Loading...

Table of Content

    28 May 2013, Volume 1 Issue 5
    算法设计与分析
    An Efficient Query Processing Algorithm Based on Time Slice Fitting on Wireless Sensor Networks
    TAN Ai-ping;CHENG Ya-ling
    2013, 1(5):  1-6.  doi:10.3969/j.issn.1006-2475.2013.05.001
    Asbtract ( 310 )  
    Related Articles | Metrics
    On data-centric distributed sensor network, users often submit queries about the interested sensing region such as gathering the data in region F during a specified period of time. In order to enhance monitoring accuracy, sensor networks rely on high density deploying node and sampling frequency, so there are lots of redundant data. Therefore, guaranteeing querying data accuracy and reducing energy consumption of transmitting redundant data are an urgent problem to be resolved at present. This paper proposes an single node sensor data time slice fitting algorithm, the proposed algorithm can balance the energy consumption of node in query region; secondly, an slice model fitting algorithm, which can find optimal fitting model sets meeting the error threshold in querying time. Combining the above tow algorithms, this paper finally proposes an efficient and confidence query processing algorithm based on spatial-temporal correlations, theoretical and experimental results show that this method can return high confident querying results and is energy efficient.
    算法分析与设计
    Eigenvector Selection Algorithm for Spectral Clustering Based on Mean
    WANG Sen-hong;DAI Qing-yun;CAO Jiang-zhong;ZHU Jing
    2013, 1(5):  7-9.  doi:10.3969/j.issn.1006-2475.2013.05.002
    Asbtract ( 385 )  
    Related Articles | Metrics
    Spectral clustering is one of the most popular methods for data clustering, and its performance is determined by the quality of the eigenvectors of the related graph Laplacian matrix. For a K clustering problem, Ng-Jordan-Weiss(NJW) spectral clustering method adopts the eigenvectors corresponding to the K largest eigenvalues of the Laplacian matrix derived from a dataset as a novel representation of the original data. However, these K eigenvectors can not always reflect the information of the original data for some classification problems. This paper proposes an eigenvector selection method for spectral clustering. First this method calculates the mean of the 3K largest eigenvalues from Laplacian matrix, and then select K eigenvectors whose eigenvalues are the nearest the mean eigenvalue. Experiments show that it can get better cluster results on UCI datasets and obtain more satisfying performance than classical spectral clustering algorithms.
    算法设计与分析
    Top-k Shortest Path Query Algorithm Based on Tree Decomposition Structure
    CHONG Hao-min;CHEN He
    2013, 1(5):  10-15.  doi:10.3969/j.issn.1006-2475.2013.05.003
    Asbtract ( 411 )  
    Related Articles | Metrics
    Based on the principle and property of tree decomposition, this paper converts a graph into a tree structure using a heuristic tree decomposition method. It preprocesses the decomposition tree and stores the index for further Top-k shortest path query. Through the solving of constraint path query in tree decomposition(Top-1 shortest path query) , Top-k algorithm computes the first topk shortest path one by one. It applies tree decomposition method into Yen algorithm. Though Top-k algorithm don’t optimize the worst case time complexity, it can recursively compute the shortest path efficiently through using the stored index. Proved by experiment, Top-k algorithm based on tree decomposition is faster than Yen algorithm, and the size of index is acceptable.
    Study on Airport Surface Conflict Detection Algorithm Under ADS-B Surveillance
    ZHANG Rui;ZHANG Yong;ZHANG You-hui
    2013, 1(5):  16-18,2.  doi:10.3969/j.issn.1006-2475.2013.05.004
    Asbtract ( 338 )  
    Related Articles | Metrics
    ADS-B is an important surveillance technology which is recommended by ICAO, it can be used for route and airport surface surveillance. This paper puts forward a shortterm airport surface conflict detection algorithm based on ADS-B highprecision surveillance data. This algorithm analyzes the conflict scenarios on the airport surface, detectes the runway incursion by areadivided and the taxiway or apron conflict by computing the estimate conflict time and distance between two airplanes, finally a conflict detection simulation program is used to verify the effectiveness of the algorithm.
    Research on Data Skew Join Algorithm Based on MapReduce Model
    JIN Jian;CHEN Qun;ZHAO Bao-xue
    2013, 1(5):  22-27.  doi:10.3969/j.issn.1006-2475.2013.05.006
    Asbtract ( 367 )  
    Related Articles | Metrics
    The study of join algorithm based on MapReduce is a hot topic in massive data research area. However, most current optimization work is based on the assumption that the data are evenly distributed. In practical applications, the data to be processed are often skew in distribution. This paper proposes a MapReduce join algorithm called Skew Control Join, which is adaptive for serious skew data. The algorithm gets the overall data distribution by sampling, then partitions the data by total partitioner to distribute the data evenly to all Reduce tasks. Experiment results show that the algorithm is of good performance when the processed data are skew.
    计算机仿真
    Design and Implementation of Skeletal Animation for Marine Life System Based on VTF
    SONG Li-li;TIAN Feng-lin;CHEN Ge
    2013, 1(5):  28-31,4.  doi:10.3969/j.issn.1006-2475.2013.05.007
    Asbtract ( 330 )  
    Related Articles | Metrics
    Most data formats of skeletal animation are not suitable for high performance system, because they aim at data exchange and have low speed of the loading and parsing. In addition, due to the limited number of constant registers, GPU cannot be utilized fully. This paper presents an optimized scheme for data management and rendering of the skeletal animation. Firstly, in data preprocessing stage the system converts the FBX data format into data format which it employed. Secondly, in rendering stage, a GPU-accelerated approach based on VTF (Vertex Texture Fetch) technology is used by pre-creating the matrixes of bones, weights and offsets into the textures to reduce the bandwidth of communication between CPU and GPU. The paper finally realizes the simulation system of skeletal animation for marine life.
