Loading...

Table of Content

    16 June 2016, Volume 0 Issue 6
    A Portable Real Time Transmission System Based on GPRS
    LIU Hua-bao
    2016, 0(6):  1-6,11.  doi: 10.3969/j.issn.1006-2475.2016.06.001
    Asbtract ( 241 )  
    References | Related Articles | Metrics
    For the problems of the sudden water disasters monitoring, a portable real time transmission system is proposed. Data acquisition is made up of sensors and embedded cameras. Through the connection and communication between the data monitoring module and the 4G module, and combined with wireless transmission and Internet technology, it realizes the automation and wireless of monitoring. The system can be placed in most location of a sudden disaster. It is of the advantages of convenient use, low cost, stable data transmission and so on, and helps to solve the problem of monitoring blind spots.
    Task Scheduling Algorithm in Cloud Computing Based on Chaos Artificial Bee Colony
    JIANG Kai
    2016, 0(6):  7-11.  doi: 10.3969/j.issn.1006-2475.2016.06.002
    Asbtract ( 157 )  
    References | Related Articles | Metrics
     Task scheduling is one of the most important problems in cloud computing research. In order to improve the efficiency of cloud computing resource scheduling, a novel algorithm called ICABC based on the chaos artificial bee colony is proposed. In the stages of the employed bees, the onlookers and the scout bees, ICABC makes full use of the ergodicity of chaos to create new solutions, so that the neighborhood search process can avoid falling into local minima, and eventually obtains the global optimal solution. At the same time, a new selection method using the chaos search is introduced, which increases the diversity of the population, and avoids the phenomenon of “premature” to some extent. Finally, experiments are carried out on the CloudSim simulation platform. The results show that the improved ICABC algorithm can improve the convergence speed and precision, and it is an effective task scheduling algorithm in cloud computing.
    Cloud Storage Research on Supervisory Video Heat Based on K-means
    ZHANG Chao1,2, GUO Hui-ming2, ZHANG Hong2
    2016, 0(6):  12-15.  doi: 10.3969/j.issn.1006-2475.2016.06.003
    Asbtract ( 216 )  
    References | Related Articles | Metrics
    Through the analysis of Hadoop video storage structure, the article comes up with an intelligent double Hadoop cluster storage architecture. The algorithm predicts the supervisory video heat based on k-means, and according to the features of safe city adjusts the number of backups. As the result, this method can increase the use ratio of facilities, accelerate the speed of document retrieval and intelligence analysis.
    Geological Disaster Monitoring System Based on Mobile Communication Technology
    HUANG Hu, WU Yi, YANG Ding, CHEN Xiao-bo
    2016, 0(6):  16-18,102.  doi:10.3969/j.issn.1006-2475.2016.06.004
    Asbtract ( 250 )  
    References | Related Articles | Metrics
    For the purpose of the field geological disaster monitoring unmanned, we use the SIMCOM Company’s SIM900A module to design an integration system of geological information monitoring. The system realizes the acquisition of temperature, pressure, rainfall and other geological parameters, and the control of sending information by SIM900A. It also realizes the processing and storage functions by a designed computer. Finally staff workers analyze the stored data to achieve the unmanned monitoring purpose.
    An Intermediate Representation Generation Based on Code Change Analysis
    HUANG Hai-hui1, CHEN Yu-ting2
    2016, 0(6):  19-23,25.  doi:doi: 10.3969/j.issn.1006-2475.2016.06.005
    Asbtract ( 171 )  
    References | Related Articles | Metrics
    Nowadays there exist many incremental program analysis and verification techniques, while working on intermediate representations. In order to make these techniques more practical, this paper proposes an approach to extract the program changes at the source code level, and then propagates these changes to the intermediate representations. We design a novel approach called IRChange, on the basis of LLVM and Clang, adding annotations indicating the changes to the source code, and then transferring the changes at the compiling time. Furthermore, new intermediate representations can be generated through synthesizing old intermediate representations and the annotations with change information. The experiment results show that new intermediate representations are correct. It also can be used for diff analysis at the intermediate representation level, so that the increments can be used for incremental program analysis and verification.
    Dynamic Software Module for FreeRTOS
    CHEN Zi-qing, SUN Xin
    2016, 0(6):  24-28.  doi:10.3969/j.issn.1006-2475.2016.06.006
    Asbtract ( 455 )  
    References | Related Articles | Metrics
    FreeRTOS, as an open source lightweight multi-task real-time operating system, is widely used in all kinds of embedded instruments and equipments. But FreeRTOS does not support the dynamic loading of the software module, which limits its flexibility and scalability. Based on the detailed analysis of symbol relocation principle in the ELF file, dynamic loading and unloading function of the software module is realized by modifying the memory layout for FreeRTOS task, and adding the ELF file loader in the kernel. The test results on the STM32 platform show that the software module can be dynamically loaded into the memory and successfully scheduled by the kernel, while the OS is running.
