Loading...

Table of Content

    22 January 2016, Volume 0 Issue 1
    Build of Concept Semantic Network Based on Wikipedia Network Technology
    YANG Jian-ping, NIAN Mei
    2016, 0(1):  1-5,45.  doi:10.3969/j.issn.1006-2475.2016.01.001
    Asbtract ( 211 )  
    References | Related Articles | Metrics
    We use the Wikipedia backup database to build the concept semantic network in the field automatically, providing the technical basis for intelligent retrieval of the field information. After downloading, analyzing, filtering the Wikipedia backup database, with the network technology discipline as the field of study, we use the entry data in the Wikipedia database, design algorithms to extract all of the concepts in the field of network technology. We extract synonymous and superior-subordinate relationship between the concepts by using of the classification data, links data and redirects data in Wikipedia database. Finally,  the concept semantic network of the network technology field is formed by collecting the concepts and the relationships between them.
    User Scenario Reconstruct Tool Based on File Memory Mapping
    ZHANG Yun-jian1, SHEN Xin1, LIU Er-teng2, ZHENG Xian-rong3
    2016, 0(1):  6-11.  doi: 10.3969/j.issn.1006-2475.2016.01.002
    Asbtract ( 124 )  
    References | Related Articles | Metrics
    To improve the efficiency of communication and problem positioning, using the file memory mapping technology, this paper describes the design and implementation of a user scenario reconstruct tool. 〖JP2〗The DevOps pattern is adapted to develop the tool. We acquire behavior data acquisition through the template, use multi-thread to implement the interlayer communication and decoupling. The tool can reconstruct the user scenarios and detect business rules automatically. It enables developers to locate problems quickly in debugging, makes communication with specific data to support, and improves development efficiency. The Billing Revenue Management System as the application background verifies the validity of the tool.
    Female Village Officers Information Support Network System
    QU Zhong, JIANG Shao-hua, ZHOU Biao
    2016, 0(1):  12-15.  doi:10.3969/j.issn.1006-2475.2016.01.003
    Asbtract ( 205 )  
    References | Related Articles | Metrics
    As a special vulnerable group, women, children and elders left in rural areas have got more and more attention, and the female village officers have been their important social support and the main dependence because of their gender and the contact of work. But many female officers are not well-educated and short of experience and social influence. Their professional knowledge reserves are insufficient, and their jurisdictions are limited. So the female village officer information social support network system was proposed by integrating various online and offline resources to provide information social support network system for the village officers, rural women, especially female village officers. After trial running, the system was proved to be stable and reliable.
    Face Recognition and Hiding System Based on OpenCL
    WANG Fang-liang, SHI Hui-bin
    2016, 0(1):  16-19,58.  doi:10.3969/j.issn.1006-2475.2016.01.004
    Asbtract ( 192 )  
    References | Related Articles | Metrics
    To strengthen protecting the privacy of the face recognition system, this thesis introduces an algorithm of regarding image encryption based on changing gray-scale to guard significant recognition objectives. Whats more, to speed up the face recognition and image encryption, the thesis uses OpenCL to realize acceleration with single or multiple devices on heterogeneous platform. The test result shows that the local acceleration of face recognition reaches 1.9x and image encryption acceleration is 6.65x when using the single GPU, while the former statistics is 4.11x and the latter data is close to 6.65x when using dual GPU.
    Prediction of DNA-protein Binding Sites Based on Combining Sequence with Structure Information
    YANG Ji
    2016, 0(1):  20-25.  doi: 10.3969/j.issn.1006-2475.2016.01.005
    Asbtract ( 180 )  
    References | Related Articles | Metrics
    Most of the research of DNA-protein binding sites are focusing on just computing protein sequence information or structure information, while the results are terrible if combing this two information, no matter what at home or abroad. To solve this problem, we combine protein structure information of accessible surface area, relative solvent accessibility, depth index and protrusion index with protein sequence information of position specific scoring matrix to predict DNA-Protein binding sites. Then we use under sampling to solve the unbalance problem of training dataset. Finally, we use support vector machine to make prediction. The result of experiment shows the method that we proposed can achieve better performance in prediction.
