Loading...

Table of Content

    22 December 2014, Volume 0 Issue 12
    Spatio-temporal Trend and Seismic Anomaly of Historical Earthquake Based on Complex Network
    JIA Sui-min, HU Ming-sheng, JIA Zhi-juan
    2014, 0(12):  1-5.  doi:10.3969/j.issn.1006-2475.2014.12.001
    Asbtract ( 252 )  
    References | Related Articles | Metrics
    To study theinfluence of seismic anomaly on the earthquake prediction Experimental results show that, the studying of complex network according to historical earthquake has feasibility, and it provides a new method for the research on earthquake. and secondary disasters, historical earthquake data prior to the 1911 is collected, and the Chinese historical earthquake database is built based on the earthquake data. The complex network model is built by the association analysis between earthquake and seismic anomaly, calculation methods for the importance of seismic anomaly and the hazard degree of earthquake are proposed to study the internal correlation between earthquake and seismic anomaly according to the network model, finally, the data analysis of network model is used to research the spatio-temporal trend.
    Slater Election Solving Method Based on Answer Set Programming
    LAI He-lang
    2014, 0(12):  6-10+14.  doi:10.3969/j.issn.1006-2475.2014.12.002
    Asbtract ( 163 )  
    References | Related Articles | Metrics
    Slater election is an optimization problem and NP-hard problem, which is generally considered that polynomial time’s algorithms do not exist for solving. Given its complexity of solving is consistent with the complexity of answer set solving. Therefore, the paper proposes a new method of using ASP (answer set programming) to solve Slater election. First, it uses the saturation technology to build ASP model of logically equivalent for Slater election; secondly, proves the correctness of the model; finally, calls the answer set solver DLV to solve specific examples of Slater election and shows its feasibility in the experimental results. The proposed method can not only solve the Slater election problem, but also is the saturation technique used in ASP and provides a new logical representation approach for other similar optimization problem.
    A Biclustering Algorithm Based on PA Index in Microarray Gene Expression Data
    LIN Qin1, LIN Si-da2, ZHU Wen-min1
    2014, 0(12):  11-14.  doi:10.3969/j.issn.1006-2475.2014.12.003
    Asbtract ( 189 )  
    References | Related Articles | Metrics
    To improve the global quality of the outcome of the biclustering, a biclustering algorithm based on PA index was proposed. In this algorithm, the PA index which can estimate the effect of outcome of the biclustering was chosen to construct the bicluster model. Through deleting or inserting rows and columns in the heuristic greedy fashion, the algorithm obtained the significant biclusters of high global quality. To compare the performance of the algorithm with CC and FLOC, a real dataset experiment was simulated. The result shows that the algorithm in this paper can obtain better results. In a word, the algorithm is capable of detecting potentially statistically and biologically significant biclusters.
    Sea Fleet Sensor Resource Allocation Model Based on Improved Ant Colony Algorithm
    ZHU Wei-xiao, ZHU Qian-wang, CHEN Kang
    2014, 0(12):  15-18+22.  doi:10.3969/j.issn.1006-2475.2014.12.004
    Asbtract ( 218 )  
    References | Related Articles | Metrics
    Under the condition of informatization, the sensor resources allocation is the key content of sensor resource management in the warfare of maritime maneuverable formation. Aiming at the problem that sensor resources allocation model’s constructing factors are not comprehensive and the amount of calculation and time of allocation algorithm sharply increases with the increase of the number of sensor targets, this paper proposes a kind of target function which considers the target priority, the matching precision of sensor to the targets, the scope of the sensors and the cooperative ability, then sets up a kind of maritime maneuverable formation’s sensor resources allocation model based on improved ant colony algorithm. The simulation results show that the proposed algorithm significantly improves the convergence rate and time satisfaction, verifies the feasibility of allocation model.
