algorithm instead of common DCT algorithm is used in the stage of feature vector extraction. The new algorithm has been tested, and the result proves that 2D-DCT can reduce most of time for the stage of face recognition or can extract more DCT coefficient than common DCT algorithm. Experimental results show that the proposed algorithm is fast and effective.
Image Binarization Method Based on Edge Gradient Direction
PEI Pei
2013, 1(5): 73-76. doi:
10.3969/j.issn.1006-2475.2013.05.017
Asbtract
(
434
)
Related Articles
|
Metrics
As it’s difficult to well separate target from background for images in which background gray level is nonuniform, this paper proposes a new binarization method on the basis of previous work. Combined with Canny edge detection and based on edge gradient direction feature information, the method marks both sides of edge and labels uncertain points by voting to solve the problem of noises and artifacts. Experimental results show that the method works well.
Underwater Image Fusion Method Based on Wavelet Transforms and Color Transfer
WU Yu-rong
2013, 1(5): 77-79. doi:
10.3969/j.issn.1006-2475.2013.05.018
Asbtract
(
248
)
Related Articles
|
Metrics
For promoting the development of underwater image subsequent processing technology and overcoming the shortage of traditional polarization image fusion method, this paper proposes a method of underwater polarization image fusion base on wavelet transforms and color transfer. Firstly, extracts the polarization parameters images, degree of polarization and angle of polarization image, in the wavelet domain removes redundancy and fusion exploiting the complementary and redundancy between them, then transmitts the color information of synthetic approximation unpolarized image to the fusion image. The experimental results show that this algorithm not only has good color expression, but also can improve the target detection and recognition.
Overview of Represent Methods of Image Feature Based on Function Space and Frequency Domain
SHEN Wei-yan;HUANG Yan;ZHANG Ying
2013, 1(5): 80-86,9. doi:
10.3969/j.issn.1006-2475.2013.05.019
Asbtract
(
293
)
Related Articles
|
Metrics
An observed image which is characterized not only contains the geometric structure, but also may contain noise or texture. Image feature classification and segmentation play an important role in the fields of image processing and pattern recognition (such as de-noising, edge detection and texture segmentation). From the function space and frequency-domain transformation, this paper introduces the represent methods of image feature and compares it, summarizes the advantages and disadvantages of each. At the end, the application area of image feature study is given in personal opinion.
Underwater Target Detection Method Based on Attention Mechanism
DONG Xin
2013, 1(5): 87-89,9. doi:
10.3969/j.issn.1006-2475.2013.05.020
Asbtract
(
337
)
Related Articles
|
Metrics
In view of the low underwater optical image resolution and the color distortion in underwater target detection, this paper proposes an underwater target detection method based on attention mechanism. According to the most representative visual attention model (Itti model), in the feature extraction stage, this paper introduces the multiscale Retinex algorithm to restore and enhance the images’ color information. Through the experiment to get a suitable enhancement factor of the multiscale Retinex algorithm, this paper constructs a new suitable target detection method for the specific underwater environment. Experimental results show that the algorithm can effectively detect the target and complete target areas can be obtained.
Application of Morphology in Image Processing
WU Ying
2013, 1(5): 90-94. doi:
10.3969/j.issn.1006-2475.2013.05.021
Asbtract
(
412
)
Related Articles
|
Metrics
Mathematical morphology method based on the idea of set theory, which can describe the shapes and structures of images quantitatively, and has been widely used in the field of graphics and image processing, it is an effective method for geometric morphological analysis. This paper first introduces the concepts and definitions of mathematical morphology, and analyses several types of basic morphological operations in detail, then studies the structure and property of morphological filters, and applies it to the denoising processing of fingerprint image, after that, each of the processing steps and results are analyzed, showing that the good performance of morphological methods in image denoising.
信息安全
Classification Research on Vulnerablilities of C/C++ Programs in Visual of Safety
WANG Ya-li;LI Jian-liang
2013, 1(5): 95-98,1. doi:
10.3969/j.issn.1006-2475.2013.05.022
Asbtract
(
365
)
Related Articles
|
Metrics
C/C++ language aims to provide high efficiency and flexibility, however, it also brings some safe holes such as memory leak, invalid pointer reference and so on at the same time, which becomes a great threaten to the security of the system. The taxonomy of computer vulnerabilities can result in an increased understanding of the nature of software vulnerabilities, which contributes to detecting and eliminating them respectively. Based on the analysis of large numbers of security vulnerabilities, this paper gives a method about how to classify the security vulnerability in the C/C++ language, which provides the basis for the construction of safe rules checker and the guidance for the development of software security.
