Loading...

Table of Content

    10 October 2014, Volume 0 Issue 9
    An Improved Genetic Algorithm Based on Constraint Handling and Smoothing Techniques
    WANG Xiaoping1, MENG Kun2
    2014, 0(9):  1-5.  doi:10.3969/j.issn.10062475.2014.09.001
    Asbtract ( 177 )  
    References | Related Articles | Metrics
    Evolutionary algorithm is a new kind of efficient methods for complex nonlinear programming, however, the amount of their computation is usually very large, and the constraints can not be handled efficiently. In this paper, firstly, the constrained problem is transformed into an unconstrained one so as to reduce the difficulty of problem solving. Secondly, to reduce the number of local optimal solutions, a smoothing technique is adopted. It can eliminate all local optimal solutions which are not better than the current best solution found so far, and keep all the local optimal solutions which is better than the current best solution. Furthermore, a new crossover operator is designed. Based on all these, an improved evolutionary algorithm is proposed and experimental results show the efficiency of the proposed algorithm with less computation, higher convergent speed for all test problems.
    Research on Text Categorization Based on Improved TFIDF Algorithm
    ZHENG Lin, XU Dehua
    2014, 0(9):  6-9.  doi:doi: 10.3969/j.issn.10062475.2014.09.002
    Asbtract ( 134 )  
    References | Related Articles | Metrics
    Due to the broad application of text categorization in information retrieval, email filtering, Web page classification, personalized recommendation and other fields, it raised extensive attention among scholars since the concept of text categorization was presented. In text classification research, scholars have adopted a lot of methods, and TFIDF was one of the most commonly used algorithms to calculate the weight of feature items. But the traditional TFIDF algorithm ignored the distribution of feature items within classes and among classes, leading to high weight given to many items with little discrimination. In this paper, with the purpose of improving the traditional TFIDF algorithm, we modified the calculation method of IDF, adding some factors which reflected the distribution of feature items within classes and among classes. In the experiment, we applied the improved TFIDF algorithm into text categorization. By investigating the effect of text classification, the improving algorithm was verified valid.

     
    Intelligent Learning Algorithm Based on Virtual Learning Community
    ZENG Gui, CHENG Yan
    2014, 0(9):  10-14.  doi:doi: 10.3969/j.issn.10062475.2014.09.003
    Asbtract ( 116 )  
    References | Related Articles | Metrics
    With the development of information technology and Internet technology, virtual learning community has become an important means of network communication and network learning. It has become the hot and the key research how to make use of virtual learning community to improve learners’ learning efficiency. In this paper, a personalized recommendation algorithm with intelligent algorithm is put forward, based on virtual learning community, thus the learners can be convenient, efficient, intelligent, reflective learning, and it provides the theory and technical support for building virtual learning community, in order to better guide for learning practice of virtual learning community.

     
    Fairness Guaranteed Resource Allocation Algorithm on Femtocell Networks
    LU Xiangcheng1, ZHANG Li2, BAI Yun1
    2014, 0(9):  15-19.  doi:10.3969/j.issn.10062475.2014.09.004
    Asbtract ( 281 )  
    References | Related Articles | Metrics
    Userdeployed lowpower Femtocell access points (FAPs) can provide better indoor coverage and higher data rates than conventional cellular networks. However, a major problem in this uncoordinated frequency reuse scenario is the intercell interference. In this paper, we propose a graph based distributed algorithm called fairness guaranteed cooperative resource allocation (FGCRA) to manage interference among Femtocells. Firstly, we propose a specific fairness factor obtained from twohop interference relations, to determine the lower bound amount of subchannels that each FAP can use and guarantee the fairness among Femtocells. Secondly, we propose scalable rules for distributed resource allocation and the solution to avoid the conflicts among interfering neighbors. Simulation results show that our proposed FGCRA significantly enhances both average user throughput and cell edge user throughput, and provides better fairness.