    Implementation and Analysis of Enterprise Master Patient Index in Hospital Information System
    LIU Xiao-jiao, BAO Ying, HUA Lyu-chun
    2016, 0(1):  26-30.  doi:10.3969/j.issn.1006-2475.2016.01.006
    Asbtract ( 296 )  
    References | Related Articles | Metrics
    Medical and health information is one of the core productivity and the nervous system of medical industry. To improve the medical quality, strengthen the information construction, implement system connectivity and solve the information island such as redundancy, polymorphism, no-primary-and-secondary, unrelated, mismatches, disorders, etc., the EMPI (Enterprise Master Patient Index) is put forward by the Nanjing Drum Hospital, in order to maintain the global patient information, ensure patient information consistency and completeness, and implement system connectivity.
    Design of Host Bus Adapter Based on FC-AE-ASM
    YUAN Xin-zhi
    2016, 0(1):  31-34. 
    Asbtract ( 215 )  
    References | Related Articles | Metrics
    The network protocol of FC-AE-ASM is an upper layer protocol of FC-AE network, the research on HBA based on FC-AE-ASM is an important issue currently. This paper analyzes the FC-AE protocol and ASM protocol, designs and implements a host bus adapter based on FC-AE-ASM, and introduces the design ideals from the views of system architecture, architecture mechanism of ASM. Finally, the availability of the system is verified by experiments.
    Design of Children-oriented Self-learning Application Based on Somatosensory Interactive Technology
    CAI Jia-lun1, YU Fang2
    2016, 0(1):  35-38.  doi:10.3969/j.issn.1006-2475.2016.01.008
    Asbtract ( 200 )  
    References | Related Articles | Metrics
    A children-oriented self-learning application system is designed according to children’s unique way of thinking and behavioral characteristics. Somatosensory interactive technology is adopted in this system, a finite state machine of posture sequence and collision detection method are used to realize action recognition and collision detection. The game way is applied to make children accomplish their learning process with less cognitive burden, besides, the non-contact interactive mode can meet children’s restless nature and reduce the damage caused by computer. A game similar to Fruit Ninja is used in this application to help children memorize words with great fun, which can promote children’s motivation and initiative and then achieves the purpose of edutainment.
    Multi-dimensional Monitoring System for Website Security Based on Cloud Platform
    ZHENG Sheng-jun1, GUO Long-hua2, LI Jian-hua2, WANG Hong-kai3, LIU Yun4
    2016, 0(1):  39-45.  doi: 10.3969/j.issn.1006-2475.2016.01.009
    Asbtract ( 169 )  
    References | Related Articles | Metrics
     A multi-dimensional monitoring system for website security based on cloud platform utilizes cloud computing technology and monitors website security from three dimensions including availability, security events and Web vulnerabilities. Correlation analysis of the monitoring data is conducted meanwhile. The system concurrently and periodically monitors the large-scale websites comprehensively utilizing several key technologies including rapid detection technology based on static source code analysis towards website hang cockhorse, hidden chain detection technology based on native Bayes, SQL injection attack blind detection technology based on page similarity and XSS detection technology based on high precision DOM locator. The system improves the accuracy, rates of missing report and false alarm in the detection of website defacement which provides timely and accurate basis for the website security administration and maintenance.
    Stability Analysis of Delayed SIE Computer Virus Propagation Model
    SONG Lei1, WANG Chun-lei2
    2016, 0(1):  46-49.  doi: 10.3969/j.issn.1006-2475.2016.01.010
    Asbtract ( 131 )  
    References | Related Articles | Metrics
    Based on the SIE computer virus propagation model, and considering that the anti-virus software needs a period to clean viruses and the external computers need some time to connect to network, a delayed computer virus propagation model is proposed. Critical value of the delay for local stability and occurrence of a Hopf bifurcation are obtained by regarding the delay as a bifurcation parameter and analyzing the distribution of the associated characteristic equation’s roots. Finally, numerical simulations are carried out to support the theoretical predictions. It is proved that the viruses’ propagation can be controlled effectively by postponing occurrence of the Hopf bifurcation.