    Stock Price Forecasting Based on Extreme Learning Machine
    LIAO Hong-yi, WANG Xin
    2014, 0(12):  19-22.  doi:10.3969/j.issn.1006-2475.2014.12.005
    Asbtract ( 299 )  
    References | Related Articles | Metrics
    Extreme learning machine (ELM) is a new learning algorithm of single-hidden layer feed-forward neural network (SLFNs), and overcomes the disadvantages of the classical learning algorithm in neural network method's multiple iterations, huge search space and a large number of calculations, only needs to set the appropriate numbers of hidden layer nodes, assigns the weight of input and deviation of hidden layers without iteration. Research shows that the stock market is a very complex nonlinear system, we need to use artificial intelligence theory, statistics theory and economic theory to study the stock price forecast. In this paper, ELM is introduced in predicting the stock price, and by comparing with SVM and BP, we analyze its feasibility and advantage in stock price prediction. The experiment results show that ELM is of high accuracy of prediction and obvious advantages in parameter selection and learning speed.
    Improved Algorithm of Association Rules in Big Data
    YANG Xiu-ping
    2014, 0(12):  23-26+31.  doi:10.3969/j.issn.1006-2475.2014.12.006
    Asbtract ( 305 )  
    References | Related Articles | Metrics
    In era of big data, we need more efficient algorithm and application of data mining. As a main direction, the algorithm of association rules can discover frequent item sets and association knowledge in a large amount of data. Apriori algorithm is a classical algorithm of association rules, based on this research, we find out the weakness of it and get improved methods for massive data. On its application in the customer viewing data, the improved algorithm increases the efficiency of data mining. Also after getting the mining results, we propose new topics for post application.
    Hydraulic Hybrid Cloud Storage Platform Oriented to Share and Exchange
    FENG Du-qing, FENG Jun, TANG Zhi-xian, WANG Chao
    2014, 0(12):  27-31.  doi:10.3969/j.issn.1006-2475.2014.12.007
    Asbtract ( 220 )  
    References | Related Articles | Metrics
    With the rapid development of the water conservancy informatization, the sharing and exchanging of the separately stored data become more and more frequently. Addressing the physical centralized data centers’ problems, like low storage utilization, I/O bottleneck of data exchange and poor ability of physical anti-jamming, based on the existing storage platforms in water conservancy, a novel hybrid cloud storage solution oriented to data sharing and exchanging is designed and implemented. The experiments show that this solution can ensure the data security, improve the comprehensive utilization of multiple storage platforms, and reduce the probability of the hot spots produced in the progress of sharing and exchanging the water conservancy data.
    Dynamic Publishing Method for Relational Data Service Based on Web Services
    ZHU Kang-kang, FENG Jun, TANG Zhi-xian
    2014, 0(12):  32-36+43.  doi:10.3969/j.issn.1006-2475.2014.12.008
    Asbtract ( 196 )  
    References | Related Articles | Metrics
    In order to improve the efficiency of data sharing, CBC dynamic service publishing model was proposed for relational data, which is based on Web Services dynamic service publishing method. This method selects the database and constructs query constraint information through a graphical interface, converts the constructed constraint information into the query statements that can be recognized by the system and publishes them into services with the CBC dynamic service publishing model. Users can query services through service querier, verify their effectiveness through service validator, integrate and call the qualified services cross-department and cross-database with the format of Web Services. Experiments show that the method can effectively improve the efficiency of data sharing, and benefit the exchange of data between heterogeneous systems.
    An Online Examination System Based on Cloud Computing
    WANG Qin, ZHAO Xin-dong
    2014, 0(12):  37-43.  doi:10.3969/j.issn.1006-2475.2014.12.009
    Asbtract ( 295 )  
    References | Related Articles | Metrics
    In order to solve the problem of wasting network resources caused by the dispersion, no communication with each other and unbalanced existing in online examination systems, a shared network examination system based on the service on demand and dynamic expansion capability of cloud computing technology was designed and implemented. By the deployment structure of SaaS model, with three-tier architecture of MVC, taking Java as a modeling language, using XFie, JSON, Web Service, DES and other technologies, and combining with the MySQL database, some functions were achieved such as data reception and distribution, authentication, online exam and exam results collection. The results show that the system improves the efficiency of resource utilization and examinations, ensures the fairness and impartiality of the examination, and helps businesses or educational institutions with less cost to complete the candidates geographically dispersed easily in real-time online jobs or exams.