    Research on Realization of Disaster Scene Based on Unreal 3 Engine
    WANG Le;GENG Lu;TANG You-chun
    2013, 1(5):  32-35,4.  doi:10.3969/j.issn.1006-2475.2013.05.008
    Asbtract ( 359 )  
    Related Articles | Metrics
    With natural disasters or man-made disasters occurring frequently, a lot of game designers hope in the design of virtual disaster scenes to increase people’s consciousness of disaster prevention and self and mutual rescue. The requirements to produce the disaster scene are put forward, to improve the immersion feeling of the game players. This paper implements the strong assembly functions of mainstream Unreal 3 engine visualization of Unreal Development Kit (UDK) to show the disaster scene, and realizes the production of volcanic eruption, lava flow and thick smoke effect.
    Research on Modeling and Simulation for High-speed Switch Fabric
    ZHENG Ruo-yi;CHEN Wen
    2013, 1(5):  36-40.  doi:10.3969/j.issn.1006-2475.2013.05.009
    Asbtract ( 316 )  
    Related Articles | Metrics
    When researching on the performance of switch fabric and scheduling algorithm, simulation test has such character as low cost, flexibility, reliability, simplicity of being compared. This paper analyzes traffic pattern, high-speed switch fabric and typical scheduling algorithms. As to the system, the object-oriented design method is applied and described with UML, which constructs reconfigurable and scalable simulation software.
    数据库
    Design of Broadband Billing System Based on SSH Framework
    JI Xiao-juan;SHEN Yu-li;ZHANG Lei
    2013, 1(5):  41-46.  doi:10.3969/j.issn.1006-2475.2013.05.010
    Asbtract ( 375 )  
    Related Articles | Metrics
    Broadband billing system takes the open, advanced Intranet/ Web technology as the core of a new generation of information processing integrated system. Using SSH framework, the system realizes the sharing of information resources and circulation. It provides convenient and efficient service for leaders at all levels to understand the situation in time, macroeconomic management and scientific decisionmaking. Different departments and individuals have different information access privileges, and employees can grasp dynamic information of all aspects, which improves working conditions and achieves the efficiency, standardized, scientific and platform of the unit’s management. The system completely meets the needs of users; users can planning and establish the all broadband operators’ content with their own ideals. According to the units of information management needs, it uses the commercialization of product price to sure users enjoying a tailor made service; with the changes of the information management needs, administrators can increase or adjustment broadband operators system structure and user rights on their own.
    Research and Implementation of Distributed Heterogeneous Database Transparent Access System
    WANG Ya-lan;TAN Xian-hai;ZHAO Jin-ling
    2013, 1(5):  47-51.  doi:10.3969/j.issn.1006-2475.2013.05.011
    Asbtract ( 396 )  
    Related Articles | Metrics
    With the quickly development of enterprise informationized, it is urgently required to study a distributed heterogeneous database transparent access system with low price, high efficiency and high reusability. Conbing with the current data integration and access to technology, this paper proposes a way to establish the distributed heterogeneous database transparent access system by using middleware architecture, virtual database strategy and XML as a means of data interchange, aiming to develop a database transparent access system that is easy-to-use, high efficiency, and transplanted reusable. The system has been used in the digital simulation platform of high-speed trains, and the experimental results show that the scheme is an optimal solution.
    Property and Query Optimization of Temporal Paraconsistent Database
    HUANG Hui
    2013, 1(5):  52-56.  doi:10.3969/j.issn.1006-2475.2013.05.012
    Asbtract ( 295 )  
    Related Articles | Metrics
    In order to deal with the incomplete and contradictory information in data over time, the academia proposes a data model basd on temporal paraconsistent database. Based on this model, this paper preliminary discusses and gives the related properties of relational operators, and according to the established relationship between certain properties of operators the query language is optimized, so as it improves the query speed.
    控制技术
    Control Technology of Network File System Access Rate Based on Network QoS Management Layer
    ZHANG Xi;LIN Yi;WANG Hui-wen;ZHANG Yan-yuan
    2013, 1(5):  57-61.  doi:10.3969/j.issn.1006-2475.2013.05.013
    Asbtract ( 343 )  
    Related Articles | Metrics
    CA-NFS meets the requirement of the QoS of NFS for different applications by delaying or accelerating the application of the file operations. It achieves good performance. However, it does not consider the impaction of the network delay jitter of NFS packets. This paper designs and implements a module for managing QoS, offers the guarantee ablility for the QoS of NFS with less cost by exploiting the existing mechanisms of CGroup and QoS of Linux. From the experimental results, the improved NFS reduces the range of delay jitter of network packets. Its performances better than before. It provides a certain of capability for assuring the QoS of NFS.
