Loading...

Table of Content

    19 January 2015, Volume 0 Issue 1
    Controlling System for Intelligent Integrated Child Safety Seat
    ZHANG Rui-feng, CAO Li-bo, GAO Kang
    2015, 0(1):  1-7+14.  doi:10.3969/j.issn.1006-2475.2015.01.001
    Asbtract ( 264 )  
    References | Related Articles | Metrics
    The paper developed a controlling system on the integrated child safety seats platform which was already built, taken the “child restraint systems safe height” as the protection mechanism and based on the Android platform and MC9S12SX128MAA microcontroller. The controlling system send data to the microcontroller via bluetooth based on Android platform and the data includes the height of child and the controlling commands, the MCU will automatically adjust the height of the seats according to the instructions. The system has developed a complete set of hardware circuit and controlling programs and has made the hardware ring test with the phone clients, through which the signal reception accuracy was 100% and the maximum error between the theory and the practical height of the seat is 3.5%.
    An Epidemic Spreading Research on Small World Network Based on Cellular Automaton
    ZHOU Bin-bin,CHEN Xue-bo
    2015, 0(1):  8-14.  doi:10.3969/j.issn.1006-2475.2015.01.002
    Asbtract ( 236 )  
    References | Related Articles | Metrics
     Social network has a characteristic of small world, with high cluster coefficient and short average distance. In order to do some research on epidemic spread in small world network and points’ voluntary suppressions under a global warning, a model based on CA(cellular automaton) is proposed. Combining with normal cloud model, we give the model some adaptive properties. Points in the model can break links and connect to others. Under a global warning, we let points abide by danger awareness function. Using AHP model, they are inclined to avoid danger points. Simulation results show that this model is good at simulating epidemic spread and it gives us an explanation of why global warning can postpone the epidemic spread on a network.
    Software Failure Modes and Effect Analysis Method Combined with Ontology and Rule Reasoning
    ZHU Yi-quan, SHEN Guo-hua, KANG Da-zhou, LIAO Li-li
    2015, 0(1):  15-20.  doi:10.3969/j.issn.1006-2475.2015.01.003
    Asbtract ( 239 )  
    References | Related Articles | Metrics
    Failures in safety-critical software will lead to catastrophic consequences. Software failure modes and effect analysis(SFMEA) is a safety analysis method which is commonly used in industry. However, the SFMEA method relies on manual analysis, thus it has poor reusability and low accuracy. To solve these problems, this paper proposes a creative SFMEA method combined with ontology and rule reasoning. Firstly, the SFMEA ontology is developed to accurately describe the software failure knowledge. Secondly, rules are built to describe the failure analysis processes using semantic web rule language(SWRL). According to the failure causes, the reasoning engine can analyze the failure effects automatically. At last, a case study of engine flameout-state module analysis confirms the feasibility and practicality of the research.
    Safety Analysis for Avionics System Based on Model Driven
    XING Ni-zhou, WANG Li-song
    2015, 0(1):  21-26.  doi:10.3969/j.issn.1006-2475.2015.01.004
    Asbtract ( 223 )  
    References | Related Articles | Metrics
    This paper introduces a new modelbased method for safety analysis to address the problem of failure modes integrity, dynamic failure and data consistency that currently encountered in safety assessments for integrated avionics system. The method model integrated avionics system hierarchically with layers of application operation, function and resource. It simplifies a large part of the analysis, the development of fault trees, and can guarantee the consistency of results. AADL language is used to model application layer to check the integrity of operations modes and AltaRica is used to model dysfunction of system to solve the problem of dynamic failure. The efficiency and practicality of the method is illustrated by analyzing safety of auto pilot system through Osate tool which used for analyzing operational modes of application and SimFia tool which used for safety analysis.
    Dual GPU Radix Sort Algorithm Based on OpenCL
    ZHAO Cheng-long1, SHI Hui-bin1, YU Xin-feng2
    2015, 0(1):  27-30.  doi:10.3969/j.issn.1006-2475.2015.01.005
    Asbtract ( 339 )  
    References | Related Articles | Metrics
     In order to improve resource utilization rate and algorithm acceleration ratio of radix sort on heterogeneous parallel platform, this thesis proposed the implementation of dual GPU radix sort algorithm based on OpenCL. Through research the idea of parallel radix sort, this thesis uses Y485P as exprimental platform, firstly realizes the radix sort on single GPU based on OpenCL, then realizes the radix sort on dual GPU by load balancing. Test results show that when using single GPU, the speedup is 1.3x, using dual GPU is 2.32x.