An Improved Group Blind Signature Scheme
WAN Zhong-bao;JI Miao-wei
2013, 1(5): 99-102. doi:
10.3969/j.issn.1006-2475.2013.05.023
Asbtract
(
392
)
Related Articles
|
Metrics
Aiming at the classic LR98 group blind signature scheme, this paper analyses its security and efficiency, then finds that LR98 scheme uses fixed value l as security parameter, this leads to the group public key and signature length having linear relationship with the size of group, so its calculated complex degree, space complex degree and communication complex degree have linear relationship with l, therefore the original scheme efficiency is low. The improved scheme proposed in this paper improves efficiency by selecting new security parameter.
Secure Incentive Mechanism of DTN Pub/Sub Multicast Protocol
LIU Shi-jun;CAO Zhen-fu
2013, 1(5): 103-107. doi:
10.3969/j.issn.1006-2475.2013.05.024
Asbtract
(
319
)
Related Articles
|
Metrics
The delay-tolerant networks are a kind of novel network architecture composed with mobile devices. Recent research has proposed lots of routing protocols for it. However, most of them lack of secure schemes and incentive mechanism. Combining the Spray & Wait routing algorithm, the paper proposes a novel secure scheme and incentive mechanism suitable to the DTN Pub/Sub multicast protocol. By the analysis and simulation, it shows that mechanism can effectively courage the DTN nodes to relay packages for others with Spray & Wait algorithm, and can effectively protect the networking from multiple kinds of attacks such as flooding.
网络与通信
Load Schedule Strategy of Streaming Media Cluster Server Based on Response Times Estimation
WANG Fang;WANG Wei
2013, 1(5): 108-111,. doi:
10.3969/j.issn.1006-2475.2013.05.025
Asbtract
(
368
)
Related Articles
|
Metrics
As the application of streaming media increases exponentially, it is more and more important to improve the performance of streaming server. The paper proposes a load schedule strategy of streaming media server cluster, which comprehensively applies the multi-stage fuzzy system and the technique of artificial neural network to carry on fuzzy prediction for the user request of response delay, as considering prefix caching and patch prefetching technology of the streaming media programs of the node server, proposes the load schedule algorithm based on the threshold value of response delay and the caching situation of requesting streaming program at the node server, and takes the simulated test to it.
Design and Implementation of Network Service Fault Management System
WANG Wen;CUI Peng-shuai;LI Qiang
2013, 1(5): 112-116. doi:
10.3969/j.issn.1006-2475.2013.05.026
Asbtract
(
262
)
Related Articles
|
Metrics
As the quantity and category of the network service explosively grow, the problem of network service management is getting more prominent. The research of this paper focuses on network service management which is above network layer. The hierarchical network service fault management system based on correlation graph and case base is designed and implemented. The architecture design and several efficient ways to get fault information are concretely introduced. A selfadjusting threshold algorithm is proposed. After that, the primary event correlation and network fault diagnosis are analyzed briefly. Finally, the concrete architecture and each functional modules are realized.
Design and Implementation of Network Virtual Experiment System Based on B/S Mode
CUI Yang;CHEN Guang;SHEN Jia
2013, 1(5): 117-120. doi:
10.3969/j.issn.1006-2475.2013.05.027
Asbtract
(
378
)
Related Articles
|
Metrics
Using .NET controls technology and C# program language, this paper designs and achieves a virtual experiment system of network server based on B/S mode. Students don’t need to enter the real lab., they can finish the online autonomous server configuration experiments only through the Web browser. This paper introduces the design and application process of the virtual experiment system.