    Online Examination System Based on Struts
    WU Yue-zhong, WANG Tao, YU Gui-jun
    2014, 0(12):  44-48.  doi:10.3969/j.issn.1006-2475.2014.12.010
    Asbtract ( 241 )  
    References | Related Articles | Metrics
    Online examination system can take advantage of the network, and improve the quality, efficiency, and equity of the exam paper and the test. It is an extension of the traditional examination room. So, for the problems of test paper quality and security access control in online examination system, combining the ideas of software engineering, we analyzed the overall structure of online examination system in detail, put forward the corresponding overall solution, and designed the software model of the system. In combination with the advanced teaching management method and based on the modern network technology, in this online examination system based on B/S architecture, we realized the functions of the role management, question bank management, test paper composition management, examination control, examination result announcement and query, by using the Struts framework and RBAC model and automatic test paper composition based on knowledge points and difficulty values. Finally, the test running showed that the system improved the quality of the exam paper, controlled flexibly, accessed security, realized good practicability.
    Person Recognition in Video Based on Unsupervised Method
    NING Bo, SONG Yan
    2014, 0(12):  49-53.  doi:10.3969/j.issn.1006-2475.2014.12.011
    Asbtract ( 236 )  
    References | Related Articles | Metrics
    In this paper, we propose a novel method for person recognition based on a salient learning with unsupervised. The salient features can be extracted without the person labels in the training procedure. First, we utilize patch matching with adjacency constrained to create dense correspondence between image pairs and it shows validity in processing misalignment problem caused by larger viewpoint and pose changes. Second, we learn person salience by applying an unsupervised approach. In order to improve the performance of experiment, the person salience is combined with patch matching. This approach on the VIPeR dataset is proved the effect is validated. And the performance is better than the eBiCov method and the eLDFV method.
    Abandoned Objects Detection in Intelligent Video Surveillance
    ZHANG Ju-qin, WANG Hai-yang, HU Zhen
    2014, 0(12):  54-57.  doi:10.3969/j.issn.1006-2475.2014.12.012
    Asbtract ( 266 )  
    References | Related Articles | Metrics
    A detection technology in intelligent video surveillance was researched. A method of automatically detecting abandoned objects and alerting in video surveillance environment was given, and also the detection algorithm was analysed in detail. By dynamic threshold background subtraction algorithms and background updating algorithm, the adaptability of the system in complex scenes was improved. This method can accurately detect the abandoned objects in the complex background, such as box, bag and so on, and provide key frames. The effectiveness of this method was confirmed by experimental results.
    Traffic Vehicle Flow Based on Video Detection Technology
    ZHANG Hong-bo, KUANG Yin-hu
    2014, 0(12):  58-63.  doi:10.3969/j.issn.1006-2475.2014.12.013
    Asbtract ( 198 )  
    References | Related Articles | Metrics
    The paper takes a video of city traffic crossing road as the research object. Firstly, we extract the background model from the video image, then get the move target by image differences. At the same time we can have the image pretreatment just like binarization and get rid of noise. And then we can achieve the vehicle count of virtual detection region. As a result, we get the vehicle flow information.
    Group Catering System Based on MVC and Entity Framework
    GAO Hong, WANG Ting-ting
    2014, 0(12):  64-68.  doi:10.3969/j.issn.1006-2475.2014.12.014
    Asbtract ( 190 )  
    References | Related Articles | Metrics
    Group catering pattern is an emerging pattern in the catering industry. There are many issues in this industry pattern, including a large number of manual operations and low level of information. Through the application of ASP.NET MVC framework and ADO.NET Entity Framework, this paper built a group catering information system with flexible system architecture, good scalability and maintainability. The system has implemented the basic information and data management, bid management, material requirements and purchasing management, inventory management and integrated main processes of group caterings enterprise, and has been applied in a Tianjin group catering company, effectively improves the company's information technology and standardization level.
    Meeting Management System Based on SSH Technology
    DAI Wei1,2, LIU Ming-jia1,2, LI Chen3
    2014, 0(12):  69-71.  doi:10.3969/j.issn.1006-2475.2014.12.015
    Asbtract ( 265 )  
    References | Related Articles | Metrics
    This article introduced the development of a meeting management system which has such functions as applying a meeting online, approving a meeting, managing meeting-room and designating meeting manager. This system adopts popular SSH framework composition and is of good maintenance ability. The system can reasonably arrange resources concerning meeting in an organization, make full use of meeting resource.