    Design of Control Terminal for Field Drip Irrigation Based on ZigBee Wireless Network
    LIU Xiang;YANG Hong-ying;QU Xing-hua;ZHANG Dong;LI Bo
    2013, 1(5):  62-65,6.  doi:10.3969/j.issn.1006-2475.2013.05.014
    Asbtract ( 326 )  
    Related Articles | Metrics
    Bring ZigBee technology into automatic control system of drip irrigation in field, making every controller terminal of system in field has capability of ZigBee communication, and founds a wireless Ad-hoc network in field, in order to remote control and collect system state. It is an energy saving plan in drip irrigation. So, design of a perfect function and high efficient ZigBee terminal controller is an indispensable and important link for large field drip irrigation. This paper gives a scheme of control terminal based on ZigBee wireless network, designs the controller hardware, software, and meets the requirements of large field drip irrigation. It makes the ZigBee wireless network in the drip irrigation technology better application.
    图像处理
    Study on Real-time Tablets Image Detection and Processing System Basedon Image Processing and Its Application
    LIU Sheng-xiao;
    2013, 1(5):  66-69.  doi:10.3969/j.issn.1006-2475.2013.05.015
    Asbtract ( 306 )  
    Related Articles | Metrics
    On the automatic packaging lines which uses the aluminum-plastic blister packaging machine, in the tablets packaging process, tablet plate often appears empty, unqualified tablets(such as unfilled tablet, impurities, fragments, sticky tablets). Aiming at this problem, the paper develops a real-time tablets image detection and processing system by using the VC image processing technology. It is mainly used to detect unqualified tablets and tablet images detect with the improved median filtering, the difference image method, then classifies tablets with image identification and classification. This paper is more effect than traditional median filtering in getting rid of salt and pepper noise, it can resolve the defect of the gray cross between pills and pills, in the process of real production. It has detection ratio of 90% for tablet board which contains unqualified tablets(such as unfilled tablet, impurities, fragments、sticky tablets),meets the needs of actual production.
    Face Feature Extraction Based on Fast 2D-DCT Algorithm
    LIN Jing-liang;LI Zu-yu
    2013, 1(5):  70-72.  doi:10.3969/j.issn.1006-2475.2013.05.016
    Asbtract ( 382 )  
    Related Articles | Metrics
    Discrete cosine transform (DCT) has an advantage that is the image signal processing without affecting image quality. The paper proposes a new algorithm for face feature extraction. The face image is the first segmented in average, and the fast 2D-DCT algorithm instead of common DCT algorithm is used in the stage of feature vector extraction. The new algorithm has been tested, and the result proves that 2D-DCT can reduce most of time for the stage of face recognition or can extract more DCT coefficient than common DCT algorithm. Experimental results show that the proposed algorithm is fast and effective.
    Image Binarization Method Based on Edge Gradient Direction
    PEI Pei
    2013, 1(5):  73-76.  doi:10.3969/j.issn.1006-2475.2013.05.017
    Asbtract ( 434 )  
    Related Articles | Metrics
    As it’s difficult to well separate target from background for images in which background gray level is nonuniform, this paper proposes a new binarization method on the basis of previous work. Combined with Canny edge detection and based on edge gradient direction feature information, the method marks both sides of edge and labels uncertain points by voting to solve the problem of noises and artifacts. Experimental results show that the method works well.
    Underwater Image Fusion Method Based on Wavelet Transforms and Color Transfer
    WU Yu-rong
    2013, 1(5):  77-79.  doi:10.3969/j.issn.1006-2475.2013.05.018
    Asbtract ( 248 )  
    Related Articles | Metrics
    For promoting the development of underwater image subsequent processing technology and overcoming the shortage of traditional polarization image fusion method, this paper proposes a method of underwater polarization image fusion base on wavelet transforms and color transfer. Firstly, extracts the polarization parameters images, degree of polarization and angle of polarization image, in the wavelet domain removes redundancy and fusion exploiting the complementary and redundancy between them, then transmitts the color information of synthetic approximation unpolarized image to the fusion image. The experimental results show that this algorithm not only has good color expression, but also can improve the target detection and recognition.
    Overview of Represent Methods of Image Feature Based on Function Space and Frequency Domain
    SHEN Wei-yan;HUANG Yan;ZHANG Ying
    2013, 1(5):  80-86,9.  doi:10.3969/j.issn.1006-2475.2013.05.019
    Asbtract ( 293 )  
    Related Articles | Metrics
    An observed image which is characterized not only contains the geometric structure, but also may contain noise or texture. Image feature classification and segmentation play an important role in the fields of image processing and pattern recognition (such as de-noising, edge detection and texture segmentation). From the function space and frequency-domain transformation, this paper introduces the represent methods of image feature and compares it, summarizes the advantages and disadvantages of each. At the end, the application area of image feature study is given in personal opinion.
    Underwater Target Detection Method Based on Attention Mechanism
    DONG Xin
    2013, 1(5):  87-89,9.  doi:10.3969/j.issn.1006-2475.2013.05.020
    Asbtract ( 337 )  
    Related Articles | Metrics
    In view of the low underwater optical image resolution and the color distortion in underwater target detection, this paper proposes an underwater target detection method based on attention mechanism. According to the most representative visual attention model (Itti model), in the feature extraction stage, this paper introduces the multiscale Retinex algorithm to restore and enhance the images’ color information. Through the experiment to get a suitable enhancement factor of the multiscale Retinex algorithm, this paper constructs a new suitable target detection method for the specific underwater environment. Experimental results show that the algorithm can effectively detect the target and complete target areas can be obtained.