Application of Desktop Virtualization Technology in Network Security Access of Public Security Colleges
CHEN Xuan-hua;LI Xue-ya
2013, 1(5): 121-123. doi:
10.3969/j.issn.1006-2475.2013.05.028
Asbtract
(
355
)
Related Articles
|
Metrics
Aiming at the problem how to make full use of the public security network and Internet resources in the public security colleges, especially the safety of data sharing and exchange between campus network and the public security network. This paper introduces security access structure based on the desktop virtualization technology. Using virtualization technology realizes campus network and public security network connected really and isolated logically. The paper puts forward the four aspects of the safety measures including multiple authentication and multistage authority access control, deploying data encryption system, setting security gateway and building the perfect audit system. These measures realize the sharing of resources safely.
Design of Remote Wireless Monitoring System of Vegetable Greenhouse Based on 3G/ZigBee
WU Xin-sheng
2013, 1(5): 124-126. doi:
10.3969/j.issn.1006-2475.2013.05.029
Asbtract
(
383
)
Related Articles
|
Metrics
A remote wireless realtime monitoring system in the vegetable greenhouse is designed. The system is composed of monitors’ terminal, gateway’s node and monitor’s center. The data acquisition of environmental parameters is implemented by wireless sensor network with ZigBee communication protocol in monitors’ terminal nodes. The wireless sensor network is composed of ZigBee module whose core is CC2533 module. The data aggregation function is implemented in server sides who is developed with the microprocessor PXA270 of ARM10 and Linux operation system. The ZigBee network is used to aggregate data from monitors’ terminal nodes and the 3G wireless communication network is adopted to realize the remote data transmission function.The adoption of ZigBee technology and 3G technology satisfied the requirements of wireless data acquisition and data transmission for environmental parameters of vegetable greenhouse.At the same time, the problems are effectively solved including wiring problems, nodes’ immobility and system maintenance difficulties. The proposed system is suitable for environmental parameters’ monitoring of the vegetable greenhouse.
Research on Data Fusion of Low-speed Single Moving Target in Wireless Sensor Networks
DENG Hui-mei;LI Jing-zhao
2013, 1(5): 127-130. doi:
10.3969/j.issn.1006-2475.2013.05.030
Asbtract
(
345
)
Related Articles
|
Metrics
In order to improve the efficiency of data fusion in wireless sensor network, reduce the energy consumption of sensor nodes, a kind of combined with dynamic clustering and static clustering technique network strategy is put forward. It overcomes the shortage of the traditional only static clustering or dynamic clustering technique. According to analyze and comparison the election of cluster head and detection environment parameters of target, it can reduce network hop count, reduce the data transmission, achieve the balanced use of energy and also prolong the lifetime of network. Its network data fusion performance is to the best in the state of low-speed single moving target.
Research on Channel Estimation and Detection Method of OFDM System
GONG Song;LIU Li
2013, 1(5): 131-134. doi:
10.3969/j.issn.1006-2475.2013.05.031
Asbtract
(
342
)
Related Articles
|
Metrics
In order to ensure the validity and reliability of communication, it’s necessary to know the channel state information(CSI) of orthogonal frequency division multiplexing (OFDM) system. This paper proposes a method to dectect the state information for channels, based on the pilotsymbolaided estimation in OFDM systems. The experiment results show that the method can efficent evaluate the state of channels by finding out appropriate parameters of CSI.
Design and Reliability Analysis of Dissimilar Redundant Flight Control Computers
ZHOU Xiao-chao;LU Xiong
2013, 1(5): 135-137. doi:
10.3969/j.issn.1006-2475.2013.05.032
Asbtract
(
345
)
Related Articles
|
Metrics
Redundancy fault-tolerant technology has emerged and developed with the need of computer system reliability. In order to avoid the correlated faults and realize the performance indexes of flight control computers, the architecture of the dissimilar dual-redundancy flight control computer system is researched. Generalized stochastic Petri net (GSPN) is applied to set up the model of flight control computer system, Markov is used to calculate and analyze the reliability of the system. And practical research approach is proposed based on the analysis results.
Research and Application of Key Technology of Hadoop
XIA Da-wen;RONG Zhuo-bo
2013, 1(5): 138-141,. doi:
10.3969/j.issn.1006-2475.2013.05.033
Asbtract
(
343
)
Related Articles
|
Metrics
According to actual demand of the opensource general cloud platform, this paper briefly analyzes cloud computing system structure and basic architecture, and researches on the key technology of Hadoop in-depth, proposes a Hadoop-based cloud computing model, builds a platform and successfully realizes its application. Experiments show that the platform has good massive data distributed computing and processing performance and can meet the needs of cloud computing application and research for the small and medium-sized enterprises or scholars.
