Loading...

Table of Content

    17 April 2013, Volume 1 Issue 4
    人工智能
    Human Action Recognition System Based on Topic Model
    SHI Wei;
    2013, 1(4):  1-4.  doi:10.3969/j.issn.1006-2475.2013.04.001
    Asbtract ( 504 )  
    Related Articles | Metrics
    Human action recognition from video sequences is a challenging problem in computer vision. This paper uses the bag-of-words paradigm inherited from text analysis to represent a clip of video as a document. The local features are extracted from spatio-temporal interest points which are points with local maximum variation in both space and time domain. Then topic models on video documents are applied to analyze the latent topics and actions in the video are recognized in a discriminative fashion. The proposed system is tested on both simple and complex data sets. Experiment result shows that the approach is comparable or better than all published state-of-the-art methods.
    Research on Method of Speaker Verification Based on Support Vector Data Description Model
    CHEN Jue-zhi;ZHANG Gui-rong;ZHOU Yu-huan
    2013, 1(4):  5-9.  doi:10.3969/j.issn.1006-2475.2013.04.002
    Asbtract ( 531 )  
    Related Articles | Metrics
    With the purpose of improving the performance of speaker verification, a novel speaker verification method based on support vector data description (SVDD) model is proposed. The traditional hard decision method of SVDD is changed to a novel soft decision method based on the sample acceptance rate, therefore the confidence scores are normalized to the value [0,1] so as to simplify the threshold value setting. Simulation experiments show that the performance of speaker verification based on this novel method is remarkably better than that based on Gaussian mixture model (GMM) customarily.
    Game Level Automatic Generating Method Based on Data Mining and Data Fusion
    QI Yan-jun;ZHANG Bing-yi;FENG Zhi-yong
    2013, 1(4):  10-14.  doi:10.3969/j.issn.1006-2475.2013.04.003
    Asbtract ( 492 )  
    Related Articles | Metrics
    In game development, if scene design as the focus is designed one by one, a lot of time and capital will be spent, and players stick low degree. Therefore, a game level automatic generation method based on data mining and data fusion technology is presented. Firstly, the method preprocesses the game play data by using the discretization of Boolean logic combined with rough set theory, puts forward an attribute reduction algorithm based on information gain to eliminate the redundant attributes. Secondly, a decision tree is constructed by using the ID3 algorithm to build an evaluation model of game difficulties. Then the D-S data fusion algorithm is used to get the data reflecting the players behavior, and the data is processed with the decision tree to get the difficulty level of the game for players. Finally, the game level parameters are modified to automatically generate the game level according to the difficulty level. By the experiment of Sokoban game for example, the results show that the method is effective to reduce development cost and to improve playability.
    Chinese Keyword Extraction Method Based on Multi-features
    HUANG Xuan;LI Wei
    2013, 1(4):  15-17.  doi:10.3969/j.issn.1006-2475.2013.04.004
    Asbtract ( 508 )  
    Related Articles | Metrics
    Chinese keyword extraction is a worthy problem for study in natural language understanding. By using the TFR*IDF, part of speech, the first of the current position of features as the extraction characteristics of the Chinese document keywords extraction, while features of weight trained by the BP neural network, eventually it can get Chinese keyword. By analog simulation, it is proved that the method is effective.
    A Method for Determining Two Graphs’ Isomorphism Based on Dissimilarity of Subgraphs’ Vertex Valency
    XIE Ke;WU Wen-quan;LIU Hong-jiang
    2013, 1(4):  18-21.  doi:10.3969/j.issn.1006-2475.2013.04.005
    Asbtract ( 438 )  
    Related Articles | Metrics
    给出一个源于Ulam猜想的图同构的定理,基于该定理得到的同构算法可以借助子图的结点度数来寻找结点间的对应关系。对结点度数重复率不高的图可以极大减少其同构判定的时间复杂度。
    Stock Market Time-series Prediction Based on Weibo Search and SVM
    ZHOU Sheng-chen;SHI Xun-zhi;QU Wen-ting;SHI Ying-zi;SUN Yun-chen
    2013, 1(4):  22-26.  doi:10.3969/j.issn.1006-2475.2013.04.006
    Asbtract ( 525 )  
    Related Articles | Metrics
    With the rapid growth of Weibo, its vast data mining technology has become a major academic topic in recent years. This paper provides a method of time-series prediction on stock market based on Weibo search and support vector machines (SVM), aiming at the application of Weibo data mining in the financial area. Topics, future trends and sentiments can be achieved three-level-classification on the basis of Weibo search, which can monitor investors’ sentiments on Weibo and calculate related sentiment indexes, namely bullish sentiment index (BSI (1)) and bearish sentiment index (BSI (2)). The multi-variable time-series prediction based on history data and BSI (MTPH&BSI) has formed, attributed to the introduction of the two indexes to the single-variable time-series prediction based on history data. After training patterns, optimizing parameters and testing patterns of prediction, the experimental results show that the proposed prediction model is better than the traditional model in predicting performance and generalizing abilities. This paper is significant to study the service capabilities of socialized media as Weibo.