    Building and Displaying of Network Topology Model Based on GIS
    FENG Tonghan, AI Zhongliang
    2014, 0(9):  20-24.  doi:10.3969/j.issn.10062475.2014.09.005
    Asbtract ( 197 )  
    References | Related Articles | Metrics
    With the rapid development of computer and Internet technology, the scale of the network tends to be large and the structure becomes more complex. To make the visualization of network topology information more simple, efficient, intuitive, and comprehensive, based on the research on the GISbased(Geographic Information System) network topology modelbuilding research, a multiview model for the diversifying display of complex network is constructed. Using the LOD(Levels of Detail) technology in the process of network topology visualization, which makes the administrators and decisionmakers quickly access the network topology multifaceted information including geographic information, equipment information, and other network situation information, can provide support for network management.
    Transmission Method of Railway Flaw Detection Based #br#  on GPRS Wireless Data Transmitting
    YIN Na
    2014, 0(9):  25-28.  doi:10.3969/j.issn.10062475.2014.09.006
    Asbtract ( 122 )  
    References | Related Articles | Metrics
     In order to solve the problem of the transmitting information on railway flaw detection, this paper puts forward a scheme of railway damage information transmission
    based on GPRS wireless data transmission. The paper analyzes the details of the system structure and principle, and focuses on the circuit schematic diagram of the wireless data
    transmission module, and gives software structure of the wireless data transmission module and the remote terminal module. According to the experimental results and data
    analysis, based on this system, the quality of wireless data transmission is better, and the packet losing data rate is low.
    Implementation of Load Balancing Cluster Based on Linux
    LI Ou, CHEN Yan, LI Taoying
    2014, 0(9):  29-32.  doi:10.3969/j.issn.10062475.2014.09.007
    Asbtract ( 158 )  
    References | Related Articles | Metrics
    Load balancing cluster can reasonably allocate traffic among multiple network devices, enable the device to its full processing capacity, which has been widely
    applied. Tomcat and Apache can be used as standalone server, however, some limitations exist when they are used alone. To improve the performance of the server, the article
    integrated Tomcat with Apache based on Linux OS, analyzed the load balancing cluster architecture, and described the specific implementation program. Test results show that the
    load balancing cluster can be achieved according to the process.
    Deployment Optimization of  Data Link Maneuvering Site Based on STK/MATLAB
    SONG Xiaoxian1, ZHANG Chao2
    2014, 0(9):  33.  doi:10.3969/j.issn.10062475.2014.09.008
    Asbtract ( 173 )  
    References | Related Articles | Metrics
     Data link maneuvering site is mainly using UHF channel for information transmitting. Restricting by lineofsight communications, terrain shade had a great
    influence on communication link quality. When using AWACS relay communication, the location of the data link ground maneuvering site must be optimized to do with the relay
    platform to perform the best communication effect. Combining MATLAB’s powerful programming, operation, control ability and the STK’s super entity modeling, realistic 3D
    display is simulated. It not only takes on real combat geographical environment, but also can control the simulation process, analyzes the simulation data. It can quickly find
    the optimal deployment location of the ground data link  maneuvering site location or cruise route of AWACS by using variable step search method. The optimization can greatly
    improve the overall operational effectiveness of the data link system.
    Communication Components for Grabbing Software Operating #br#  and Input Information Automatically
    XUE Yuanqing1, MENG Fengjiao2, ZHANG HaiFeng1
    2014, 0(9):  37-43.  doi:10.3969/j.issn.10062475.2014.09.009
    Asbtract ( 202 )  
    References | Related Articles | Metrics
    To capture the interface of software and information input on it to trace process of the production, this paper transmitted and integrated the information grabbed
    from the client to the corresponding data table of the server in realtime synchronously and automatically. Meanwhile, the server needs to compare and analyze them according to
    the demand, and transmits the results to the client. In this mutual communication, there will be packet burst, loss, poor realtime, etc. Thus, in this paper the network
    communication component was designed and studied based on time driven mechanism and timeout retransmission mechanism, and was applied to the enterprise production supervision
    system based on electronic code. It effectively realizes the realtime transmission of information between the client and server.
    Communication Software of Remote Grain Monitor System Based on VPN
    CHEN Zhongxiao, SUN Shiming, LIU Panpan
    2014, 0(9):  44-48.  doi:10.3969/j.issn.10062475.2014.09.010
    Asbtract ( 207 )  
    References | Related Articles | Metrics
    In order to realize remote operating for the localization grain inspection system, we researched the VPN and Winsock applied to communication software of system, the VPN can reduce the cost and difficulty of network equipment which constructs private network, Winsock can save time of developing program because it supplies the whole TCP/IP protocol. Designing communication software of remote grain monitor system based on VPN, it effectively uses congestion mode of socket and completes network state selfchecking based on multithread technique, through setting VPN client to improve the network speed, thus achieves high performance of security, reliability and speed.