Design and Implementation of Restaurant Service System Under Internet of Things Environment
WANG Zhen;WU Fang;LU En-rong;LIAO Hai-lin;CHEN Zhen-jian
2013, 1(5): 142-144,. doi:
10.3969/j.issn.1006-2475.2013.05.034
Asbtract
(
396
)
Related Articles
|
Metrics
With the improvement of people’s living standard and life transitions, catering industry has great investment market, it is known as the gold industry in China. On the tip of the tongue things networking system using the wireless network technology as information communication bridge, which can improve the grade of restaurant, improve work efficiency, avoid run single, realtime monitoring restaurant status, provide various statistical information, improve the service quality, etc., It brings catering industry new management idea and service methods, optimizes business process, provides customers with better quality of service. This paper designs a restaurant service system under Internet of things environment, it completes cell phone book, field PAD(tablet PC) choose a dish, RFID recognition, kitchen display terminal and server data processing and management related functions. To realize the maximization of enterprise value at the same time and minimization of cost is an important sign of the food industry information development.
应用与开发
Design and Implementation of Embedded Cognitive Radio Platform
WU Jia;CHEN Shao-ping;RAO Wen-gui
2013, 1(5): 145-148. doi:
10.3969/j.issn.1006-2475.2013.05.035
Asbtract
(
329
)
Related Articles
|
Metrics
In order to study and verify cognitive radio techniques and algorithms, an embedded cognitive radio platform is proposed. The platform uses dual-processor architecture of ARM+FPGA. It is divided into three parts of RF, baseband processing and embedded control. As main processor, ARM runs the embedded Linux system and is responsible for the work of system control as well as the work of interaction. As data processing core, FPGA is responsible for the baseband signal processing, algorithms and RF module configuration. The platform is used flexibly with LCD touch screen. It can work without PC. It provides a good hardware platform for the study of the cognitive radio technology.
Visual Solution of System of Linear Equations Based on Mathematica
WANG Fu-gui;HOU Jian-wen
2013, 1(5): 149-154. doi:
10.3969/j.issn.1006-2475.2013.05.036
Asbtract
(
491
)
Related Articles
|
Metrics
Functions of elementary row operation of matrix, row reduced echelon matrix, augmented matrix, and visual solution of system of linear equations, are programmed in Mathematica 7.0 environment. Then two types of usages of the function of visual solution of system of linear equations are also discussed: users who are familiar with Mathematica 7.0 can input function with parameters to solve the system of linear equations; while any users can conveniently input the number of equations and variables, and augmented matrix after inputting function without parameters, and finally the process and general solution of the system of linear equations are output just by clicking solution button.
Design and Implementation of Universities’ Project Management System Based on JSF and JPA Framework
LIANG Zhi-xue
2013, 1(5): 155-158,. doi:
10.3969/j.issn.1006-2475.2013.05.037
Asbtract
(
350
)
Related Articles
|
Metrics
This paper analyzes the current situation of project management in universities, proposes an integrated framework technology of JSF and JPA. Based on J2EE and integrated framework technologies, a project management system is constructed. 〖JP2〗Now, this system has been running in Nanyang Institute of Technology. Using university’s project management platform, it can avoid some disadvantages of manual management, and greatly improve the efficiency and quality of universities’ project management.
Design and Implementation of Food Safety Supervision Management System Based on WebGIS
ZHANG Sheng;ZHANG Zhao;HUANG Liang
2013, 1(5): 159-162. doi:
10.3969/j.issn.1006-2475.2013.05.038
Asbtract
(
380
)
Related Articles
|
Metrics
In recent years, accidents of food safety have occurred frequently in our country. Food safety problems are increasingly becoming the focus of concern. The existing traditional way of supervision can not meet the requirements of the public increasingly. This paper proposes a geographic information system applied to food safety field, combined with Web technology designs and realizes the food safety supervision management system of Nanchang. It solves the problem about few officials but many supervision enterprises and improves the efficiency of supervising and managing the food safety. The effectiveness of the proposed system is demonstrated.