    Adaptive RFID Data Cleaning Algorithm Based on Sliding-window
    FENG Hui-ying, ZHOU Liang
    2015, 0(1):  31-36.  doi:10.3969/j.issn.1006-2475.2015.01.006
    Asbtract ( 196 )  
    References | Related Articles | Metrics
    RFID (radio frequency identification devices) tag reader is very sensitive to the operating environment, which causes the produced RFID data flow unreliable, containing a large amount of missing words in reading, therefore, it’s necessary to cleanse the original data. An adaptive data cleansing algorithm based on sliding window is designed, which employs the sliding window technology and binomial distribution model to calculate the appropriate size of windows and dynamically adjusts the size of the window through the monitoring results of the subinterval windows and the states of the tags. Results show that this algorithm produces fewer errors on average than SMURF algorithm, that its performances are more superior and that its accuracy and stability are obviously improved.
    A Data Fusion Algorithm Based on Clustering Technology
    MAO Zhi-min, ZHENG Hong-yuan, DING Qiu-lin
    2015, 0(1):  37-40+60.  doi:10.3969/j.issn.1006-2475.2015.01.007
    Asbtract ( 179 )  
    References | Related Articles | Metrics
    In view of the constraint of energy cost in wireless sensor network node and privacy of communication data, a data fusion algorithm based on clustering technology was proposed. The algorithm solves the delay of data communication by the clustering technology. To reduce the traffic of data and protect data privacy, we use a proper algorithm to select the head cluster and construct data fusion tree structure to fusion data within a cluster. Among clusters, mobile agent model is used to select the best route to improve communication efficiency. Experimental results show the DFACT algorithm can effectively reduce the energy cost of largescale wireless sensor network, enhance data security and prolong the network lifetime.
    Multi-index Evaluation Method Based on Intermediation Theory
    CHEN Xin, ZHANG Yu-ping, CHEN Hai-yan
    2015, 0(1):  41-45.  doi:10.3969/j.issn.1006-2475.2015.01.008
    Asbtract ( 192 )  
    References | Related Articles | Metrics
     Nowadays, fuzziness is still a problem for many existing multiindex evaluation methods, which brings some negative effects to the evaluation results. However Intermediation Theory is good at dealing with fuzziness. Combined with Analytic Hierarchy Process (AHP), a multiindex evaluation method based on Intermediation Theory is proposed. An application of this method in evaluating software process performance is given, in which Weighted Average Method, TOPSIS and Entropy Weight Method are compared with this method. The application results show that Mediation Weighting Method can be well applied to software process evaluation.
    Parallel Reverse Skyline Query over Uncertain Data Streams
    ZHANG Jian-rong, MAO Yu-guang
    2015, 0(1):  46-52.  doi:10.3969/j.issn.1006-2475.2015.01.009
    Asbtract ( 228 )  
    References | Related Articles | Metrics
    As an important variant of Skyline query, reverse Skyline query over uncertain data streams has become a hot topic recently. However, existing standalone algorithm can’t cope with data streams with highspeed, high data dimensions, large sliding windows, etc. A novel parallel processing algorithm named PRSUDS is proposed. PRSUDS adopts anglepartitioningbased dispatch strategy to assign processing tasks to peer nodes; the correctness of the dispatch strategy is presented. Then the design and implementation of parallel processing framework are presented. Results of massive experiments show that PRSUDS has better overall performance compared to existing algorithms.
    Modeling and Retrieval of Assembly Process Knowledge Base for Aerospace Products
    QIN Lin1, XUE Shan-liang1, GU Yong2, LI Jian-ping2, XU Ping-yuan2
    2015, 0(1):  53-56.  doi:10.3969/j.issn.1006-2475.2015.01.010
    Asbtract ( 213 )  
    References | Related Articles | Metrics
    In consideration of the characteristics of a huge number and multifarious assembly process knowledge for some aerospace enterprise, a classification framework of process knowledge was established after collating the knowledge of assembly process. By analyzing the modeling methods of assembly process knowledge based on ontology, the ontology model of assembly process was constructed and encoded by Ontology Web Language (OWL). After that, in order to calculate semantic similarity among different concept of the domain ontology, a semantic similarity algorithm based on the ontology was put forward, which integrated semantic similarity based on distance and semantic similarity based on attribute, and the effectiveness of its result was verified through a calculation to some fragment of the process knowledge. At last, the knowledge model and the semantic similarity algorithm were applied to the knowledge base of the assembly process, which implemented the orderly management and sharing and reuse of assembly process knowledge for a type product.