    System Users Access Control Based on Improved RBAC Model
    SONG Wanli1,2, WU Weifeng1
    2014, 0(9):  49-54.  doi:10.3969/j.issn.10062475.2014.09.011
    Asbtract ( 165 )  
    References | Related Articles | Metrics
    On the basis of studying the existing RBAC models in the literatures published, this paper put forward an improved model (MRRBAC model), and gave its formal definition, and designed and implemented it. The MRRBAC model could realize finegrained access control permission on the operations and objects, set the different roles of different functional operation via automatic configuration interface. Practice indicates that MRRBAC model improves the security of the system and the flexibility of configuration.
    A Safe and Reliable Information System Based on Mobile Network
    YU Yaling, LI Ning
    2014, 0(9):  55-57.  doi:10.3969/j.issn.10062475.2014.09.012
    Asbtract ( 162 )  
    References | Related Articles | Metrics
    A safe and reliable information system based on mobile network is provided. The system realizes the linkage mechanism of mobile network message safety arrival and message text, picture, voice, supports a variety of forms. With an Android application, it verifies that this system can effectively improve the delivery rate of messages on a mobile network, meets high reliability application push demand.
    An Efficient Interleaved Encryption and Authenticated Scheme on Wireless Sensor Networks
    REN Hongqing, NING Feifei
    2014, 0(9):  58-61.  doi:10.3969/j.issn.10062475.2014.09.013
    Asbtract ( 164 )  
    References | Related Articles | Metrics
    In order to solve the problem of the confidentiality and integrity of the data on wireless sensor network (WSN), an efficient interleaved encryption and authenticated scheme on wireless sensor networks is put forward in the paper. The scheme is based on symmetric key encryption. The nodes on the networks only shared keys with those nodes in tow hops, and the cipher is always encrypted two layers. This way, the storage space of keys is decreased, and the calculated amount of encryption and decryption is reduced. Beyond that, the function with voting technology certification is introduced in the scheme, which can reduce the probability of message loss significantly under the premise of the integrity and confidentiality.
    Video Zerowatermark Algorithm Based on Combination of #br#  Contourlet Transform with Life Game Scrambling
    CHEN Xuesong1, BU Guanglong1, JIA Ruicheng2, SUN Lina2, LI Haotian1
    2014, 0(9):  62-66.  doi:10.3969/j.issn.10062475.2014.09.014
    Asbtract ( 167 )  
    References | Related Articles | Metrics
    In order to achieve the purpose of copyright protection, this paper proposes a video zerowatermark algorithm based on the combination of the life game scrambling with Contourlet transform, which has been known as the optimal solution of twodimensional signal processing. The algorithm uses the advantage of Contourlet to process the key frame and gets the lowfrequency coefficients, then combines the rules of the life game to generate feature image with core algorithm, and uses encryption algorithm to make pretreatment for watermark in order to enhance security. Experimental results show that the algorithm is a good compromise between invisibility and robustness, and can effectively resist the common geometric attacks and video attacks.
    An Improved Haze Removal Method Based on Horizon Detection
    LI Lu1,2, LAN Shiyong1,2, ZHANG Jianwei1,2, LI Kun1,2
    2014, 0(9):  67-71.  doi:10.3969/j.issn.10062475.2014.09.015
    Asbtract ( 150 )  
    References | Related Articles | Metrics
     Fog and haze are the important factors that degrade the quality of image and video, which bring great inconvenience to outdoor video tasks. Considering the existence
    of horizon in vision video, an improved defogging method based on horizon detection is proposed. It detects the horizon with the theory of dark channel and then segments the sky
    region from the whole image to get the light part of the haze imaging model. Parameters are adjusted by introducing faulttolerance to improve image quality. At the same time,
    we use imageguided filtering instead of soft matting which consumes both memory and time in transmission correction. As shown in the experiment, this method improves the
    vulnerable behavior of origin algorithm in the presence of white scene or objects, the image quality debased by neglecting the obvious halo of diurnal light in distant view
    image, and the processing time.