Wiki Technology and Its Application in Enterprise Knowledge Management
LI Xiao-yan;TANG Zhi-yong
2013, 1(5): 163-166,. doi:
10.3969/j.issn.1006-2475.2013.05.039
Asbtract
(
327
)
Related Articles
|
Metrics
In the knowledge economy era, successful knowledge management is the key of enterprise to gain competitive advantages. However, traditional knowledge management tools are hard to realize the development and utilization of tacit knowledge. To solve this problem, this paper constructs a knowledge management platform based on Wiki, by which users can be scattered, collaborative to create and manage enterprise knowledge, realizing the conversion of tacit knowledge and explicit knowledge, constructs an enterprise product design navigation system through the association of knowledge and product information in Wiki platform. Finally the paper illustrates the application of the platform by an application example which provides an important reference to improve the ability of enterprise to solve actual problem.
Design and Implementation of Enterprise Generic Process Module Under FileNet Platform
TONG Ya-juan
2013, 1(5): 167-171. doi:
10.3969/j.issn.1006-2475.2013.05.040
Asbtract
(
303
)
Related Articles
|
Metrics
With the fast development and the advancement of computer technology, more and more enterprises are paying much attention to business process management (BPM), especially in fierce competition. Traditional processes management seems rather cumbersome. With the trends that enterprises structures are becoming complex, lowercost and efficiency of business process management based on B/S make it more necessary for enterprises especially those which have complicated organizational structures. This article introduces the design and implementation of a generic process module which is based on FileNet platform. The process of editing, checking and reviewing can run automatically. This module applies Lotus Forms to design the forms. The module supports the storage of documents (also called content) about the process and the user can start a process with the content.
Research on Web Biological Information Extraction Method Based on Ontology
HE Yuan
2013, 1(5): 172-175. doi:
10.3969/j.issn.1006-2475.2013.05.041
Asbtract
(
294
)
Related Articles
|
Metrics
Aiming at the malpractice in traditional search field based on keyword and data retrieval, this paper proposes a Web information extraction framework based on ontology. Firstly, the framework obtains the Web page which is converted into a wellformed HTML document, secondly, the document is turned into the DOM tree by making use of the HTML parser, then, the extraction rules is achieved on the basis of the users’ interest data block which is obtained according to the XPath expression. Finally, the data is extracted through the OntPMatch algorithm, and is stored in RDF data format. The paper makes the empirical study using the cotton information as research object, and realizes a prototype system of extracting biological information data. The paper provides a useful tool for users to obtain valuable biological information from Web.
Research and Application of Multiple Coverage-oriented Combined with Assertions FPGA Verification Method
YANG Peng-fei;FU Xiu-feng
2013, 1(5): 176-180. doi:
10.3969/j.issn.1006-2475.2013.05.042
Asbtract
(
406
)
Related Articles
|
Metrics
First, this paper introduces verification method for FPGA based on multiple coverageoriented combined with assertions, then with the functional verification of a bus arbiter module as background, verification strategy and verification plan for FPGA bus arbiter module is established, the method of multiple coverage-oriented combined with assertion is adopted to verify the bus arbiter module. The experimental results show that verification method for FPGA based on kinds of coverage combined with assertion can ensure the adequacy of the verification of and shorten the time of functional verification.
Research on Cross-language Flex Application Framework Based on Thrift
WU Zhou
2013, 1(5): 181-185. doi:
10.3969/j.issn.1006-2475.2013.05.043
Asbtract
(
332
)
Related Articles
|
Metrics
This paper introduces the features of Flex and its situation which is a RIA development technology, points out some weakness of Flex in software development, that is Flex application is lack of scalability. Meanwhile, the paper analyses the features and advantages of the cross-languages service deployment framework Thrift technology. Combining the characteristics of Flex and Thrift, this paper designs a Flex application framework based on Thrift which is a scalable cross-language services implementation by use of SOA methodology. This paper uses a specific example to further explain this framework and to prove this framework has many features, such as scalable, efficient etc.