    Reviews of Relevance Algorithm in Focused Crawler
    WANG Shuai;ZHOU Guo-min;WANG Jian
    2013, 1(4):  27-30,3.  doi:10.3969/j.issn.1006-2475.2013.04.007
    Asbtract ( 507 )  
    Related Articles | Metrics
    This paper describes the goal of relevance algorithm and relevance calculation connotation in focused crawler. Then, according to the evolutionary point of view of information processing, it systematically analyzes the current relevance calculation method of focused crawler in three levels: character layer, language layer, semantic layer, and compares the advantages/disadvantages among algorithms from different levels. Finally, it summarizes the current research results and indicates the direction in future works.
    Application of Data Warehouse and OLAP Technique in Group Financial Analysis
    HU Yang;YUAN Jian-hua
    2013, 1(4):  31-35,3.  doi:10.3969/j.issn.1006-2475.2013.04.008
    Asbtract ( 487 )  
    Related Articles | Metrics
    Group companies have accumulated large amounts of financial data during the informatization process in many years. How to deeply use these data to improve the level of financial analysis and decision-making is the key problem of group informatization development. This paper proposes a financial analysis and supervision system based on data warehouse and OLAP technique. The system can analyze and query the financial data in multidimensional way to provide decision support for users.
    Analysis of Debris Flow Infrasound Signal Based on Time-frequency Analysis Methods
    XU Wen-jie;GUAN Hong-yun;WU Xiao-lin
    2013, 1(4):  36-39.  doi:10.3969/j.issn.1006-2475.2013.04.009
    Asbtract ( 503 )  
    Related Articles | Metrics
    Debris flow is a common disaster in the mountains. It brings serious threat to the mountain transportation, hydraulic and hydro-power engineering and security of life and property of local residents. When debris flow happens, it is ferocious and of destructive power. Debris flow generates infrasound signals when it happens. This paper explains the characteristics of the infrasound signal which is generated by debris flow, and introduces the Hilbert Huang transform (HHT) time-frequency analysis method. Then HHT is compared with the other time-frequency analysis methods like the short-time Fourier transform (STFT) and the Wigner-Ville distribution (WVD). The simulation results show that the Hilbert Huang transform is more suitable for the analysis of infrasound signal generated by the debris flow than the other time-frequency analysis methods.
    Design and Implementation of AMT Diagnostic System Based on CAN Bus
    DOU Qiao;QIN Gui-he
    2013, 1(4):  40-43.  doi:10.3969/j.issn.1006-2475.2013.04.010
    Asbtract ( 360 )  
    Related Articles | Metrics
    In order to address the drawbacks of the traditional mechanical automatic manual transmission which are high-electronic and difficult to control, this paper establishes an AMT ECU diagnostic software on Intel 80C196KC chip micro computer, which achieves the function of reading and controlling of AMT ECU data like fault code, combined with friendly human machine interface using KWP2000 communication protocol based on CAN bus.
    Cooperative Method of Multiple Police Agents Task in RoboCup Rescue Simulation
    ZHANG Chao-chao;YANG Yi-min
    2013, 1(4):  44-47.  doi:10.3969/j.issn.1006-2475.2013.04.011
    Asbtract ( 390 )  
    Related Articles | Metrics
    The result of police agents task cooperation affects the overall efficiency of rescue directly. How to cooperate in case of no police centers, this paper proposes a kind of cooperative method based on priority. Through setting on priority, it improves the multiple police agents cooperative efficiency on important tasks. The simulation results prove the validity of this method of cooperation in rescue simulation system.
    软件工程
    Adaptive Data Sharing for Private Last Level Cache in Many-core Architecture
    YE Ying;LIU Pei-lin
    2013, 1(4):  48-52,5.  doi:10.3969/j.issn.1006-2475.2013.04.012
    Asbtract ( 383 )  
    Related Articles | Metrics
    The booming of many-core architecture and sharing data model applies new challenge to memory architecture. Neither traditional shared last level cache nor traditional private last level cache performs well in new situation. Cooperative Caching performs better in many-core architecture via incooperating advantages of both architectures. However, when facing many-core architecture, long-distance inter-core accesses, resulting from its unique reservation of victim line, greatly increases on-chip communication and leads to performance loss. Thus, this paper proposes an adaptive data sharing mechanism for private last level cache which allows multiple reservations of victim lines, with the degree of reservation adaptively adjusted. Simulation results show that compared with Cooperative Caching, the proposed adaptive data sharing mechanism reduces on-chip communication by 12.8% at average and by 32.7% at best; overall performance is improved by 9.1%. The result proves the proposed architecture performs better under the situation of many-core architecture and sharing data model.
    Design and Implementation of Universal Test Platform of College Computer Public Course
    YAN Bao-quan
    2013, 1(4):  53-56.  doi:10.3969/j.issn.1006-2475.2013.04.013
    Asbtract ( 435 )  
    Related Articles | Metrics
    There are various kinds of college computer public courses and numerous students, it is very necessary to establish a computer public course universal test platform. This article introduces the design of universal test platform, describes the design of system architecture, question types, scoring strategies, test paper generation strategies, questions distribution, test security, fault tolerance, and other issues. By verifying the partly established test platform, it is proved that the platform is running well, can reduce the marking workload of teachers, improves the efficiency of test, reflects the justice and fairness, and is worth promoting.