    Application of Morphology in Image Processing
    WU Ying
    2013, 1(5):  90-94.  doi:10.3969/j.issn.1006-2475.2013.05.021
    Asbtract ( 412 )  
    Related Articles | Metrics
    Mathematical morphology method based on the idea of set theory, which can describe the shapes and structures of images quantitatively, and has been widely used in the field of graphics and image processing, it is an effective method for geometric morphological analysis. This paper first introduces the concepts and definitions of mathematical morphology, and analyses several types of basic morphological operations in detail, then studies the structure and property of morphological filters, and applies it to the denoising processing of fingerprint image, after that, each of the processing steps and results are analyzed, showing that the good performance of morphological methods in image denoising.
    信息安全
    Classification Research on Vulnerablilities of C/C++ Programs in Visual of Safety
    WANG Ya-li;LI Jian-liang
    2013, 1(5):  95-98,1.  doi:10.3969/j.issn.1006-2475.2013.05.022
    Asbtract ( 365 )  
    Related Articles | Metrics
    C/C++ language aims to provide high efficiency and flexibility, however, it also brings some safe holes such as memory leak, invalid pointer reference and so on at the same time, which becomes a great threaten to the security of the system. The taxonomy of computer vulnerabilities can result in an increased understanding of the nature of software vulnerabilities, which contributes to detecting and eliminating them respectively. Based on the analysis of large numbers of security vulnerabilities, this paper gives a method about how to classify the security vulnerability in the C/C++ language, which provides the basis for the construction of safe rules checker and the guidance for the development of software security.
    An Improved Group Blind Signature Scheme
    WAN Zhong-bao;JI Miao-wei
    2013, 1(5):  99-102.  doi:10.3969/j.issn.1006-2475.2013.05.023
    Asbtract ( 392 )  
    Related Articles | Metrics
    Aiming at the classic LR98 group blind signature scheme, this paper analyses its security and efficiency, then finds that LR98 scheme uses fixed value l as security parameter, this leads to the group public key and signature length having linear relationship with the size of group, so its calculated complex degree, space complex degree and communication complex degree have linear relationship with l, therefore the original scheme efficiency is low. The improved scheme proposed in this paper improves efficiency by selecting new security parameter.
    Secure Incentive Mechanism of DTN Pub/Sub Multicast Protocol
    LIU Shi-jun;CAO Zhen-fu
    2013, 1(5):  103-107.  doi:10.3969/j.issn.1006-2475.2013.05.024
    Asbtract ( 319 )  
    Related Articles | Metrics
    The delay-tolerant networks are a kind of novel network architecture composed with mobile devices. Recent research has proposed lots of routing protocols for it. However, most of them lack of secure schemes and incentive mechanism. Combining the Spray & Wait routing algorithm, the paper proposes a novel secure scheme and incentive mechanism suitable to the DTN Pub/Sub multicast protocol. By the analysis and simulation, it shows that mechanism can effectively courage the DTN nodes to relay packages for others with Spray & Wait algorithm, and can effectively protect the networking from multiple kinds of attacks such as flooding.
    网络与通信
    Load Schedule Strategy of Streaming Media Cluster Server Based on Response Times Estimation
    WANG Fang;WANG Wei
    2013, 1(5):  108-111,.  doi:10.3969/j.issn.1006-2475.2013.05.025
    Asbtract ( 368 )  
    Related Articles | Metrics
    As the application of streaming media increases exponentially, it is more and more important to improve the performance of streaming server. The paper proposes a load schedule strategy of streaming media server cluster, which comprehensively applies the multi-stage fuzzy system and the technique of artificial neural network to carry on fuzzy prediction for the user request of response delay, as considering prefix caching and patch prefetching technology of the streaming media programs of the node server, proposes the load schedule algorithm based on the threshold value of response delay and the caching situation of requesting streaming program at the node server, and takes the simulated test to it.
    Design and Implementation of Network Service Fault Management System
    WANG Wen;CUI Peng-shuai;LI Qiang
    2013, 1(5):  112-116.  doi:10.3969/j.issn.1006-2475.2013.05.026
    Asbtract ( 262 )  
    Related Articles | Metrics
    As the quantity and category of the network service explosively grow, the problem of network service management is getting more prominent. The research of this paper focuses on network service management which is above network layer. The hierarchical network service fault management system based on correlation graph and case base is designed and implemented. The architecture design and several efficient ways to get fault information are concretely introduced. A selfadjusting threshold algorithm is proposed. After that, the primary event correlation and network fault diagnosis are analyzed briefly. Finally, the concrete architecture and each functional modules are realized.
    Design and Implementation of Network Virtual Experiment System Based on B/S Mode
    CUI Yang;CHEN Guang;SHEN Jia
    2013, 1(5):  117-120.  doi:10.3969/j.issn.1006-2475.2013.05.027
    Asbtract ( 378 )  
    Related Articles | Metrics
    Using .NET controls technology and C# program language, this paper designs and achieves a virtual experiment system of network server based on B/S mode. Students don’t need to enter the real lab., they can finish the online autonomous server configuration experiments only through the Web browser. This paper introduces the design and application process of the virtual experiment system.