    Preliminary Design of Model-based Integrated Modular Avionics Platform
    ZHANG Xiao, WANG Li-song, RANG Tao
    2016, 0(6):  29-35,39.  doi:10.3969/j.issn.1006-2475.2016.06.007
    Asbtract ( 218 )  
    References | Related Articles | Metrics
    The ever increasing complexity of avionics system and amount of platform devices are going to make allocating the IMA resources for IMA integrator based on subjective impression more error-prone and hard to evaluate. This paper proposed a method of preliminary design of IMA platform based on models. The definition of system and platform respectively based on meta-model of system structure and meta-model of platform structure, thus a specific format of system and platform makes the definition more clearly formal, providing conditions to extract constraints and evaluate the allocation strategy automatically. The constraints can be extracted from the general requirements and safety requirements. Candidate allocation strategies can be got from ILOG solver by inputting constraints described by OPL format. After safety analysis of candidate strategies, the system designers can accept or reject the proposed allocation. The practice and efficiency of the method were illustrated by analyzing IMA resource allocation strategy of cockpit display system.
    Automatic Recognition of Heart Sound Signal Based on Support Vector Machine
    GUO Chun-lu, YUE Xiao-bing
    2016, 0(6):  36-39.  doi:10.3969/j.issn.1006-2475.2016.06.008
    Asbtract ( 316 )  
    References | Related Articles | Metrics
    Recognition of heart sound signal plays an important role in the diagnosis of heart disease. In order to improve the performance of heart sound recognition, this paper presents an automatic recognition method of heart sound signal based on support vector machine. Firstly, wavelet analysis is used to reduce the noise of the heart sound signal, and then Mel frequency cepstral coefficients are extracted as the feature of heart sound, finally, the support vector machine (SVM) is used to build classifier of heart sound signal and the performance is tested by using heart sound data. The results show that the recognition accuracy of the heart sound signal is as high as 93% for the proposed method, it can automatically and correctly identify the normal and abnormal heart sound signal.
    Design of Energy Saving Electricity Control Device for Hotel Based on Microcontrollers
    WU Shi-yun, WANG Yi-yan
    2016, 0(6):  40-43,48.  doi:10.3969/j.issn.1006-2475.2016.06.009
    Asbtract ( 215 )  
    References | Related Articles | Metrics
    An energy saving electricity control device based on microcontrollers was designed for intelligently controlling the power system of hotel. This device with the main-control chip of AT89C51 can control the public territory and guest room. Through the ingenious cooperation of photosensitive resistance, pyroelectric infrared sensor and stepping motor, the device can collect the messages of human body and illumination intensity. The new control device has the feature of auto power-off to save the energy after people leaving from the public territory and guest room.
    Faults Diagnosis of Power Converter Based on Wavelet
    CHEN Wei, CUI Jiang, TANG Jun-xian
    2016, 0(6):  44-48.  doi:10.3969/j.issn.1006-2475.2016.06.010
    Asbtract ( 194 )  
    References | Related Articles | Metrics
    Focusing on the issue of power converter fault diagnosis, a method of power converter faults diagnosis based on wavelet packet energy spectrum and M-ary support vector machine(SVM) is proposed. Firstly, the wavelet packet decomposition is adopted to extract the output voltage energy values, and the fast Fourier transform (FFT) is adopted to analyze the frequency feature points, perform the dimension reduction and obtain the fault feature vectors. Then, various fault modes are isolated based on the M-ary SVM diagnostic model. Experiment results show that compared with traditional BP neural network and one-against-one SVM fault diagnosis methods, the proposed method has high diagnostic accuracy and needs far less number of sub-classifiers, and the diagnosis speed is improved a lot. The proposed method is also suitable for online diagnosis.
    Wireless Falling Weight Deflectometer Measurement Software Based on Android
    LIANG Wei-wei1, YIN Zhao-hui1, MU Rui-fen2, JIN Shuo1, WANG Bing1
    2016, 0(6):  49-52,58.  doi:10.3969/j.issn.1006-2475.2016.06.011
    Asbtract ( 204 )  
    References | Related Articles | Metrics
    For the shortcomings of needing to plug tightening hang in, pull data line, frequently moving the control box, and squatting operation in the process of detecting the road surface with the traditional wired portable deflection instrument, wired data transmission mode adopted on the deflection instrument was changed to wireless transmission, at the same time used the popular, easy to carry, and simple operation Android handheld devices as a wireless data receiving and processing hardware platform, and on which can be developed for data acquisition, image display, storage and query of the measurement procedures. Some of the unwieldy structure was removed, such as data lines, control boxes, etc. Many convenients were omitted such as plug and tighten aviation plug, pull the data line, frequently moving the control box, squatting operation encountered when the operator making measurement. It is easy to implement data acquisition, analysis and storage. This paper detailedly introduces the design and implementation of this measurement software based on Android.