    Application Research on DML Triggers in Maintaining Database Integrity
    CHU Long-xian
    2013, 1(4):  57-59.  doi:10.3969/j.issn.1006-2475.2013.04.014
    Asbtract ( 601 )  
    Related Articles | Metrics
    Frequently updating data may undermine the integrity of database, and trigger properly designed can protect data effectively. The paper discusses the basic steps of data integrity control mechanism according to DML trigger technology in SQL Server 2005. It focuses on DML trigger work principle and implementation process with examples of triggers design. The test results show that the application of trigger improves the system performance and maintains the integrity of database.
    Research on Disk Array Simulation System Based on SAN Environment
    XU Hui;LI Xian-guo
    2013, 1(4):  60-63,6.  doi:10.3969/j.issn.1006-2475.2013.04.015
    Asbtract ( 391 )  
    Related Articles | Metrics
    With the explosive growth of digital information, the storage system has been researched focus of academic and industrial community. The complexity of hardware and software technology of disk array, the heterogeneous network environment, and the hardware costs have restricted the development of storage technology. The paper introduces a Simulator system, and this system is applied to SAN environment, provides the framework to solve the above problems. The experiments show that this simulation system is of good stability, and efficient simulation for storage system.
    Design of Fuzzy Inquiry with PowerBuilder Query Mode
    JIA Guo-dong
    2013, 1(4):  64-66.  doi:10.3969/j.issn.1006-2475.2013.04.016
    Asbtract ( 407 )  
    Related Articles | Metrics
    In order to resolve the problem of realizing the fuzzy inquiry with PowerBuilder query mode, this paper introduces the design idea about fuzzy inquiry with PowerBuilder. And the universal script of window, event and function in data window are given from the perspective of programming practice. The applications of actual project prove the good performance and generality of the design.
    Teaching Research on Comprehensive Training for Software Engineering Profession: A Case Study from Software School of Zhaoqing University
    MO Jia-qing;CHEN Hang
    2013, 1(4):  67-69.  doi:10.3969/j.issn.1006-2475.2013.04.017
    Asbtract ( 379 )  
    Related Articles | Metrics
    The problems existing in current software talents training process are analyzed, and a practical training program is proposed according to these issues and the situation of School of Software in Zhaoqing University. This paper elaborates all stages of the training program. The first stage is software development theory instruction, helping the students deeply understanding the enterprise development process and related software engineering standards. The second stage is knowledge strengthen and project practice, providing various forms of theory and practice to make up for the deficiency of the school knowledge under the guidance of an instructor, and then to provide students with some hot items which are advanced and close to the market industry as project simulation development. The last stage is the enterprise practice, arranging students to practice in enterprises, realizing the seamless connection of enterprise production. The program is a strong complement to the software engineering classroom teaching, focusing on improving the students professionalism and engineering capabilities, and trying to reduce the gap between software engineering student employment and manpower demand of software development companies.
    Spanner Database Trial
    CHEN Chao
    2013, 1(4):  70-72.  doi:10.3969/j.issn.1006-2475.2013.04.018
    Asbtract ( 502 )  
    Related Articles | Metrics
    Today, with arrival of the era of the large data and the cloud computing, either the relational database technology or non-relational database technology can not meet the development needs of the times. Combining the advantages of the two kinds of databases is the way to solve the problem. The Spanner is designed by Google based on this purpose. It is a collection of a variety of database outstanding technology and it represents a new trend of distributed database: NewSQL.
    图像处理
    Skills on Bar Code Recognition Based on Halcon
    GONG Pi-liang;LÜXi-sheng
    2013, 1(4):  73-76.  doi:10.3969/j.issn.1006-2475.2013.04.019
    Asbtract ( 417 )  
    Related Articles | Metrics
    On some complicated production lines, applications of the traditional LED based bar-code scanners are restricted, because of their unsatisfying recognition rate. While CCD cameras give high-resolution of bar-codes and with the advanced processing operators, they give better recognition results. This paper introduces the skills and applications using bar-code recognition operators in Halcon software, including the architecture of the procedure, the dimension, orientation, type, and check digit of the bar-code, and setting method for scan-lines. The methods to read the set parameters, and the application skills of the data structures such as the contour and the bar-code are also presented.
    Identification of Digital Traffic Signals Indicator Based on BP Neural Network
    REN Yong;PENG Jing-yu
    2013, 1(4):  77-80.  doi:10.3969/j.issn.1006-2475.2013.04.020
    Asbtract ( 387 )  
    Related Articles | Metrics
    Identification of digital traffic signals indicator is the process of analyzing image content based on the characteristics of digital indicator to identify, classify and recognize digital indicator target, including pretreatment, positioning, segmentation, identification and etc. This paper designs a more simple, accurate digital signal light recognition method by using the target detection algorithm based on the color-shape characteristics and the recognition algorithm based on BP neural network. Simulation experiments results show that this method is of higher accuracy rate and execution efficiency.
    Eye-input Interaction for Mobile Phones
    XIE Huan;ZHAO Xin-bo;HOU Yang
    2013, 1(4):  81-85.  doi:10.3969/j.issn.1006-2475.2013.04.021
    Asbtract ( 424 )  
    Related Articles | Metrics
    Eye input method has become a hotspot in the field of human-computer interaction for its fast feature and free of fatigue. This paper investigates the gaze-gesture interaction for mobile phones which is more suitable than the traditional method. Firstly, the paper designs twelve kinds of gaze gestures on the basis of prefix coding technology and uses them to input ten numbers, delete undesirable numbers and make a telephone call. Later, the paper designs the dedicated interface of human-computer interaction and uses it for analyzing and triggering the gaze gestures correctly. The gaze-gesture method is convenient, feasible and better according to the experiment results.