    Application of Desktop Virtualization Technology in Network Security Access of Public Security Colleges
    CHEN Xuan-hua;LI Xue-ya
    2013, 1(5):  121-123.  doi:10.3969/j.issn.1006-2475.2013.05.028
    Asbtract ( 355 )  
    Related Articles | Metrics
    Aiming at the problem how to make full use of the public security network and Internet resources in the public security colleges, especially the safety of data sharing and exchange between campus network and the public security network. This paper introduces security access structure based on the desktop virtualization technology. Using virtualization technology realizes campus network and public security network connected really and isolated logically. The paper puts forward the four aspects of the safety measures including multiple authentication and multistage authority access control, deploying data encryption system, setting security gateway and building the perfect audit system. These measures realize the sharing of resources safely.
    Design of Remote Wireless Monitoring System of Vegetable Greenhouse Based on 3G/ZigBee
    WU Xin-sheng
    2013, 1(5):  124-126.  doi:10.3969/j.issn.1006-2475.2013.05.029
    Asbtract ( 383 )  
    Related Articles | Metrics
    A remote wireless realtime monitoring system in the vegetable greenhouse is designed. The system is composed of monitors’ terminal, gateway’s node and monitor’s center. The data acquisition of environmental parameters is implemented by wireless sensor network with ZigBee communication protocol in monitors’ terminal nodes. The wireless sensor network is composed of ZigBee module whose core is CC2533 module. The data aggregation function is implemented in server sides who is developed with the microprocessor PXA270 of ARM10 and Linux operation system. The ZigBee network is used to aggregate data from monitors’ terminal nodes and the 3G wireless communication network is adopted to realize the remote data transmission function.The adoption of ZigBee technology and 3G technology satisfied the requirements of wireless data acquisition and data transmission for environmental parameters of vegetable greenhouse.At the same time, the problems are effectively solved including wiring problems, nodes’ immobility and system maintenance difficulties. The proposed system is suitable for environmental parameters’ monitoring of the vegetable greenhouse.
    Research on Data Fusion of Low-speed Single Moving Target in Wireless Sensor Networks
    DENG Hui-mei;LI Jing-zhao
    2013, 1(5):  127-130.  doi:10.3969/j.issn.1006-2475.2013.05.030
    Asbtract ( 345 )  
    Related Articles | Metrics
    In order to improve the efficiency of data fusion in wireless sensor network, reduce the energy consumption of sensor nodes, a kind of combined with dynamic clustering and static clustering technique network strategy is put forward. It overcomes the shortage of the traditional only static clustering or dynamic clustering technique. According to analyze and comparison the election of cluster head and detection environment parameters of target, it can reduce network hop count, reduce the data transmission, achieve the balanced use of energy and also prolong the lifetime of network. Its network data fusion performance is to the best in the state of low-speed single moving target.
    Research on Channel Estimation and Detection Method of OFDM System
    GONG Song;LIU Li
    2013, 1(5):  131-134.  doi:10.3969/j.issn.1006-2475.2013.05.031
    Asbtract ( 342 )  
    Related Articles | Metrics
    In order to ensure the validity and reliability of communication, it’s necessary to know the channel state information(CSI) of orthogonal frequency division multiplexing (OFDM) system. This paper proposes a method to dectect the state information for channels, based on the pilotsymbolaided estimation in OFDM systems. The experiment results show that the method can efficent evaluate the state of channels by finding out appropriate parameters of CSI.
    Design and Reliability Analysis of Dissimilar Redundant Flight Control Computers
    ZHOU Xiao-chao;LU Xiong
    2013, 1(5):  135-137.  doi:10.3969/j.issn.1006-2475.2013.05.032
    Asbtract ( 345 )  
    Related Articles | Metrics
    Redundancy fault-tolerant technology has emerged and developed with the need of computer system reliability. In order to avoid the correlated faults and realize the performance indexes of flight control computers, the architecture of the dissimilar dual-redundancy flight control computer system is researched. Generalized stochastic Petri net (GSPN) is applied to set up the model of flight control computer system, Markov is used to calculate and analyze the reliability of the system. And practical research approach is proposed based on the analysis results.
    Research and Application of Key Technology of Hadoop
    XIA Da-wen;RONG Zhuo-bo
    2013, 1(5):  138-141,.  doi:10.3969/j.issn.1006-2475.2013.05.033
    Asbtract ( 343 )  
    Related Articles | Metrics
    According to actual demand of the opensource general cloud platform, this paper briefly analyzes cloud computing system structure and basic architecture, and researches on the key technology of Hadoop in-depth, proposes a Hadoop-based cloud computing model, builds a platform and successfully realizes its application. Experiments show that the platform has good massive data distributed computing and processing performance and can meet the needs of cloud computing application and research for the small and medium-sized enterprises or scholars.
    Design and Implementation of Restaurant Service System Under Internet of Things Environment
    WANG Zhen;WU Fang;LU En-rong;LIAO Hai-lin;CHEN Zhen-jian
    2013, 1(5):  142-144,.  doi:10.3969/j.issn.1006-2475.2013.05.034
    Asbtract ( 396 )  
    Related Articles | Metrics
    With the improvement of people’s living standard and life transitions, catering industry has great investment market, it is known as the gold industry in China. On the tip of the tongue things networking system using the wireless network technology as information communication bridge, which can improve the grade of restaurant, improve work efficiency, avoid run single, realtime monitoring restaurant status, provide various statistical information, improve the service quality, etc., It brings catering industry new management idea and service methods, optimizes business process, provides customers with better quality of service. This paper designs a restaurant service system under Internet of things environment, it completes cell phone book, field PAD(tablet PC) choose a dish, RFID recognition, kitchen display terminal and server data processing and management related functions. To realize the maximization of enterprise value at the same time and minimization of cost is an important sign of the food industry information development.