    Anomaly Detection Based on Sparse Bayesian Regression
    苏乐群,冯爱民
    2015, 0(1):  57-60.  doi:10.3969/j.issn.1006-2475.2015.01.011
    Asbtract ( 140 )  
    References | Related Articles | Metrics
    The data can be regarded as outliers highly intermixed with normal data in the field of anomaly detection. With minimal loss of normal information in the model, outliers are viewed as the top K samples holding maximal abnormal information in a dataset. Inspired by this idea, an anomaly detection model based on sparse bayesian regression which taken the Bayesian inferring framework into traditional kernel function was proposed to find the sample serious deviated from the model though the result of regress estimation. Experiment results show that this algorithm is of good sparsity and detection accuracy.
    Information Publishing Software System Model
    HU Nai-jun1, GUO Zhi-zhuo2, LIU Qing3, QIU Li-ke4
    2015, 0(1):  61-65.  doi:10.3969/j.issn.1006-2475.2015.01.012
    Asbtract ( 174 )  
    References | Related Articles | Metrics
     Many websites operation maintenance is too complicated, thus impeding the information publishing and updating function. In this thesis, we presented a software system model of information release. The information release system design is based on ASP.NET technology. With the purpose of the correctness and timeliness of information release, according to the design idea of modularization, dynamic information Web pages are generated. To simplify information updating work is to only need to input the text and pictures, thus reducing the workload of maintenance of the Website. The pressure test of the design shows that the design of the system model is reasonable, the system stability is good.
    QoSbased Reliability Composite Service Recommendation Model
    TAN Wen-an1,2, CAI Xiao-dan1, LU Guang-zhen1, XUE Jian-xin2, TANG Shan2
    2015, 0(1):  66-70.  doi:10.3969/j.issn.1006-2475.2015.01.013
    Asbtract ( 183 )  
    References | Related Articles | Metrics
     Market demand and service credit are dynamically changing. However, there hasn’t been a unified and  reliable service system. The paper proposes a reliable composite service recommendation model based on thirdparty supervision. A thirdparty mechanism is brought in to supervise and administrate the establishment of service library and to monitor the dynamic changes of quality of service; a reliable service composition platform is established to select services, recommend best service composition and perform other functions; taking the process flow of some manufacturing as an example, the paper compares the cost of works using the model and without using the model through a case of service composition optimization based on workflow scheduling, which also verifies the feasibility and superiority of the proposed recommendation model.
    A Method for Implementing Template Matching Mechanism in TTCN-3 Test System
    ZHENG Bing1, YE Xin-ming2
    2015, 0(1):  71-74+87.  doi:10.3969/j.issn.1006-2475.2015.01.014
    Asbtract ( 180 )  
    References | Related Articles | Metrics
     TTCN-3 had a powerful template matching mechanism which is easy to master. A generic and open solution to implementation of template matching mechanism in the TTCN-3 test system was presented. The role of the template matching in the TTCN-3 test system was analyzed. Template matching mechanism representation and template matching operations in TTCN-3 test system were implemented using objectoriented programming language C++. As an example, an ATS for functional test of the DNS protocol was given to verify the rationality of the design.
    A Relevance Feedback Method Based on Interest Region Detection in Image Retrieval System#br#
    WANG Meng-lei
    2015, 0(1):  75-80.  doi:10.3969/j.issn.1006-2475.2015.01.015
    Asbtract ( 192 )  
    References | Related Articles | Metrics
    This paper proposed a relevance feedback approach in image retrieve system. The approach is based on the detection of interest region of the query user. This approach makes use of the positively relevant images which are labeled by user and learn the user intention of the query so that the return images satisfy the user better. This approach can be divided into 3 steps: 1) match the features of positively relevant images to those of the query image; 2) verify the matched points using RANSAC model; 3) select the interest region according to the verified points. As the interest region has been selected, one can use this region or put more weight on the features in this region as a new query image. The results of the experiments show that this approach can improve the precise of the retrieval and return images that satisfy the user better.