    Research on Texture Classification Based on Color Local Angle Binary Patterns
    TIAN Pei-yun;ZHENG Bi-bo;CHEN Wei-qing
    2013, 1(4):  86-89,9.  doi:10.3969/j.issn.1006-2475.2013.04.022
    Asbtract ( 387 )  
    Related Articles | Metrics
    In order to solve the problem of low classification rate of illumination texture color image classification, this paper uses a color local angle binary patterns method for color texture feature extraction and presentation. On one hand, the method solves the problem of LBP for lacking description to natural texture image spatial structures. On the other hand, it improves the classification rate of illumination texture image. In order to verify the validity of the proposed method, the paper first extracts CLABP features from Outex texture dataset, and then classifies texture image by using nearest neighbor matching. The experimental results demonstrate the classification rate of this method achieves 90%.
    Research on 3D Human Action Recognition Based on Period
    SU Wen-ying;LIU Yan;LI Wen-bo
    2013, 1(4):  90-94.  doi:10.3969/j.issn.1006-2475.2013.04.023
    Asbtract ( 390 )  
    Related Articles | Metrics
    Based on investigation of human motion modeling technology, a Period based modeling method is proposed. In this method, an assumption of human joints motion patterns is introduced, which points out every joints relative motion is limited on a half-sphere surface, then a half-sphere model is used to represent motion data. Then concept of Period is proposed, and in order to reduce data scale, the motion trajectory is approximated by multi group of Period sequence. At last, human action matching and recognition is reached. Experiments show that this method can raise the accuracy and efficiency of human action recognition.
    Edge Detection of Color Image Based on Quaternion and LOG Operator
    CHEN Wei-qing;TIAN Pei-yun;ZHENG Bi-bo
    2013, 1(4):  95-98,1.  doi:10.3969/j.issn.1006-2475.2013.04.024
    Asbtract ( 388 )  
    Related Articles | Metrics
    Edge detection plays an important role in digital image processing. Color image is mapped to a quaternion space, and the rotation transformation for color images is made in the quaternion space. The color image’s original component, strength component and color difference component can be obtained by rotation transformation, and the color difference component can be obtained by filtering the original component and the strength component. The LOG operator has better anti-noise performance, so the edge detection for color difference image is made by using the LOG operator, the vector convolution operation in hypercomplex space is changed into a scalar operation, which greatly reduces the computational complexity. Experiments show that the present method is correct.
    Cotton Impurity Rate Detection System Design Based on Machine Vision
    FENG Zhi-xin;An Hao-ping;WU Shun-li
    2013, 1(4):  99-102.  doi:10.3969/j.issn.1006-2475.2013.04.025
    Asbtract ( 481 )  
    Related Articles | Metrics
    Raw cotton impurities test technology is the key and difficult point at home and abroad in recent years. In order to detect the raw impurity rate, this paper puts forward a kind of method that uses the three channels of RGB digital image to get impurities. This method can make full use of all kinds of information provided by color images than the method that converts color images to gray images directly. This method firstly extracts gray image of three channels of raw cotton RGB image, then preprocesses the images, after threshold segmentation and mathematical morphology processing, finally calculates impurities area and impurity rate.
    Application of DCT Transform in Image Compression
    WU Ying
    2013, 1(4):  103-106.  doi:10.3969/j.issn.1006-2475.2013.04.026
    Asbtract ( 764 )  
    Related Articles | Metrics
    In the age of information explosion nowadays, image compression is one of the key technologies to promote the further development of multimedia technology. Due to the unique advantage of discrete cosine transform (DCT) in image compression and coding, it is widely extended and applied. This paper describes a DCT-based JPEG system, and analyzes the distribution of one-dimensional DCT and two-dimensional DCT pros and cons before and after transformation coefficients band from a mathematical point of view. And then using Matlab simulation software to simulate the fast-FFT algorithm and the DCT matrix transform algorithm, simulation results show that the DCT transform in image compression has the advantages of easy to implement and flexible, easy to operate and high compression quality.
    Methods of Object Shape Feature Extraction
    CHAI Hua
    2013, 1(4):  107-109,.  doi:10.3969/j.issn.1006-2475.2013.04.027
    Asbtract ( 481 )  
    Related Articles | Metrics
    With a brief introduction to the development of feature extraction of objects’ shape, the paper focuses on descriptor of objects’ shape. Finally some problems need to be solved and the research direction in the future are put forward.
    信息系统
    Design and Implementation of Liquor Safe Producing and Quality Traceability System Based on J2EE
    LIU Bo-ping;WAN Chang-lin;QIU Feng;LI Mu-hua;WANG Lei;DAI Huan
    2013, 1(4):  110-104.  doi:10.3969/j.issn.1006-2475.2013.04.028
    Asbtract ( 559 )  
    Related Articles | Metrics
    For solving the problems of information management and product tracing in liquor enterprises, this paper analyzes the safe producing and quality traceability requirement elements, based on the key producing points, according to the purchase, producing and sales processes of the medium-small sized liquor enterprises. Therefore, the liquor safe producing and quality traceability system is designed and implemented based on a free and open-source J2EE framework. With the integration of RFID and two-dimension barcode technologies, this system which manages the data generated during material purchasing, producing, inventorying, and product selling, could realize the monitoring and quality tracing of liquor producing and sales.