    A Fast Breakage Detection Based on Hough Transform and Image Fusion
    LIU Di, ZHOU Wuneng, ZHANG Xiangwei
    2014, 0(9):  72-76.  doi: 10.3969/j.issn.10062475.2014.09.016
    Asbtract ( 123 )  
    References | Related Articles | Metrics
    The status of industrial breakage detection has been studied, we propose making the digital image processing system replace the traditional hardware detection, then
    the first is image preprocessing to membrane, using Hough transform to segment region of interest for two consecutive frames, image contrast enhancement using wavelet transform,
    the followed is to calculate the energy of Laplace(EOI) for each pixel and Visibility(VI), the normalized value of the processed image fusion as a factor, and finally fused
    image was transformed into HSI space, then is the threshold segmentation, to discriminate the damaged. Experiments show that this detection method has strong antiinterference,
    low cost, high accuracy, small amount of calculation to identify the advantages of speed, meets the requirements of the realtime detection in the industrial field.
    Multiobject Video Tracking in Logistics Warehouse
    LIAN Haichen, JIANG Yaping
    2014, 0(9):  77-81.  doi:10.3969/j.issn.10062475.2014.09.017
    Asbtract ( 179 )  
    References | Related Articles | Metrics
     A Camshift algorithm, which is combined with the background modeling and the movement information, is presented in this article in order to resolve the multiobject
    tracking problem in the complex environment of industrial field. Firstly, the matrix of probability density is calculated based on histogram of color of each object. Secondly,
    these matrixes of probability density would be filter processed according to background image which is obtained from the background modeling. Thirdly, the movement information
    is added to its iterative process, and the best position should be calculated with the weighting fusion. In the last, the Camshift removes the goals which have been tracked
    successfully in the previous frame from those matrixes of probability density, in order to avoid a disturbance to other goals in the multiobject tracking. The experiment
    indicates that this algorithm has a very good capacity of reducing background disturbance and similar goals disturbance.
    Study and Implementation of Fast Vectorization for Raster Map Road
    KOU Manman, WANG Qinzhong, WAN Na
    2014, 0(9):  82-85.  doi:10.3969/j.issn.10062475.2014.09.018
    Asbtract ( 190 )  
    References | Related Articles | Metrics
     In this  paper, an effective vector algorithm for road from digital color raster map is proposed. On the basis of the road vector rules, we apply adjustable frame
    tracing algorithm, endpoint (crossover point) judgement and inertial direction to road vector on raster map image. This method overcomes the shortcomings of current methods in
    map vector. Experiment results show that it can vectorize the roads of raster map image rapidly and interactively.
    Design and Implementation of Countersigned Function in Workflow System
    HAN Hongyun, CHEN Yan, LI Taoying
    2014, 0(9):  86-89.  doi:10.3969/j.issn.10062475.2014.09.019
    Asbtract ( 257 )  
    References | Related Articles | Metrics
     With the growing maturity of computer technology, countersigned function gradually emerges in the workflow system. In this paper, we use Activiti workflow engine to implement countersigned features in workflow system, and implement the basic functions of defining processes, creating processes, deployment process with Activiti Modeler. After enabling the running processes to achieve process signing, such functions are implemented, i.e., task approval, approval to add comments, approval to reject the application and display the flow applications detailed information. This feature is easy to implement and operate, which can effectively improve management efficiency.
    Design and Implementation of RFID Middleware Based on NFC Mobile Devices
    XU Lei1,2, ZHOU Xi1, MA Yupeng1, WANG Lei1
    2014, 0(9):  90-94.  doi:10.3969/j.issn.10062475.2014.09.020
    Asbtract ( 162 )  
    References | Related Articles | Metrics
    In this paper, a novel middleware has been implemented to overcome several shortages which exist in the traditional RFID middleware, such as: PCs and servers are too enormous, which make the deployment cumbersomely; the middleware is poorly configurable due to the complexity of the system; also, the big data processing heavily the burden of servers. This middleware uses the Quartz framework and communicates with servers by combining Socket programming, and it supports the breakpoint upload and message encryption, what’s more, this will reduce the dependence on the network and ensure the data security. Compared with the common embedded RFID middleware, the middleware based on NFC mobile phone has a better interface. The experimental results show that this middleware occupies less resources, deploys conveniently and flexibly and is configurable. Besides, it can achieve a series of functions, including the data acquisition, data verification, data filtering, data storage, data compression and data interaction etc.