    Application of Symmetrical SURF with Global Context in Vehicle Detection
    XIONG Yan-cheng, SUN Han
    2015, 0(1):  80-83.  doi:10.3969/j.issn.1006-2475.2015.01.016
    Asbtract ( 171 )  
    References | Related Articles | Metrics
    SURF(SpeedUp Robust Features) is a robust and fast descriptor for many applications, but neither can it detect symmetrical matches, nor can it consider global context. This paper combines symmetrical SURF with global context. It enables SURF to detect symmetrical matches through mirroring transformation and reduces mismatches when local descriptors are similar. The proposed algorithm is used in vehilce detection. The experiments show that symmetrical SURF with global context improves the accuracy of feature matches and vehicle detection.
    A Facial Expression Recognition Method Based on Deep Learning
    WANG Jian-yun1,2, LI Xiao-xia1,2
    2015, 0(1):  84-87.  doi:10.3969/j.issn.1006-2475.2015.01.017
    Asbtract ( 283 )  
    References | Related Articles | Metrics
    According to the problem that traditional facial expression recognition method could not act a robust performance, we propose an algorithm based on deep learning. First of all, we train two sparse auto encoder in two scales, and the parameter of the hidden layer should be a series of convolutional kernel, we use these kernels to extract firstlayer features. Then we get secondlayer features through maxpooling operators, it improves the invariance of the features. Finally we parallelize seven fourlayers neural networks to accomplish the recognition task. The experiment result shows this deep neural networks structure act a robust performance in facial expression recognition task in the case of the test samples’ ID information did not appear in the training samples.
    Latency in AFDX Based on Multi-link Group Technology
    SUN Quan, WANG Li-song, XING Ni-zhou
    2015, 0(1):  88-91.  doi:10.3969/j.issn.1006-2475.2015.01.018
    Asbtract ( 140 )  
    References | Related Articles | Metrics
    Using arrival curve and service curve technique of the network calculus theory, we study the AFDX network delay envelope and find the flows serialization is an important factor in obtaining tight latency bounds. This paper proposes a multilink packet technology based on this fact. Finally, experiments show that the use of multilink packet technology can get more tight latency upper bound which is an effective method to analyze AFDX network determinacy.
    Research and Improvement of Scheduling Algorithms in Networked Supervisory Control System Based on CAN-bus
    CHEN Fei, XIE Jian
    2015, 0(1):  92-95+101.  doi:10.3969/j.issn.1006-2475.2015.01.019
    Asbtract ( 195 )  
    References | Related Articles | Metrics
    The insufficient of realtime classic scheduling algorithms including RM, EDF and MEFTOD is analysed. Considering the characteristics of the communication objects in actual networked supervisory control system, a hybrid scheduling algorithm in combination with CANbus protocol is designed. The model of networked supervisory control system is established by using TrueTime toolbox, through which the algorithm is simulated and analysed, and the effectiveness of the algorithm is proved.
    UART Communication Based on System Generator
    YU Zhong-quan1,2, WANG Yi-cheng1,2, WU Da-qing1,2, CHEN Xi-yuan1,2, ZHANG Xiao-liang1,2, LIANG Yong-qing1,2
    2015, 0(1):  96-101.  doi:10.3969/j.issn.1006-2475.2015.01.020
    Asbtract ( 265 )  
    References | Related Articles | Metrics
    The paper introduces the use of System Generator of Xilinx that is system level modeling tool in the MATLAB/Simulink environment for the completion of algorithm modeling of the UART procedure, generates the corresponding code to the FPGA, and realizes the function between UART communication data sending and receiving. Experiment results show that the System Generator as a system level modeling tool is not only to eliminate the gap between the original system engineers and hardware and software engineers, but also to simplify the traditional development process of the FPGA.