    Design and Implementation of Virtual Community DIY Planning System
    QIU Dong-mei;MA Chun-yong;CHEN Ge
    2013, 1(4):  115-119.  doi:10.3969/j.issn.1006-2475.2013.04.029
    Asbtract ( 521 )  
    Related Articles | Metrics
    For realizing the ideal that everyone involves in home design, the hotspot production concept of DIY is introduced into the field of community planning, and the community planning is shown in three-dimensional space through virtual reality technology. Based on the virtual geographic information 3D rendering engine VRGIS 3.0 platform, a virtual community DIY planning system is completed by using grid-based model support method. Combined with the CEGUI interface optimization technology and Windows 7 multi-touch display methods, the system is successfully applied to the 2012 Planning Exhibition in Qingdao. The system can meet the general public to participate in community planning requirements, at the same time it can also help professional designer work.
    Design and Implementation of Catering Services System Based on Android Platform and Web Service
    CAI Yi-bin;CHEN Zhi-wei;YANG Pei-zhao;HOU Chao-jun
    2013, 1(4):  120-124.  doi:10.3969/j.issn.1006-2475.2013.04.030
    Asbtract ( 521 )  
    Related Articles | Metrics
    This paper presents the analysis and design of a catering services system, which is composed of client and server. In particular, the client side of the system is developed by Android platform, which is composed of the modules of diner ordering and waiter operating. Here, the interacting between client side and server side of the system is designed via the Web Service API. The server side of the system not only supports the functions of input and design of menu, but also supports the functions of query and supervise for supervisor.
    Design and Realization of New Rural Digital Community Management System Based on Flex RIA WebGIS
    FU Da-jie
    2013, 1(4):  125-127,.  doi:10.3969/j.issn.1006-2475.2013.04.031
    Asbtract ( 1600 )  
    Related Articles | Metrics
    The community management informatization is of great importance to improve the new rural work efficiency and the process of rural civilization. This paper designs and implements a digital community management system based on Flex RIA and WebGIS with WebService framework.
    Design and Implementation of Three Layers Online Exam System Based on Client
    SU Jian;ZHANG Su-zhen
    2013, 1(4):  128-130.  doi:10.3969/j.issn.1006-2475.2013.04.032
    Asbtract ( 474 )  
    Related Articles | Metrics
    In order to solve the limit of existing exam system, three layers online exam system based on client is applied. This frame of exam system is of high credibility. At last, by enterprise practicing, the feasibility of design is validated.
    Research and Design of New Rural Cooperative Medical Information Platform at Municipal Level
    SONG Dan;CHENG Xue-bo
    2013, 1(4):  131-133.  doi:10.3969/j.issn.1006-2475.2013.04.033
    Asbtract ( 370 )  
    Related Articles | Metrics
    The article firstly introduces the system development background of new rural cooperative medical information systems. Based on the new rural cooperative medical information systems for counties, the information of new rural cooperative medical information systems for counties are integrated and interconnected, in order to build a municipal information platform. Then, the system requirements are analyzed, the functional modules are designed and the network architecture of municipal information platform of this system is made. The system promotes the digitalization and scientification of business management, and the work efficiency and service level are also promoted.
    Design and Implementation of Buying-Stock-Selling Management System Based on Ajax and J2EE
    LI Lu-lu;LIU Yi-song;JIANG Li
    2013, 1(4):  134-137.  doi:10.3969/j.issn.1006-2475.2013.04.034
    Asbtract ( 575 )  
    Related Articles | Metrics
    This paper designs a buying-stock-selling management system based on MVC design pattern by using the Ajax framework and J2EE framework, and explains in detail the architecture design and the function constituents as well as the realized method.
    Design and Implementation of Party Construction Management System of Higher Vocational College Based on Ajax
    ZHANG Rong-rong;FU Ce-rui
    2013, 1(4):  138-141.  doi:10.3969/j.issn.1006-2475.2013.04.035
    Asbtract ( 348 )  
    Related Articles | Metrics
    Party construction is an important part of work in higher vocational colleges. By some analyses of the work flow of party construction, a B/S mode of party construction management system is designed by combining the C# language and Ajax technology in Microsoft .Net platform, which makes informatization of party construction and improves management efficiency greatly.
    网络与通信
    A Benchmark Design for Multi-core Processors Supporting Wireless Baseband Processing
    CUI Ying;LIU Pei-lin
    2013, 1(4):  142-147.  doi:10.3969/j.issn.1006-2475.2013.04.036
    Asbtract ( 613 )  
    Related Articles | Metrics
    With the continuous development of wireless communication technologies, communication standards and protocols are frequently updated to meet the demands for high-speed data transmission. The traditional ASIC solution can provide good performance with relatively low costs, but the long development cycle and limited programmability cannot meet a variety of wireless standards required for the upgrade. Nowadays, with both powerful computation capabilities and high-degree flexibility, multi-core DSP has become one of the mainstream solutions for wireless communication baseband processing. However, there is no benchmark available for the performance evaluation of wireless baseband processor in industry and academia. This paper aims to study the wireless baseband communication system and extract the typical applications as a benchmark set for the assessment of multi-core processors supporting wireless baseband processing. The paper also provides the parallelism and complexity analysis.