Construction of Front-end Presentation Layer Framework Based on Mixed-model
LEI Ming
2013, 1(5): 186-191. doi:
10.3969/j.issn.1006-2475.2013.05.044
Asbtract
(
344
)
Related Articles
|
Metrics
In the environment of front-end development, using design pattern reasonably can optimize the application development method, and improve the efficiency of Web application development. For a low degree of automation and accuracy of service discovery in the current situation, this paper proposes a mixed-model presentation layer architecture which integrates several classic design models into an improved pattern to separate the presentation model the composite member from view layer, transfer of the message among composite components and modules effectively, and encapsulate business logic processing models. The results illustrate that based on this architecture it can easily code and manage the presentation project. Once more, it provides another design idea and implementation to develop the architecture in application.
Analysis and Research on Online Concurrent Processing Capability of Core Business of Commercial Banks
WANG Gang;ZHU Hong-xia
2013, 1(5): 192-196. doi:
10.3969/j.issn.1006-2475.2013.05.045
Asbtract
(
381
)
Related Articles
|
Metrics
Concurrent processing capability is the number of online transactions of online realtime processing system at the same time, concurrent processing for different applications is of different indicators, associated with the physical capacity of application system at the same time. In addition, concurrent processing capability is also closely associated with the complexity of business application system. Commercial bank financial information system mainly includes card business, discount business, exchange, inquiry, product management, finally, fixed units, parameter management, access management, front subsystems such as counter channel, the analysis of online concurrent processing capability of the above business can determine the technology parameters of configuration properties such as system host, storage, network equipment, firewalls, LAN switches, which is of reference value to the commercial bank information system construction.
Study on Dynamic Interface Layout for Android Application
LIU Chang-ping;LIU Yang;CHEN Jia-shi;
2013, 1(5): 197-200. doi:
10.3969/j.issn.1006-2475.2013.05.046
Asbtract
(
417
)
Related Articles
|
Metrics
Multi-media information distribution is needed dividing visible screen area into several parts at random. A new method of dynamically deploying Android application interface is proposed to meet this requirement. This method creates dynamically separate window for each part in screen to output text, picture, audio or video file. Experiment illustrates this method not only supports arbitrary division of the screen area, but also supports the display between the different windows, adapts for information distribution on cell phone, tablet PC and other Android devices.
A Method of Speaker Acoustic Features Optimal Selection Based on Greedy Strategy
CHEN Jue-zhi;ZHANG Gui-rong;ZHOU Yu-huan
2013, 1(5): 201-205. doi:
10.3969/j.issn.1006-2475.2013.05.047
Asbtract
(
354
)
Related Articles
|
Metrics
In order to improve the performance of speaker recognition, a method for optimal speaker acoustic features selection is proposed, using greedy algorithm to select some dimensional features from a large dimensional feature set in turn. The recognition rate is increased by 1.6% on pure voice than traditional method and by 6% on noisy voice, the recognition speed is increased about 5 times in experiments based on TIMIT. The experiment results show that the optimal selective features which eliminate disturbance of other redundant features can effectively improve both the recognition accuracy and the computational speed on the speaker recognition system.
Design of Frequency Synthesizer Model Based on Matlab/Simulink
HAO Lian-xiu;WANG Hao-xuan;ZHANG Liang
2013, 1(5): 206-210. doi:
10.3969/j.issn.1006-2475.2013.05.048
Asbtract
(
538
)
Related Articles
|
Metrics
Phase locked loop (PLL) is performed as the source of the wireless communication system to complete modulation, demodulation, spectrum transform and so on. As a typical negative feedback system, the system level design and parameter selection directly determine the quality of PLL. In this paper, a behavioral model of phase locked loop based on Matlab/Simulink is proposed. Through the dynamic simulation, beginners can quickly master the working principle of the PLL, understand the tradeoff between loop bandwidth, phase margin and the setting time, provide guidance for circuit design.
A Practical Path Planning Scheme of Highway
XU Xiao-feng;LI Han-xuan
2013, 1(5): 211-214. doi:
10.3969/j.issn.1006-2475.2013.05.049
Asbtract
(
310
)
Related Articles
|
Metrics
The optimization of route is essential to highway maintenance when highway company facing with emergency. But, problems such as traffic control and settings of entrances and exits make it difficult to achieve. This paper proposes a functional design about the path planning system. This system uses the effective forward star structure to store the topology structure of highway network, and the impedance model of highway is based on the BPR Function. This paper combines the network model and the Dijkstra algorithm to get the optimal path on highway. Finally, this paper achieves the goal of the scheme by the secondary development of MapX with VC++.