    An Urgent Message Push Method Based on Multiqueue Buffer Pool
    LIU Xin, ZHANG Yan-yuan, LIN Yi
    2016, 0(1):  50-53,93.  doi:10.3969/j.issn.1006-2475.2016.01.011
    Asbtract ( 177 )  
    References | Related Articles | Metrics
    As an active and customized form of message transfer, push system is able to present the information what users need, which is reforming the information propagation mode on the Internet. Current push systems designed for the weak real time scenes, such as news and entertainment, cannot satisfy the demand of high reliability and low delay of urgent message transfer. For this reason, this paper proposes a multiqueue buffer strategy and two-level urgent message dispatcher method, in order to improve the arrival rate level and reduce the message delay. Experiment shows that this method can effectively improve the reliability and efficiency of urgent message push system.
    Dynamic Anonymity Algorithm Based on Trajectory Prediction
    MA Jia-shi, LYU Xin, QI Rong-zhi, ZHANG Yun-fei, XU Guo-yan, LIU Xuan
    2016, 0(1):  54-58.  doi:10.3969/j.issn.1006-2475.2016.01.012
    Asbtract ( 163 )  
    References | Related Articles | Metrics
    K-anonymity for location privacy is an important solution to protect the user’s trajectory in LBS.However, K-anonymity for location privacy can not always protect user’s privacy if the attackers have any background knowledge. We propose a dynamic anonymity algorithm based on historical data trajectory prediction. This algorithm uses the trajectory prediction ability to define the background knowledge of attackers’, when the user’s trajectory has a predicted risk, changs the value of anonymity set. A series of experiments on synthetic datasets are made, the results show this algorithm is feasible and effective.
    Method of Web News Text Extraction Based on Nave Bayes
    LUO Yong-lian, ZHAO Chang-yuan, JIA Yu-fang, LU Cai-lin
    2016, 0(1):  59-63,68.  doi:10.3969/j.issn.1006-2475.2016.01.013
    Asbtract ( 196 )  
    References | Related Articles | Metrics
     Concerning the problems of information automatic extraction from Web news, a method of extracting Web news text from webpage tag blocks based on Nave Bayes was proposed. Tag information, text similarity and text length of tag blocks were taken as the attributes in machine learning. To improve the representation of tag attributes and reduce interference between related tags, the algorithm reduced the number of attributes in the way of examining the correlation between tag attributes and categories between tag attributes based on χ2 test. In order to improve the extraction accuracy, both the probability of news text and non news text were considered. The experimental results show that the accuracy rate of extraction news text reached 85% with appropriate parameter values.
    Relation Projection Texture Mapping Based on Feature Matching
    LIU Zi-cai, HU Gu-yu, LUO Jian-xin
    2016, 0(1):  64-68.  doi:10.3969/j.issn.1006-2475.2016.01.014
    Asbtract ( 170 )  
    References | Related Articles | Metrics
    In virtual reality scenes, the reconstruction of the dynamic reality process is complicated that needs a lot of images which contain real information to consolidate. These images most have a public area with one or more images. This paper puts forward an algorithm named relation projection mapping method based on feature matching. On the basis of these public areas, it can extract the associated features among the images by SIFT feature matching. With the associated features, we can proceed a new projective texture mapping by constructing the view transformation matrix. The experimental results show that this method is stable and effective, and the dynamic reconstruction has a good application effect in reality.
    Students’ Writing Score Prediction Model Based on PCA-RBF Neural Network
    HU Shuai, GU Yan, JIANG Hua
    2016, 0(1):  69-72,126.  doi: 10.3969/j.issn.1006-2475.2016.01.015
    Asbtract ( 150 )  
    References | Related Articles | Metrics
    To improve the accuracy of students’ writing score prediction, a prediction model based on principal component analysis (PCA) and radial basis function (RBF) was proposed. First the dimensions of an established assessment system of students’ writings were reduced. The first five principal components were extracted and taken as inputs of the RBF neural network. Then a three-layered RBF network prediction model was created. The experiment results show that compared with a simple RBF neural network and a BP neural network, the PCA-RBF prediction model is of simpler structure, faster convergence speed, higher prediction accuracy and better generalization ability. The effectiveness of the proposed model is verified.