    Development of Mobile Phone Positioning Software Based on Android
    WU Lichun, FAN Shuang
    2014, 0(9):  95-98.  doi:10.3969/j.issn.10062475.2014.09.021
    Asbtract ( 257 )  
    References | Related Articles | Metrics
    The mobile positioning system based on Android platform and Baidu Maps API development is studied. The present study is described. According to the system requirements analysis, the position display, safe speed settings, SMS records check and bus routes query system modules are divided, and the main method of each module is outlined. Specifically we describe the characteristics of different data storage methods, so can choose the appropriate solution in accordance with the system features.
    Research on Automated Administration Frame Based on Performance #br#  Perceptivity in Private Cloud Platform
    LI Yefei, WANG Songyun
    2014, 0(9):  99-102.  doi:10.3969/j.issn.10062475.2014.09.022
    Asbtract ( 135 )  
    References | Related Articles | Metrics
     The private cloud is often constructed by the corporation independently which is different from the public cloud. As a result, how to manage the infrastructure effectively, realize the centralized regulation of resources and how to distribute resources on demand become the challenges when constructing the private cloud platform. The paper proposed an automated administration frame based on performance perceptivity to manage the infrastructure under the private cloud platform. The frame can monitor the realtime running state, and dynamically adjust the resource allocation. The experiment indicates that the frame can manage the infrastructure effectively.
    Development of Injection Mould Standardised Design Software for Auto Bumper
    LU Bing1,2
    2014, 0(9):  103-106.  doi:10.3969/j.issn.10062475.2014.09.023
    Asbtract ( 153 )  
    References | Related Articles | Metrics
     For the auto bumper injection mold standardization design, the bumper injection mold standard design software was developed by using .NET technology and general platform secondary development. It was also developed by combing with the bumper standard design rules. So it can be perfectly integrated with UGNX. By using this software, the design efficiency and quality can be greatly improved.
    Intelligent Greenhouse Monitor System Based on EFM32
    FENG Qi, CHEN Guang, CHEN Zehu
    2014, 0(9):  107-110.  doi:10.3969/j.issn.10062475.2014.09.024
    Asbtract ( 196 )  
    References | Related Articles | Metrics
     For the intelligent trend and application requirements of agricultural greenhouse, the paper introduces a method that using EFM32TG110 and CC2530 module as hardware
    core, by designing the software and hardware of data acquisition, handling, communication and data fusion, so as to produce an agricultural greenhouse monitor system. The
    results show that this system can monitor the factors of temperature, humidity and light, and control the light in the greenhouse. It is proved that this design has the
    characteristics of low cost, low energy consumption, high practicability and so on.
    Design and Implementation of Multiplechannel Alarming System Based on Coherence
    ZHANG Hui1, ZHANG Suwei2
    2014, 0(9):  111-115.  doi:10.3969/j.issn.10062475.2014.09.025
    Asbtract ( 156 )  
    References | Related Articles | Metrics
    This paper introduces the design of multiplechannel alarming system based on Coherence. The system separates alarming business into seven parts: alarming access,
    answering alarm, dealing with alarm, policing, feedback, concluding and statistics.
    RCEbased Spatial Filtering Method for Recognition of Motor Imagery Potential
    ZHANG Shouzhong1, XIAO Ying2
    2014, 0(9):  116-119.  doi:10.3969/j.issn.10062475.2014.09.026
    Asbtract ( 136 )  
    References | Related Articles | Metrics
    The original signal usually needs filtering to extract the components with higher degree of distinction before the motor imagery potential classification, which
    results in loss of the useful information under the serious noise interference, as the result, the classification correct rate will be degraded. To solve this problem, hereby a
    rhythmic component extraction (RCE) combined with common spatial subspace decomposition (CSSD) for feature extraction while using the linear classifier was proposed. The
    identification accuracy reached 87.22% by using the method for the international BCI Competition 2003 data, classification accuracy improved by 6.8% compared with traditional
    methods of spatial filtering, which show that the method can be effectively applied to the identification of left and right hand motor imagery potential.