    应用与开发
    Design and Implementation of Embedded Cognitive Radio Platform
    WU Jia;CHEN Shao-ping;RAO Wen-gui
    2013, 1(5):  145-148.  doi:10.3969/j.issn.1006-2475.2013.05.035
    Asbtract ( 329 )  
    Related Articles | Metrics
    In order to study and verify cognitive radio techniques and algorithms, an embedded cognitive radio platform is proposed. The platform uses dual-processor architecture of ARM+FPGA. It is divided into three parts of RF, baseband processing and embedded control. As main processor, ARM runs the embedded Linux system and is responsible for the work of system control as well as the work of interaction. As data processing core, FPGA is responsible for the baseband signal processing, algorithms and RF module configuration. The platform is used flexibly with LCD touch screen. It can work without PC. It provides a good hardware platform for the study of the cognitive radio technology.
    Visual Solution of System of Linear Equations Based on Mathematica
    WANG Fu-gui;HOU Jian-wen
    2013, 1(5):  149-154.  doi:10.3969/j.issn.1006-2475.2013.05.036
    Asbtract ( 491 )  
    Related Articles | Metrics
    Functions of elementary row operation of matrix, row reduced echelon matrix, augmented matrix, and visual solution of system of linear equations, are programmed in Mathematica 7.0 environment. Then two types of usages of the function of visual solution of system of linear equations are also discussed: users who are familiar with Mathematica 7.0 can input function with parameters to solve the system of linear equations; while any users can conveniently input the number of equations and variables, and augmented matrix after inputting function without parameters, and finally the process and general solution of the system of linear equations are output just by clicking solution button.
    Design and Implementation of Universities’ Project Management System Based on JSF and JPA Framework
    LIANG Zhi-xue
    2013, 1(5):  155-158,.  doi:10.3969/j.issn.1006-2475.2013.05.037
    Asbtract ( 350 )  
    Related Articles | Metrics
    This paper analyzes the current situation of project management in universities, proposes an integrated framework technology of JSF and JPA. Based on J2EE and integrated framework technologies, a project management system is constructed. 〖JP2〗Now, this system has been running in Nanyang Institute of Technology. Using university’s project management platform, it can avoid some disadvantages of manual management, and greatly improve the efficiency and quality of universities’ project management.
    Design and Implementation of Food Safety Supervision Management System Based on WebGIS
    ZHANG Sheng;ZHANG Zhao;HUANG Liang
    2013, 1(5):  159-162.  doi:10.3969/j.issn.1006-2475.2013.05.038
    Asbtract ( 380 )  
    Related Articles | Metrics
    In recent years, accidents of food safety have occurred frequently in our country. Food safety problems are increasingly becoming the focus of concern. The existing traditional way of supervision can not meet the requirements of the public increasingly. This paper proposes a geographic information system applied to food safety field, combined with Web technology designs and realizes the food safety supervision management system of Nanchang. It solves the problem about few officials but many supervision enterprises and improves the efficiency of supervising and managing the food safety. The effectiveness of the proposed system is demonstrated.
    Wiki Technology and Its Application in Enterprise Knowledge Management
    LI Xiao-yan;TANG Zhi-yong
    2013, 1(5):  163-166,.  doi:10.3969/j.issn.1006-2475.2013.05.039
    Asbtract ( 327 )  
    Related Articles | Metrics
    In the knowledge economy era, successful knowledge management is the key of enterprise to gain competitive advantages. However, traditional knowledge management tools are hard to realize the development and utilization of tacit knowledge. To solve this problem, this paper constructs a knowledge management platform based on Wiki, by which users can be scattered, collaborative to create and manage enterprise knowledge, realizing the conversion of tacit knowledge and explicit knowledge, constructs an enterprise product design navigation system through the association of knowledge and product information in Wiki platform. Finally the paper illustrates the application of the platform by an application example which provides an important reference to improve the ability of enterprise to solve actual problem.
    Design and Implementation of Enterprise Generic Process Module Under FileNet Platform
    TONG Ya-juan
    2013, 1(5):  167-171.  doi:10.3969/j.issn.1006-2475.2013.05.040
    Asbtract ( 303 )  
    Related Articles | Metrics
    With the fast development and the advancement of computer technology, more and more enterprises are paying much attention to business process management (BPM), especially in fierce competition. Traditional processes management seems rather cumbersome. With the trends that enterprises structures are becoming complex, lowercost and efficiency of business process management based on B/S make it more necessary for enterprises especially those which have complicated organizational structures. This article introduces the design and implementation of a generic process module which is based on FileNet platform. The process of editing, checking and reviewing can run automatically. This module applies Lotus Forms to design the forms. The module supports the storage of documents (also called content) about the process and the user can start a process with the content.
    Research on Web Biological Information Extraction Method Based on Ontology
    HE Yuan
    2013, 1(5):  172-175.  doi:10.3969/j.issn.1006-2475.2013.05.041
    Asbtract ( 294 )  
    Related Articles | Metrics
    Aiming at the malpractice in traditional search field based on keyword and data retrieval, this paper proposes a Web information extraction framework based on ontology. Firstly, the framework obtains the Web page which is converted into a wellformed HTML document, secondly, the document is turned into the DOM tree by making use of the HTML parser, then, the extraction rules is achieved on the basis of the users’ interest data block which is obtained according to the XPath expression. Finally, the data is extracted through the OntPMatch algorithm, and is stored in RDF data format. The paper makes the empirical study using the cotton information as research object, and realizes a prototype system of extracting biological information data. The paper provides a useful tool for users to obtain valuable biological information from Web.