    A Dynamically Adjustive Congestion Control Algorithm Based on CTCP
    XIAO Tao, YU Wan-rong, FENG Zhen-qian, LIU Hua, WU Chun-qing, CHEN Tao
    2014, 0(12):  72-76+82.  doi:10.3969/j.issn.1006-2475.2014.12.016
    Asbtract ( 215 )  
    References | Related Articles | Metrics
    Space network has some characteristics, such as long transmission delay and high packet loss rate, which lead it difficult to use ground routing protocols in space network completely. CTCP is a new transport protocol using network coding technology, and experiment shows that its performance in space network environment is better than TCP’s. However, CTCP’s congestion control mechanism is similar to TCP-Reno’s, which congestion window is set statically, causes the result that the performance of CTCP’s congestion control in the complex network environment is not ideal. This paper presents a dynamically adjustive congestion control algorithm H-CTCP based on CTCP, which in real-time estimates the available bandwidth in space network, and dynamically sets the congestion window. Experimental results indicated that the improved congestion control algorithm H-CTCP is more suitable in space network of high packet loss rate, and increased transmission performance.
    Simulation of Cloud Medical Robotic System Based on Wireless Network
    WANG Xiao-lin1, FAN Jian-cong2
    2014, 0(12):  77-82.  doi:10.3969/j.issn.1006-2475.2014.12.017
    Asbtract ( 185 )  
    References | Related Articles | Metrics
    Medical robot is an emerging interdisciplinary which contains medicine, bionics, mechanics, materials science, computer science, operations research, robotics and other disciplines. It is mainly used in the patient's surgery, rescue, transportation and rehabilitation. The study and design of cloud robotics become essential trends with the technological developments of sensors, actuators, communication devices, and especially cloud computing. A cloud robot only has light-weight hardware and software configurations, which can offload computation-intensive tasks to be executed in remote cloud. The cloud medical robot transforms the intensive allocation of calculation or resources into intensive efficiency and functions, which can complete complex tasks more efficiently. In this paper, a cloud medical robotic system is constructed. The system consists of medical cloud platform layer and remote cloud robot layer. On the basis of system platform, we design two cloud medical robot systems using the wireless network technology. The simulation results show that the cloud medical robot system is of the characteristics of high efficiency and low cost.
    Improved OFDM Semi-blind Channel Estimation Algorithm
    CHEN Liang-liang, LIU Yu-ying, ZHAN Chun
    2014, 0(12):  83-86.  doi:10.3969/j.issn.1006-2475.2014.12.018
    Asbtract ( 191 )  
    References | Related Articles | Metrics
    Channel estimation algorithm can be divided into three categories for priori information: the estimation based on reference signal, blind estimation and semi-blind estimation. Semi-blind estimation is a channel estimation algorithm combined with the advantages of the blind estimation and channel estimation method and the estimation method based on training sequence. This paper obtains the channel estimation value through semi-blind channel estimation algorithm based on pilot assisted and semi-blind channel estimation algorithm based on direct judgment, then defines a confidence function to obtain the weighted coefficient γ, combines the semi-blind channel algorithm based on pilot assisted and the estimation algorithm based on direct judgment to effectively improve the accuracy of channel estimation.
    Routing Lookup Algorithm Based on Improved Hash Coding
    FENG Qing-hua
    2014, 0(12):  87-90+102.  doi:10.3969/j.issn.1006-2475.2014.12.019
    Asbtract ( 156 )  
    References | Related Articles | Metrics
    The routing lookup algorithm is one of the key technologies in network routers. In order to improve the efficiency of data routing lookup, a data routing lookup query matching algorithm is proposed based on the improved hash coding. Hash function is used to compress the data name, and the state switching array is used to match the longest prefix name quickly, and then routing node cache factors are introduced into the routing decision, finally the simulation experiments are carried out to test the performance of this algorithm. The results show that, compared with other data routing lookup query matching algorithms, the proposed algorithm not only reduces the cost of data memory, greatly reduces the average routing lookup time, and improves the efficiency of data routing lookup.