    Weld Seam Level Set Segmentation Method Based on Straight Line Prior Knowledge
    CHEN Qi-ming1,2, WANG Zhi-cheng1,2
    2016, 0(1):  73-76.  doi: 10.3969/j.issn.1006-2475.2016.01.016
    Asbtract ( 160 )  
    References | Related Articles | Metrics
     Weld seam identification and segmentation is an important part of automated welding. The burr produced during spot welding process will bring serious noise in the image, thus affecting the weld segmentation results. Taking the shape of weld seam into account, the paper proposed a weld seam level set segmentation method based on straight line prior information. Since the weld seam is always a straight bar, the proposed method takes the curvature of weld seam as a prior information regularization term, and added it to the active contour models. This is very useful to filter out pseudo-seam, thus it improves the robustness of the algorithm. Compared with the traditional CV model and the improved LBF model, the proposed method is of better segmentation results and higher accuracy.
    A Text Classification Method for Weak Labeling
    LIANG Wei-chao, SONG Bin
    2016, 0(1):  77-81,86.  doi:10.3969/j.issn.1006-2475.2016.01.017
    Asbtract ( 248 )  
    References | Related Articles | Metrics
    Multi-label learning is different from traditional supervised learning. It is a framework which is proposed to represent objects which might have multiple semantic meanings simultaneously in the external world. Under this framework, an instance might be associated with a set of labels. The majority of the existing multi-label learning algorithms assume that each label set corresponding to the example is complete. However, the label sets associated with some examples may he incomplete. To deal with this problem, we propose a text classification method for weak labeling. The method tries to replenish missing labels by constructing an optimization problem, which is based on the assumptions that correlations between different labels are different and similar instances may have similar labels. Extensive experiments show that the proposed method can effectively improve the generalization performance of the learning system.
    Credibility Test of Probability Model in Warfare Simulation System
    LI Zhen, DONG Hong-peng, JIANG Ben-qing
    2016, 0(1):  82-86.  doi:10.3969/j.issn.1006-2475.2016.01.018
    Asbtract ( 177 )  
    References | Related Articles | Metrics
    By running the simulation models, this paper provides an efficient and feasible method for the credibility test of the probability model in large warfare simulation system, based on the transition probability matrix. An example is used to verify the feasibility of this method, and to prove that this method reduces the heavy burdens caused by the running of the huge number samples in the acceptation test of simulation system.
    An Adaptive Distribution Strategy of Redundant Splits on Cloud Storage
    ZHA Xian-yue, FENG Jun, FENG Du-qing, TANG Zhi-xian
    2016, 0(1):  87-93.  doi:10.3969/j.issn.1006-2475.2016.01.019
    Asbtract ( 186 )  
    References | Related Articles | Metrics
    The water conservancy informatization evolution promotes the rapid growth of water conservancy big data. And the actual production has proved the integration and sharing of the data can achieve the maximum benefit of them. But the existing storage platforms have a few deficiencies, such as unbalanced of storage capacity, and that can make these platforms be a hotspot. Based on the research of hybrid storage model, according to the exchange demand between the data centers and the storage capacity, we designed an adaptive distribution strategy based on spatial property of water conservancy data domain in which conducting the distribution decision. The experiment shows that this strategy can guarantee the basic load-balancing between data centers.
    Service-oriented Cross-platform Database Data Sharing
    CAO Gui-ning, SHI Cheng-wei, CHEN Xiang-xian
    2016, 0(1):  94-103.  doi:10.3969/j.issn.1006-2475.2016.01.020
    Asbtract ( 250 )  
    References | Related Articles | Metrics
    This paper analyzed the deficiencies of the existing database’s access patterns such as the tight coupling and self-enclosing, discussed the design principles and the advantages and disadvantages of the existing cross-platform database data sharing schemes, a four-layer service-oriented cross-platform database data sharing scheme was proposed. The scheme’s architectural design was introduced, the functions of the four layers were discussed in detail, and the cross-platform data exchange with business systems was illustrated too, the scheme was achieved and verified in a comparison test with a common cross-platform database data sharing scheme. The unique data service layer of the scheme not only solves the tight coupling between databases and business systems, achieves database cross-platform data sharing, but also improves the efficiency of data conversion, reduces the volume of data, and improves data sharing efficiency.