    Research and Application of Multiple Coverage-oriented Combined with Assertions FPGA Verification Method
    YANG Peng-fei;FU Xiu-feng
    2013, 1(5):  176-180.  doi:10.3969/j.issn.1006-2475.2013.05.042
    Asbtract ( 406 )  
    Related Articles | Metrics
    First, this paper introduces verification method for FPGA based on multiple coverageoriented combined with assertions, then with the functional verification of a bus arbiter module as background, verification strategy and verification plan for FPGA bus arbiter module is established, the method of multiple coverage-oriented combined with assertion is adopted to verify the bus arbiter module. The experimental results show that verification method for FPGA based on kinds of coverage combined with assertion can ensure the adequacy of the verification of and shorten the time of functional verification.
    Research on Cross-language Flex Application Framework Based on Thrift
    WU Zhou
    2013, 1(5):  181-185.  doi:10.3969/j.issn.1006-2475.2013.05.043
    Asbtract ( 332 )  
    Related Articles | Metrics
    This paper introduces the features of Flex and its situation which is a RIA development technology, points out some weakness of Flex in software development, that is Flex application is lack of scalability. Meanwhile, the paper analyses the features and advantages of the cross-languages service deployment framework Thrift technology. Combining the characteristics of Flex and Thrift, this paper designs a Flex application framework based on Thrift which is a scalable cross-language services implementation by use of SOA methodology. This paper uses a specific example to further explain this framework and to prove this framework has many features, such as scalable, efficient etc.
    Construction of Front-end Presentation Layer Framework Based on Mixed-model
    LEI Ming
    2013, 1(5):  186-191.  doi:10.3969/j.issn.1006-2475.2013.05.044
    Asbtract ( 344 )  
    Related Articles | Metrics
    In the environment of front-end development, using design pattern reasonably can optimize the application development method, and improve the efficiency of Web application development. For a low degree of automation and accuracy of service discovery in the current situation, this paper proposes a mixed-model presentation layer architecture which integrates several classic design models into an improved pattern to separate the presentation model the composite member from view layer, transfer of the message among composite components and modules effectively, and encapsulate business logic processing models. The results illustrate that based on this architecture it can easily code and manage the presentation project. Once more, it provides another design idea and implementation to develop the architecture in application.
    Analysis and Research on Online Concurrent Processing Capability of Core Business of Commercial Banks
    WANG Gang;ZHU Hong-xia
    2013, 1(5):  192-196.  doi:10.3969/j.issn.1006-2475.2013.05.045
    Asbtract ( 381 )  
    Related Articles | Metrics
    Concurrent processing capability is the number of online transactions of online realtime processing system at the same time, concurrent processing for different applications is of different indicators, associated with the physical capacity of application system at the same time. In addition, concurrent processing capability is also closely associated with the complexity of business application system. Commercial bank financial information system mainly includes card business, discount business, exchange, inquiry, product management, finally, fixed units, parameter management, access management, front subsystems such as counter channel, the analysis of online concurrent processing capability of the above business can determine the technology parameters of configuration properties such as system host, storage, network equipment, firewalls, LAN switches, which is of reference value to the commercial bank information system construction.
    Study on Dynamic Interface Layout for Android Application
    LIU Chang-ping;LIU Yang;CHEN Jia-shi;
    2013, 1(5):  197-200.  doi:10.3969/j.issn.1006-2475.2013.05.046
    Asbtract ( 417 )  
    Related Articles | Metrics
    Multi-media information distribution is needed dividing visible screen area into several parts at random. A new method of dynamically deploying Android application interface is proposed to meet this requirement. This method creates dynamically separate window for each part in screen to output text, picture, audio or video file. Experiment illustrates this method not only supports arbitrary division of the screen area, but also supports the display between the different windows, adapts for information distribution on cell phone, tablet PC and other Android devices.
    A Method of Speaker Acoustic Features Optimal Selection Based on Greedy Strategy
    CHEN Jue-zhi;ZHANG Gui-rong;ZHOU Yu-huan
    2013, 1(5):  201-205.  doi:10.3969/j.issn.1006-2475.2013.05.047
    Asbtract ( 354 )  
    Related Articles | Metrics
    In order to improve the performance of speaker recognition, a method for optimal speaker acoustic features selection is proposed, using greedy algorithm to select some dimensional features from a large dimensional feature set in turn. The recognition rate is increased by 1.6% on pure voice than traditional method and by 6% on noisy voice, the recognition speed is increased about 5 times in experiments based on TIMIT. The experiment results show that the optimal selective features which eliminate disturbance of other redundant features can effectively improve both the recognition accuracy and the computational speed on the speaker recognition system.
    Design of Frequency Synthesizer Model Based on Matlab/Simulink
    HAO Lian-xiu;WANG Hao-xuan;ZHANG Liang
    2013, 1(5):  206-210.  doi:10.3969/j.issn.1006-2475.2013.05.048
    Asbtract ( 538 )  
    Related Articles | Metrics
    Phase locked loop (PLL) is performed as the source of the wireless communication system to complete modulation, demodulation, spectrum transform and so on. As a typical negative feedback system, the system level design and parameter selection directly determine the quality of PLL. In this paper, a behavioral model of phase locked loop based on Matlab/Simulink is proposed. Through the dynamic simulation, beginners can quickly master the working principle of the PLL, understand the tradeoff between loop bandwidth, phase margin and the setting time, provide guidance for circuit design.