    A New Scheme of Key Management and Authentication for IOT
    QI Yong, XU Yang, LI Qian-mu
    2014, 0(12):  91-96+112.  doi:10.3969/j.issn.1006-2475.2014.12.020
    Asbtract ( 218 )  
    References | Related Articles | Metrics
    The paper notes a new scheme of key management and authentication for IOT to solve the security issues, like the date privacy during the communication and the authentication question. Through the program and protocol performance and security analysis, the results show that the scheme can better meet low resource, high interaction rates, high mobility, low data volume environments and the communication protocol security requirements. Through research-based public key authentication key agreement protocol, the scheme adds a tripartite authentication mode to achieve a valid key authentication.
    Simplified SET Protocol Based on Small System Theory
    LUO Min1,2, FANG Lin3, SHI Wei-li1,2
    2014, 0(12):  97-102.  doi:10.3969/j.issn.1006-2475.2014.12.021
    Asbtract ( 177 )  
    References | Related Articles | Metrics
    In this paper, we use the Promela language to model formally for the simplified SET payment protocol proposed by Lu & Smolka based on small system theory, and use LTL (linear temporal logic) formulas to describe the authentication property of the protocol. Under the hypothesis of the network environment being controlled by the intruder, we use SPIN to find the attacks, and adopt optimization strategies of atomic and Bit-state hashing technology to reduce the complexity of model checking and improve the efficiency of verification. Finally, we put forward the improvement solution for the existing vulnerabilities of the SET protocol.
    Online Monitoring of Chemical Engineering Explosion-proof Motor Based on Acoustic Features
    LI Jun, LI Wei-xin, LI Jian-ping
    2014, 0(12):  103-106.  doi:10.3969/j.issn.1006-2475.2014.12.022
    Asbtract ( 205 )  
    References | Related Articles | Metrics
    There are various problems appearing in normal work process of explosion-proof motor. In order to eliminate these uncertainties, this paper puts forward a fault monitoring technique based on acoustic characteristics. In this paper, we use the method of Mel frequency cepstrum coefficient for feature extraction, with the purpose of improving the recognition rate of fault detection. In addition, we adopt hidden Markov models to identify the state. Thus the training fault model and the audio signal will achieve the best match.
    Desktop Virtualization Technology Based on VDI
    HUANG Sheng-yong1, WANG Yong-sheng2
    2014, 0(12):  107-112.  doi:10.3969/j.issn.1006-2475.2014.12.023
    Asbtract ( 183 )  
    References | Related Articles | Metrics
    For the deficiencies in the electric power industry that the management of various terminals is difficult, the security of the terminals’ data is not ensuring and the resource is not fully using, this paper uses the desktop virtualization technology based on VDI to improve these deficiencies. In this paper, we described the mainstream technology and application situation of desktop virtualization technology, introduced the technical elements and architecture of VMware View desktop virtualization technology, analyzed implementation case of desktop virtualization in a power industry enterprise, explored on common problems in desktop virtualization technology, and finally summarized the present application situation and the trend which can be promoted in electric power industry’s desktop virtualization technology.
    Modeling of Production System of New Wall Materials Based on Petri Net
    ZHOU Lin-yu1, TU Hai-ning2, FENG Yong-ping1
    2014, 0(12):  113-116+120.  doi:10.3969/j.issn.1006-2475.2014.12.024
    Asbtract ( 194 )  
    References | Related Articles | Metrics
    The production of new wall materials is a process of manufacture with continuous production time and single process route. It is of the characteristics of less products, fixed raw material formula, strict process control. The time and the change rate of Petri net were researched in this paper. Petri net model of new wall materials production system was found by the mature Petri net theory. The largest production rate was obtained by time Petri net model. The enterprises can reach to the state of production with this system model owing to coordinate production by selectively reference. 
    Key Technologies of VFP in Test System
    NIU Yong-jie, XUE Ning-jing
    2014, 0(12):  117-120.  doi:10.3969/j.issn.1006-2475.2014.12.025
    Asbtract ( 212 )  
    References | Related Articles | Metrics
    In order to realize the automatic evaluation of the results of operating Visual FoxPro, the VFP table file format is deeply studied. With Visual Studio 2008 as development platform, using the method of reading and parsing table file byte by byte, we developed table file parsing library. Through the comparison of the candidates answer file operating results by the application of the library reading and the standard answer, the library can complete the automatic grading process. The automatic grading process improves the teaching efficiency, reduces the workload of teachers, and is of some practical value.