    Competition Dynamics of Information Propagation on Complex Network
    LI Meng1,2, MA Yi-fang3, JIANG Xin1,2, MA Li-li4, ZHENG Zhi-ming1,2
    2016, 0(1):  104-107.  doi:10.3969/j.issn.1006-2475.2016.01.021
    Asbtract ( 161 )  
    References | Related Articles | Metrics
    The “non-consensus” opinions pervade all patterns of human’s interactive activities. This paper studies the phenomenon of the information competition dynamics induced by messages with opposite meaning. We construct a new information competition model which could perfectly match the reality on complex networks. It is shown that the k-shell value of nodes plays an important role in reflecting its competitive power in the information competition processes, after classifying the nodes on the network with the k-shell decomposition technique. By varying the variables in the model, different cases of information competition phenomena can be successfully explained. This new information competition model should be useful to the study on network information dissemination.
    Replication Migration Technology for Access Hotspots Based on Hadoop
    FENG Jun, WANG Chun, ZHU Kang-kang, WEI Tong-tong
    2016, 0(1):  108-113.  doi:10.3969/j.issn.1006-2475.2016.01.022
    Asbtract ( 159 )  
    References | Related Articles | Metrics
    This paper proposes an access hotspots load balance model of cloud environment. Based on the node throughput and response time of the main reference index, this paper constructs the node load determination module. In the process of files storing to HDFS, combining the file corresponding to the data block number with storage paths, the blocks of data stored in the data node are designed to a file directory mapping table. A selection method based on the node load and the storage space of migration of source node and destination node is puts forward. Based on the frame of perception mechanism, a dynamic copy migration scheme is established. Finally using the actuator issued instructions to the appropriate data nodes, it carries on the specific migration tasks and improves the migrated copy factor to adjust parameters, such as information. This paper, by means of copy quickly spread to increase hot file copy number, enables the system to provide greater throughput and shortens the system response time.
    Scheduling Strategy of Reduce Task Based on Data Localization in Hadoop
    WANG Hao
    2016, 0(1):  114-120.  doi:10.3969/j.issn.1006-2475.2016.01.023
    Asbtract ( 247 )  
    References | Related Articles | Metrics
    In the MapReduce task processing, when Reduce task is executed, and the data need to be pulled in the Map stage, it will cost a large amount of network bandwidth, network bottlenecks will occur even. Therefore, we propose a task allocation strategy based on localization and load balance. First of all, the user sets the sampling variable M. The Map function is executed in Map stages, and we select the first M data blocks for sampling. Next, the system assigns tasks by considering the data localization and the sample results. Once again, the system assigns tasks by considering the load balance. The system will generate a task allocation table after the task allocation based on the data localization and the load balance. Finally, the system executes the Reduce task and begins to pull data. Subsequent tasks are assigned based on the task allocation table. Through experimental verification, assigning task based on the data localization and the load balance can not only reduce the transmission of data and the network bandwidth consumption in Shuffle stage, but also it can avoid the situation that there are many tasks on some nodes and there are no tasks on other nodes. So the strategy can improve the overall capacity of the data processing.
    Simulation of Channel Model for WUSN Based on NS2
    LI Wen-zhi, ZHANG Gang, ZHENG Li
    2016, 0(1):  121-126.  doi:10.3969/j.issn.1006-2475.2016.01.024
    Asbtract ( 196 )  
    References | Related Articles | Metrics
    Limited by the complex underground environment, most researches on wireless underground sensor networks (WUSN) are still in the theoretical stage. The channel model provided by the mainstream simulation platform is only suitable for the simulation above the ground. There is no suitable channel model which can reflect the serious loss of electromagnetic signal underground. To solve this problem and provide a WUSN simulation platform, a channel model considering not only the propagation of EM waves in soil, but also the reflection and multipath fading effects was adopted and implemented on NS2. Simulations were carried out on the platform, the packet throughput and energy consumption per useful bit were analyzed by simulation. The results show that the model can be used to reflect the underground communication well. This paper can be used as reference for future wireless underground network research.