    Clustering Routing Algorithm on Wireless Sensor Networks Based on Energy Qualization
    TANG Cui-wei
    2015, 0(1):  102-104+121.  doi:10.3969/j.issn.1006-2475.2015.01.021
    Asbtract ( 160 )  
    References | Related Articles | Metrics
    In order to prolong the life of wireless sensor network, a novel clustering routing algorithm is proposed in wireless sensor networks based on energy equalization. Firstly, the new algorithm classifies nodes into two areas by using energy threshold and remaining energy of nodes, which makes nodes located in different areas have different probabilities of being elected as cluster head nodes. In the stage of data stable transmission, cluster heads and the base station use combined singlehop and multihop communication mode. Finally, the simulation experiment is used to test performance of the algorithm. The results show that the proposed algorithm can effectively improve the network energy efficiency and achieve energy consumption balanced among nodes, so it can prolong the life of wireless sensor network.
    Verify and Check System on Graduate Entrance Examination
    GONG An, GAO Yun, GAO Hong-fu
    2015, 0(1):  105-108.  doi:10.3969/j.issn.1006-2475.2015.01.022
    Asbtract ( 250 )  
    References | Related Articles | Metrics

    To prevent cheating in exams and alleviate the pressure of statistical work, this paper designs and implements a verify and check system on graduate entrance examination. The system uses the second generation ID card reader, SQL Server 2005 database, Visual Studio 2010 development platform to deploy, uses multi-threaded, dynamic link library technology. The system mainly has three functional modules: approach the reader, statistical information, settings. The paper describes details of two methods in real-time reader: real-time monitoring data files and real-time monitoring machine interface. The system is simple and practical, applied for two consecutive years in the Graduate Entrance Examination, and has broad prospects and certain research value.

    RFID Tags of Drunk Driving Monitoring Systems Vehicle-mounted Terminal
    LIN Ji-yan1, LI Yao2
    2015, 0(1):  109-112.  doi:10.3969/j.issn.1006-2475.2015.01.023
    Asbtract ( 189 )  
    References | Related Articles | Metrics
    In order to efficiently monitor drunk driving, a monitoring system based on RFID and GPRS is put forward. The system uses the alcohol detection module to test alcohol concentration of the drivers. The active RFID tags can be waked from the power down mode to communicate with the RFID readers that can be deployed fixed in somewhere or in the hands of the traffic police on the duty in order to realize the intelligent identification of the drunk driving vehicles as well as the intercept and trace of the drunk driving vehicles within the scope of the polices inspection. Because of the finite life of the active RFID tags, the system only wakes the tags up when the alcohol detection module detects that the alcohol concentration is out of limits which can reduce the tags power consumption efficiently and prolong the tags service life.
    Design and Application of Orthogonal Software Architecture
    SONG Lei, LIU Guang-yao, ZHOU Lei, LI Yan
    2015, 0(1):  113-116.  doi:10.3969/j.issn.1006-2475.2015.01.024
    Asbtract ( 244 )  
    References | Related Articles | Metrics
    This paper discusses that the basic idea and framework of OSA (orthogonal software architecture). Through a project using this framework, we investigate the process of design and evolution of OSA. It is proved in practice that OSA has many advantages in respects of project requirement, project development and project management.
    Integration and Application of Open Source Video Systems in Sakai
    HUANG Hong-hui1, XU Xiao-dong2
    2015, 0(1):  117-121.  doi:10.3969/j.issn.1006-2475.2015.01.025
    Asbtract ( 233 )  
    References | Related Articles | Metrics
    Faced with the problems: lack of unified management of audio and video resources, high pressure of multiuser concurrent access in the process of building a new generation of network teaching platform, this paper integrated the Sakai and Kaltura based on the analysis of Sakai and Kaltura architecture. It has reached a good effect in the process of audiovisual teaching resource management in a university, which also can provide a feasible reference plan for colleges and universities which have the similar needs.
    Drug Anti-counterfeiting System Based on QR Code
    ZHOU Xiao-qing, LU Tao, JIAO Qiang
    2015, 0(1):  122-126.  doi:10.3969/j.issn.1006-2475.2015.01.026
    Asbtract ( 236 )  
    References | Related Articles | Metrics
    According to current situation of drug security, using Visual Studio 2010 as software development platform, C# as the programming language, SQL Server 2008 as the database, a system based on anticounterfeiting technology and encryption technology was developed. The system includes QR code generation module, query module, test module, information feedback module, data statistics module, etc. The experimental results show that the consumers can easily query the authenticity of a drug and the drug anticounterfeiting system is convenient, practical and reliable.