Personalized Data Reusing Method Based on REST
WEI Wei
2013, 1(5): 215-218. doi:
10.3969/j.issn.1006-2475.2013.05.050
Asbtract
(
340
)
Related Articles
|
Metrics
An REST-based personalized data reusing method is proposed, which supports user data reusing in different applications and different platforms, efficiently supports personalized requirement. This method uses REST as software architecture style and XML Schema to define data format. Heterogeneous processing methods of different data formats are studied. This paper also implements a prototype system and verifies the possibility and validity of this new method.
Research on Failure Prediction Technology Based on Time Series Analysis and ACO-LSSVM
LIU Hai-yan;JIANG Ze-jun
2013, 1(5): 219-222,. doi:
10.3969/j.issn.1006-2475.2013.05.051
Asbtract
(
288
)
Related Articles
|
Metrics
The traditional prediction method of mechanical equipment failure rate is of lower accuracy, it is unable to adapt the demand of modern equipment maintenance. This paper proposes a novel PHM algorithm based on ACO and LSSVM algorithms. Using time series analysis prediction method to calculate seasonal factor and combining with ACOLSSVM algorithm to model the failure rate of an aviation device, a good experimental result is obtained, and the comparative analysis of predicted result and actual result is given.
Design of E-government System Architecture Based on IFW
HOU Hong-feng;WANG Yan;HE Dan-dan
2013, 1(5): 223-226. doi:
10.3969/j.issn.1006-2475.2013.05.052
Asbtract
(
303
)
Related Articles
|
Metrics
In order to solve the issues of the network separation, “information island”and the scattering of information in the construction of E-government system, the article references the IBM’s information framework(IFW) to design the E-government system architecture. This frame describes the system structure and development processing of the information system from the view of technology and management. It is of very vital significance for promoting the construction of E-government system in our country.
Design and Implementation of RF Card Read/Write System Based on MSP430
ZOU Fang-wei;SONG Gao-jun;SONG Cai-hua
2013, 1(5): 227-130,. doi:
10.3969/j.issn.1006-2475.2013.05.053
Asbtract
(
289
)
Related Articles
|
Metrics
A T5557 RF card system based on microcontroller MSP430 is developed. In order to achieve low cost, low power consumption and high reliability requirements of instrumentation applications, this paper uses microcontroller on-chip peripherals to generate 125kHz signal, which is amplified by power and modulation to provide power and data for RF card; While taking advantage of the on-chip timer measuring RF card returns signal pulse width to decoder card to return data and achieve RF card read/write function. By applying this design in the prepaid calorimeter, the system successfully achieves such as data exchange recharge and maintenance etc functions; by experiment, it fully meets the requirements of performance, cost and power of instrumentation system.
Research on Network Community-finding Method on Complex Network Based on Similar Network Node Clustering
ZHENG Feng-ni
2013, 1(5): 231-234. doi:
Asbtract
(
316
)
Related Articles
|
Metrics
According to the problems of community-finding on complex networks, this paper detailed studies the clustering method to it, changes the data structure of the network node into that of clustering algorithm, amalgamating or partitioning nodes according to the similarity of nodes, and uses the vector method to measure the similarity of complex network nodes. The improved algorithm makes each node on network as a source having sending and receiving messages function, transfers and traverses similarity value according to the improved information transmission method, uses Karate club network commonly uses on complex network as verification of the experimental object. It improves the efficiency of community-finding on complex networks.
A Method of Determining Differentiation Degree Value of Test Paper
XUE Dong;FENG Chao-ying;FENG Kai-ping
2013, 1(5): 235-238. doi:
10.3969/j.issn.1006-2475.2013.05.055
Asbtract
(
345
)
Related Articles
|
Metrics
The differentiation degree in test paper decides the test questions’ quality and the test’s effectiveness. Traditional differentiation degree in test paper adopts artificial visual observation method or high and low scores statistical discrete method, and so on. The test accuracy may be not high in these ways, or the operation process is very long. This paper proposes a method of Logistic model slope differentiation degree. According to the distribution of tester’s ability, its curve graph can be represented by VB program in the sensitive area of Logistic model slope, then it can obtain the test’s differentiation degree. It is concluded that regardless of operating speed or accuracy, it is much better than traditional statistical method.