    A Practical Path Planning Scheme of Highway
    XU Xiao-feng;LI Han-xuan
    2013, 1(5):  211-214.  doi:10.3969/j.issn.1006-2475.2013.05.049
    Asbtract ( 310 )  
    Related Articles | Metrics
    The optimization of route is essential to highway maintenance when highway company facing with emergency. But, problems such as traffic control and settings of entrances and exits make it difficult to achieve. This paper proposes a functional design about the path planning system. This system uses the effective forward star structure to store the topology structure of highway network, and the impedance model of highway is based on the BPR Function. This paper combines the network model and the Dijkstra algorithm to get the optimal path on highway. Finally, this paper achieves the goal of the scheme by the secondary development of MapX with VC++.
    Personalized Data Reusing Method Based on REST
    WEI Wei
    2013, 1(5):  215-218.  doi:10.3969/j.issn.1006-2475.2013.05.050
    Asbtract ( 340 )  
    Related Articles | Metrics
    An REST-based personalized data reusing method is proposed, which supports user data reusing in different applications and different platforms, efficiently supports personalized requirement. This method uses REST as software architecture style and XML Schema to define data format. Heterogeneous processing methods of different data formats are studied. This paper also implements a prototype system and verifies the possibility and validity of this new method.
    Research on Failure Prediction Technology Based on Time Series Analysis and ACO-LSSVM
    LIU Hai-yan;JIANG Ze-jun
    2013, 1(5):  219-222,.  doi:10.3969/j.issn.1006-2475.2013.05.051
    Asbtract ( 288 )  
    Related Articles | Metrics
    The traditional prediction method of mechanical equipment failure rate is of lower accuracy, it is unable to adapt the demand of modern equipment maintenance. This paper proposes a novel PHM algorithm based on ACO and LSSVM algorithms. Using time series analysis prediction method to calculate seasonal factor and combining with ACOLSSVM algorithm to model the failure rate of an aviation device, a good experimental result is obtained, and the comparative analysis of predicted result and actual result is given.
    Design of E-government System Architecture Based on IFW
    HOU Hong-feng;WANG Yan;HE Dan-dan
    2013, 1(5):  223-226.  doi:10.3969/j.issn.1006-2475.2013.05.052
    Asbtract ( 303 )  
    Related Articles | Metrics
    In order to solve the issues of the network separation, “information island”and the scattering of information in the construction of E-government system, the article references the IBM’s information framework(IFW) to design the E-government system architecture. This frame describes the system structure and development processing of the information system from the view of technology and management. It is of very vital significance for promoting the construction of E-government system in our country.
    Design and Implementation of RF Card Read/Write System Based on MSP430
    ZOU Fang-wei;SONG Gao-jun;SONG Cai-hua
    2013, 1(5):  227-130,.  doi:10.3969/j.issn.1006-2475.2013.05.053
    Asbtract ( 289 )  
    Related Articles | Metrics
    A T5557 RF card system based on microcontroller MSP430 is developed. In order to achieve low cost, low power consumption and high reliability requirements of instrumentation applications, this paper uses microcontroller on-chip peripherals to generate 125kHz signal, which is amplified by power and modulation to provide power and data for RF card; While taking advantage of the on-chip timer measuring RF card returns signal pulse width to decoder card to return data and achieve RF card read/write function. By applying this design in the prepaid calorimeter, the system successfully achieves such as data exchange recharge and maintenance etc functions; by experiment, it fully meets the requirements of performance, cost and power of instrumentation system.
    Research on Network Community-finding Method on Complex Network Based on Similar Network Node Clustering
    ZHENG Feng-ni
    2013, 1(5):  231-234.  doi:
    Asbtract ( 316 )  
    Related Articles | Metrics
    According to the problems of community-finding on complex networks, this paper detailed studies the clustering method to it, changes the data structure of the network node into that of clustering algorithm, amalgamating or partitioning nodes according to the similarity of nodes, and uses the vector method to measure the similarity of complex network nodes. The improved algorithm makes each node on network as a source having sending and receiving messages function, transfers and traverses similarity value according to the improved information transmission method, uses Karate club network commonly uses on complex network as verification of the experimental object. It improves the efficiency of community-finding on complex networks.
    A Method of Determining Differentiation Degree Value of Test Paper
    XUE Dong;FENG Chao-ying;FENG Kai-ping
    2013, 1(5):  235-238.  doi:10.3969/j.issn.1006-2475.2013.05.055
    Asbtract ( 345 )  
    Related Articles | Metrics
    The differentiation degree in test paper decides the test questions’ quality and the test’s effectiveness. Traditional differentiation degree in test paper adopts artificial visual observation method or high and low scores statistical discrete method, and so on. The test accuracy may be not high in these ways, or the operation process is very long. This paper proposes a method of Logistic model slope differentiation degree. According to the distribution of tester’s ability, its curve graph can be represented by VB program in the sensitive area of Logistic model slope, then it can obtain the test’s differentiation degree. It is concluded that regardless of operating speed or accuracy, it is much better than traditional statistical method.