    Research on Vertical Handover Based on MIH in Heterogeneous Networks
    ZHANG Qing-feng;LI Shi-ning;LI Jun-wei
    2013, 1(4):  148-152.  doi:10.3969/j.issn.1006-2475.2013.04.037
    Asbtract ( 562 )  
    Related Articles | Metrics
    Handover between heterogeneous networks is a key problem of mobility management in the next generation mobile network. In order to solve the problem, solutions in different network level and the scheme of MIH (Media Independent Handover) are discussed. In order to optimize vertical handover management, an approach based on MIH and mobile IP is proposed. A simulation of this approach is made by NS2 and the result shows good performance.
    A 3G User Traffic Prediction Approach Based on Naive Bayesian Classifier
    CHEN Xi;XUE Guang-tao
    2013, 1(4):  153-157,.  doi:10.3969/j.issn.1006-2475.2013.04.038
    Asbtract ( 468 )  
    Related Articles | Metrics
    As 3G network and the number of 3G users rapidly grow, the research on data analysis of 3G networks has become a hot topic. This paper sets up a bigdata storage and computing platform and conducts an analysis of large-scaled mobile user data. Based on the short term user traffic features, mobility and device type, this paper predicts long-term traffic of new users, using naive Bayesian classifier and further validats the feasibility of this method by experiments with an average accuracy more than 80%.
    Research on Multi-sensor Data Fusion Model
    LI Qiong;YANG Xiao-xiang
    2013, 1(4):  158-161.  doi:10.3969/j.issn.1006-2475.2013.04.039
    Asbtract ( 494 )  
    Related Articles | Metrics
    The data fusion model of wireless sensor networks is researched. The JDL model is the basis of multi-sensor networks. It is divided into five fusion levels according to functional partitioning of data fusion, in order to make a valid distinction among objective optimization, posture review, effect evaluation and process optimization. On this basis, as a comparison with other models, the advantages and disadvantages of each model are illustrated, and an effective reference for the practical application selection is provided.
    A Real-time Fine-grained User-level Network Traffic Monitoring Approach
    XU Bin;XUE Guang-tao
    2013, 1(4):  162-165,.  doi:10.3969/j.issn.1006-2475.2013.04.040
    Asbtract ( 494 )  
    Related Articles | Metrics
    Real-time fine-grained traffic monitoring for mobile user is more and more important in wireless networks. However, the high granularity sampling of wireless user’s network traffic degrades system performance, while the transmission and storage of sampled data increase system overhead. In this paper, it is observed that wireless network traffic is high time and space correlated by using information entropy to measure a large-scale real data in campus WiFi networks. This paper presents a new traffic sampling scheme based on wireless user’s traffic spatial-temporal correlation to reduce network sampling frequencies of wireless user’s network traffic and ensure high accuracy. The experiment result proves that this scheme can reach more than 80% accuracy of sampling wireless user’s network traffic by using only less than 20% of the sampling rate.
    Design and Implementation of Integrated Management System for Cluster of Hyper_v Virtual Machine
    HUANG Chang-hua;KANG Mu-ning;HAN Pu-jie
    2013, 1(4):  166-170.  doi:10.3969/j.issn.1006-2475.2013.04.041
    Asbtract ( 403 )  
    Related Articles | Metrics
    With the popularity of the Hyper_v virtual machine, the remote management of virtual machine resources has become a problem of enterprises, including: start, stop, restart, snapshot, pause, continue, save, restore, running status monitoring, machine information collection etc. Based on the above issues, this paper designs a Web service platform oriented management system for the cluster of Hyper_v virtual machine, introduces the related works of the system about managing the virtual machines cluster resources, describes the system architecture, the characteristics of functional modules, deployment and advantages.
    High Sensitivity GPS Signal Tracking Based on Viterbi Algorithm
    CHEN Kai;YING Ren-dong;LIU Pei-lin;YU Wen-xian
    2013, 1(4):  171-175.  doi:10.3969/j.issn.1006-2475.2013.04.042
    Asbtract ( 494 )  
    Related Articles | Metrics
    High sensitivity GPS receiver has become a hot research topic with the need of navigation in the scenarios covered by woods or indoor. GPS weak signal tracking is one of the key issues that must be solved. Referring to the characteristics of weak GPS signal, a new weak signal tracking method based on Viterbi algorithm is developed. Simulation results show that: the tracking threshold can reach 11dB/Hz and 16dB/Hz respectively if the Doppler rate of signal is less than 10Hz/s(0.2g) and 50Hz/s(1g). So the algorithm can get high sensitivity even in low dynamic. What’s more, the method can be implemented conveniently with not too much computation.
    Research on LEACH Protocol Based on Node Self-scheduling
    XU Xiu-lan;LI Ke-qing;ZHAO Xiu-lan
    2013, 1(4):  176-179.  doi:10.3969/j.issn.1006-2475.2013.04.043
    Asbtract ( 456 )  
    Related Articles | Metrics
    Routing protocol is an important part of wireless sensor networks, the routing algorithm plays a crucial role in routing protocols. In order to reduce energy consumption and prolong the network lifetime, LEACH algorithm based on node self-scheduling is proposed. The algorithm considers the network connectivity and coverage, determines the connected cover set to realize node self-scheduling. The NS2 simulation includes time-energy consumption and time-numbers of living nodes. The results show that the algorithm can reduce energy costs and prolong the network lifetime.