    Aerospace Product Assembly Logistics Management System Based #br#  on Internet of Things Technology
    YIN Yazheng1, XUE Shanliang3, GU Yong3, LIU Yuguang3
    2014, 0(9):  120-123.  doi:10.3969/j.issn.10062475.2014.09.027
    Asbtract ( 161 )  
    References | Related Articles | Metrics
    In order to solve the problems existing in the assembly production logistics management of an aerospace enterprise such as material variety, large size of the
    material and complex logistics management and so on, we build an assembly logistics management system architecture based on the Internet of things technology, including the
    perception layer, the network layer and the application layer. Firstly, in the perception layer, we combine the technology of the barcode and radio frequency identification in
    assembly materials’ identification and perception. Secondly, in the network layer, based on the enterprise existing network resources, we build the network architecture using
    IPv6, 2G/3G and WiFi. Thirdly, in the application layer, we design the function module which includes material inventory management, material supply management, logistics
    monitoring management and assembly production resource management. Finally, we design and develop the prototype of aerospace product assembly logistics management system with
    the standard of the Java EE.
     Design and Implementation of Orange Planting Expert System
    YANG Yunping1,2, LI Muhua1,2, ZHOU Zhipeng1,2
    2014, 0(9):  124-127.  doi:10.3969/j.issn.10062475.2014.09.028
    Asbtract ( 167 )  
    References | Related Articles | Metrics
    This article introduces an orange planting expert system developed by CLIPS tools. The expert system has multimedia reasoning ability such as pictures and videos.
    Its core components include knowledge base, rules list and reasoning engine. The reasoning engine runs in software virtual machine way. It can increase the productivity of
    orange and decrease insect diseases. It has active sense for modern agriculture.
    Mobile Client of Campus Card Based on ASP.NET Web API Framework
    HAN Lifeng
    2014, 0(9):  128-131.  doi:10.3969/j.issn.10062475.2014.09.029
    Asbtract ( 184 )  
    References | Related Articles | Metrics
    In the article, we elaborated the implementation of the ASP.NET Web API framework based campus card’s mobile client. Frist we import card system’s Web Services,
    then encapsulate them into Web API function. The mobile client requests the function by HTTP protocol. The user could use the fragmentation time to deal with business of campus
    card anywhere and anytime. This broke the limitations of traditional campus card’s application in time and space, opened a new situation.
    #br#  Research on Transplantation of uC/OSIII Kernel to SMT32F103VET6
    LU Yulan, YAN Zhengang, LI Guang
    2014, 0(9):  132-136.  doi:10.3969/j.issn.10062475.2014.09.030
    Asbtract ( 225 )  
    References | Related Articles | Metrics
    In order to realize the unified management of software and hardware resources and to make developers concentrate on their own business, this paper introduces a way
    of transplanting the realtime kernel uC/OSIII to STM32F103VET6. Basic characteristics and the key contents related to uC/OSIII kernel such as NVIC, PendSV and systick of
    CortexM3 are presented. Besides, it also illustrates the uC/OSIII architecture, states the mechanism of context switch and  elaborates the steps of uC/OSIII kernel
    transplantation including BSP development, modification of sources files related to CPU and how to implement PendSV and context switch in ARM assembly language. Test results
    show that uC/OSIII kernel can be stably run on STM32F103VET6 and the multitask scheduling can also be implemented.
    An Automated Testing and Monitoring Platform for Largescale Server Cluster
    WANG Wang1, XIA Feng2, CHEN Zhe1, HUANG Zhiqiu1
    2014, 0(9):  137-142.  doi: 10.3969/j.issn.10062475.2014.09.031
    Asbtract ( 101 )  
    References | Related Articles | Metrics
     Along with the standardization of testing process and the further refinement of software testing, automated software testing has increasingly become an important
    technology. However, in the largescale server cluster environment, automated testing becomes relatively weak and difficult to maintain. Hence, how to effectively monitor and
    manage automated testing is an important issue. Based on software automated testing and related technologies for Web development framework, this paper presented an automated
    research and cooperation platform for Alibaba Chinese websites, then proposed the design and implementation of the automated testing and monitoring platform for largescale
    server cluster, which had two major functions, including deploying and monitoring testing environment. Practice has demonstrated that the platform can strengthen the unified
    management and monitoring of testing servers and substantially increase testing efficiency.