    Research and Implementation of Cloud Platform Based on Mobile Positioning Program
    ZHENG Zong-miao;WANG Guo-ming
    2013, 1(4):  180-183,.  doi:10.3969/j.issn.1006-2475.2013.04.044
    Asbtract ( 589 )  
    Related Articles | Metrics
    For the arrival of China’s aging trend and the problem that the elderly are not of effective guardianship, this paper proposes and implements a combined program of wristband positioning terminal and cloud platform. The program can be an effective guardianship for the elderly and a better solution for the empty nesters which are easily lost and difficultly guardian. The cloud platform uses the structure NGINX+PHP+MySQL, the database server REDIS and the C# language communication middleware.
    Design of Embedded Wireless Video Surveillance System Based on 3G
    FU Cun-yu
    2013, 1(4):  184-186,.  doi:10.3969/j.issn.1006-2475.2013.04.045
    Asbtract ( 515 )  
    Related Articles | Metrics
    This paper provides the design of a wireless video surveillance system based on 3G. This system uses the embedded processor S3C2440, with the Linux operating system, the camera and the 3G wireless card with USB interface. The system general structure is described, and the hardware and software design of this surveillance system are introduced. This paper combines the embedded technology and 3G technology to achieve remote video surveillance system. Owing to the high spending of 3G network, a series of ways are proposed to solve this problem.
    Case Study of Network Experimental Platform Construction Method in Virtual Environment
    MA Yuan-fei;MA Yan-lin
    2013, 1(4):  187-189,.  doi:10.3969/j.issn.1006-2475.2013.04.046
    Asbtract ( 471 )  
    Related Articles | Metrics
    Traditional network experiment of colleges and universities cannot be carried out due to restrictions of place, equipment costs and class hour. It seriously affects understanding of the basic principles for the network and practical ability to exercise for students. A detailed description of the network experiment in virtual environment is given by configuration example on network load balancing using GNS3 in order to solve the traditional problems of network experiment.
    Application of PVLAN in Management of Computer Room
    ZHANG Tie-bin
    2013, 1(4):  190-192.  doi:10.3969/j.issn.1006-2475.2013.04.047
    Asbtract ( 443 )  
    Related Articles | Metrics
    The network computer room of colleges and universities is generally comprehensive laboratory, which bears on the teaching of computer courses. With the development of the educational technology, schools strengthen the computer lab construction and renewal. Through the network platform to teaching, training and examination management, it greatly improves the utilization rate of the computers, and orderly promotes the teaching. However, the laboratory network is a LAN. In actual use, there are a variety of network problems. The use of network switch PVLAN technology can effectively solve the network storm, ARP deceit, etc.
    信息安全
    Modeling of Improved BLP Model and Its Applications
    XU Liang;
    2013, 1(4):  193-197.  doi:10.3969/j.issn.1006-2475.2013.04.048
    Asbtract ( 531 )  
    Related Articles | Metrics
    Bell-La Padula (BLP) model is a classical data confidentiality model and is often used as a security policy model in the researches of high-grade secure operating systems. But as its own shortages, it is hard to satisfy the requirement of development in actual systems. By doing the corresponding improvement and formal description, it can be used in actual systems and also satisfies the requirement of formal security policy model in the development of access verification and protection level of secure operating systems according to the “Information security technology: Security techniques requirement for operating system” (GB/T 20272-2006).
    Research and Improvement of Qubes Security Operating System
    HUANG Meng-ling;ZHAI Zheng-jun
    2013, 1(4):  198-201,.  doi:10.3969/j.issn.1006-2475.2013.04.049
    Asbtract ( 594 )  
    Related Articles | Metrics
    Traditionally, the Linux operating system makes use of different levels of security technologies, such as discretionary access control, mandatory access control, security audit, prohibited object reuse, intrusion detection, to improve the security of Linux system. This article provides insight to analyze a new operating system which is called Qubes. It is a secure operating system based on the development of Linux operating system. Mainly, the article researches on the security mechanism principle, the system program design and functional components of Qubes operating system. Additionally, it adds Chinese language support function to improve the Qubes operating system. The new architecture design makes a great improvement on the overall security of the Linux system.
    Research on Secure Access Control System of Mobile Police
    CHEN Xuan-hua;LI Xue-ya;YANG Ling
    2013, 1(4):  202-205.  doi:10.3969/j.issn.1006-2475.2013.04.050
    Asbtract ( 609 )  
    Related Articles | Metrics
    From strong demand of police work properties and technology feasibility of mobile terminal access public security intranet, this paper introduces security risk existing in the mobile terminal from three aspects, puts forward a mobile terminal security access control system. The system is designed based on the M/S structure by using access permission control technology which is combined with the validity check of terminal access authentication, forced terminal registration and terminal application environment. Linkage of client program and control end can realize real-time patrols of mobile terminal network behavior. The real-time monitoring of state for the mobile terminal from multi-dimensional can make the terminal always consistent with security strategy to ensure that the mobile police accesses public security intranet safely.
    应用与开发
    Multi-core Programming Model for Low-power Audio DSP
    YU Cun;LIU Pei-lin
    2013, 1(4):  206-209,.  doi:10.3969/j.issn.1006-2475.2013.04.051
    Asbtract ( 607 )  
    Related Articles | Metrics
    Due to the multi-layer memory layout and constrained computing resources of low-power audio DSP, programmer suffers difficulties of programming, large overheads, and ineffective performances in migrating to multi-core. ADMP (audio DSP multi-core processing) is a single program multiple data style programming model on APC (audio processing core). It provides light-weight runtime, explicit memory allocation interface, and various interaction methods. Four experimental cases benefit performance boost with ADMP. Experimental results show that ADMP reaches demands of audio applications with little overheads.
    Building Efficient Green Computer Experimental Teaching Platform Based on Virtualization Technology
    LUO Jie;NING Tian-qiao
    2013, 1(4):  210-214,.  doi:10.3969/j.issn.1006-2475.2013.04.052
    Asbtract ( 468 )  
    Related Articles | Metrics
    Virtualization essentially encapsulate the physical resources according to need for IT resources, the technical means of the differences in shielding the hardware and software resources, and ultimately, improve efficiency and reduce costs. Through the introduction of virtualization technology, the paper builds an efficient green computer experimental teaching platform based on virtual servers, virtual storage and virtual desktop. Practice proves that in addressing the high cost and poor availability, serious waste of resources and other problems existing in the traditional model of computer labs, the platform can also complete the complex experimental projects previously difficult to achieve, greatly enriches the practice teaching methods and improves the level of service.
    Design and Implementation of Train HMI Based on Linux and Qt
    LIU Chao;ZHOU Ji-chao;ZHANG Hong-xing
    2013, 1(4):  215-219.  doi:10.3969/j.issn.1006-2475.2013.04.053
    Asbtract ( 548 )  
    Related Articles | Metrics
    A design of human machine interface is proposed. Considering the environment that the train works, the system uses Intel X86 as its hardware platform, which performance is well, the software platform is Linux. Based on the platform, the paper uses open source graphic libraries Qt to program the applications. The experimental result shows that the HMI has the features such as low cost, friendly interaction and so on.
    Display Control and Design of Bicycle POV LED Based on STM32
    ZHOU Fu-qin;ZHANG Jing-jing;ZHANG Xian-lei
    2013, 1(4):  220-222,.  doi:10.3969/j.issn.1006-2475.2013.04.054
    Asbtract ( 614 )  
    Related Articles | Metrics
    Based on the development platform of STM32, the design of bicycle POV LED is realized. With its 128kB Flash, the data of rotation picture can be stored. Through the driving chip LPD1109, 96 RGB LED can be droved and displayed brightly. With implicating electromagnetic effects of 3144E, an interrupt signal for switching pictures can be generated. Using visual persistence effect of people, the bicycle can be seen the beautiful rotation picture in the running process of high-speed.
    Design and Implementation of Electronic Flight Bag Based on iOS Platform
    LU Jing;HE Yuan-qing;LIU Xiao-dong
    2013, 1(4):  223-227.  doi:10.3969/j.issn.1006-2475.2013.04.055
    Asbtract ( 588 )  
    Related Articles | Metrics
    The electronic flight bag (EFB) as the research focus of the civil aviation industry in recent years, has less products with independent intellectual property of China. The paper introduces a level 1 EFB for general aviation with iOS as research platform. The system uses C/S model to electronically store, update and display the important documents of cabin such as aeronautical charts, flight manual, etc, to achieve interactive electronic checklists and automatically generate electronic flight log. The experiments show that the system greatly reduces the pilots cabin burden, closes to the users needs, is of good users experience, can improve the level of flight safety, with good market prospects and practical promotional value.
    Research on Infection of Rainfall Attenuation to Radar Detection Using Matlab
    CHENG Huan;XIE Hong-sen;WANG Tao;WANG Yuan-suo
    2013, 1(4):  228-231.  doi:10.3969/j.issn.1006-2475.2013.04.056
    Asbtract ( 444 )  
    Related Articles | Metrics
    When spreading abroad in the troposphere, it is hard to avoid that electromagnetic wave is reduced because of the influence of atmosphere mote, in which precipitation is the most familiar and the major element is rain. Some research is done on the physical character of dielectric constant of water. Using the Matlab, Mie theory and the Laws-Parsons model of rain distribution are used to analyze the relationship of electromagnetic wave attenuation with rainfall change. The infection on absorption and dispersion of electromagnetic wave is considered. The attenuation of rainfall is educed by the calculation of signal-to-noise.
    Research and Application of IETM Wiring Data Based on S1000D
    GAO Wan-chun;ZHANG Rui-li;WU Wei-tuan
    2013, 1(4):  232-235.  doi:10.3969/j.issn.1006-2475.2013.04.057
    Asbtract ( 432 )  
    Related Articles | Metrics
    It is important to reduce the analysis time of circuit and improve the efficiency of malfunction elimination. The paper puts forward the function demand of wiring data in IETM and data operating model, researches the key techniques of wiring data based on S1000D specification. The research results are applied in the IETM system of a certain type of plane.
    Man-machine Interface Design Based on Truly Display Module M19264
    TANG Jian-hua
    2013, 1(4):  236-238.  doi:10.3969/j.issn.1006-2475.2013.04.058
    Asbtract ( 427 )  
    Related Articles | Metrics
    This article introduces a method of designing the man-machine interface via Truly display module M19264, which makes hardware structure simpler, software easy maintenance and expansion. The man-machine interface with better combination of graphic and text is implemented.