    Modeling and Simulation Integrated Platform for Aerospace Product Performance Prototype
    ZHANG Feng1,3, ZHOU Tao2, XU Yuan2, XUE Hui-feng2,3
    2016, 0(6):  53-58.  doi:10.3969/j.issn.1006-2475.2016.06.012
    Asbtract ( 237 )  
    References | Related Articles | Metrics
    In order to improve the work level of modeling and simulation for aerospace product performance prototype, aiming at the poor integration of lifecycle collaborative modeling and simulation process management system of performance prototype, we build a comprehensive integrated collaborative design and simulation platform of performance  prototype based on cloud computing platform. The database modeling and design of performance prototype collaborative modeling and simulation platform, the framework of complex aerospace products integrated performance prototype integrated modeling and simulation platform, the base frame of performance prototype collaborative modeling and simulation platform, and the architecture of performance prototyping cloud services platform and system physical platform are researched. Application results show that the constructed platform solves problems like the performance of the prototype lifecycle unified modeling and simulation as well as different people, different tools, different algorithms, coupled modeling under different description language, co-simulation.
    Short-term Electrical Load Forecasting Based on Modified Genetic Algorithm and SVR
    YANG Dan, ZANG Lie, GAN Lu
    2016, 0(6):  59-62,67.  doi:10.3969/j.issn.1006-2475.2016.06.013
    Asbtract ( 178 )  
    References | Related Articles | Metrics
    In order to effectively and accurately predict the power load, we proposed a Support Vector Regression (SVR) based forecast method to modeling the load consumption, at the same time proposed a two stage modified Genetic Algorithm(MGA) based on Genetic Algorithm to adjust the parameters of SVR. Under the SVR constraint conditions, we chose the Mean Absolute Percentage Error (MAPE) as fitness function of MGA.Finally using a set of practical data, we verified the feasibility and effectiveness of MGA based SVR forecasting method.
    Recognition of Nonlinear Distortion PDF417 Barcode
    LI Wei, ZHAO Zheng-kang
    2016, 0(6):  63-67.  doi: 10.3969/j.issn.1006-2475.2016.06.014
    Asbtract ( 163 )  
    References | Related Articles | Metrics
    For crooked PDF417 bar code, it’s hard to locate and correct nonlinear distortion PDF417 bar code using traditional method, so a new recognition method of nonlinear distortion PDF417 barcode is proposed. Shenjun edge detection, line detection based on chain code and line clustering are used to locate bar code. For different types of distortion, we use different types of block correction ideas to correct the total bar code. This location method not only applies to nonlinear distortion PDF417 bar code, but also applies to linear distortion PDF417 bar code. Experimental results show that the proposed method has good performances and can meet the requirements of practical application.
    A Large Margin Nearest Neighbor Algorithm of Large-scale Text Classification
    ZHU Qian1, QIN Hua1, FENG Zhi-xin2, CHEN Chen1
    2016, 0(6):  68-72.  doi: 10.3969/j.issn.1006-2475.2016.06.015
    Asbtract ( 181 )  
    References | Related Articles | Metrics
    The large margin nearest neighbor algorithm has strong learning ability and generalization ability, which is widely used in the field of classification. But it will sink into difficulties when the semidefinite programming(SDP) scale of the LMNN algorithm expands rapidly as the data increasing used to solve the large-scale text classification problem. To solve this problem, we introduced the Huber loss function, which divided the Semidefinite Optimization Model of LMNN algorithm into two low-level continuous optimization sub-models, and finally reduced the computation complexity of the algorithm and improved its efficiency. The experimental results on the classification data set of public opinion show that the precision of the proposed algorithm was improved 4.5%, and the classification time saved 47.1% compared with the traditional one. It also can prove that adopting the low-level decomposition reduction method to improve the performance of the LMNN algorithm is feasible and more suitable for large-scale text classification.
    A Binary Feature Matching Method Based on Minimum Hashing
    GUO Qian, SUN Han
    2016, 0(6):  73-78.  doi:10.3969/j.issn.1006-2475.2016.06.016
    Asbtract ( 243 )  
    References | Related Articles | Metrics
    Feature matching is one of basic problems in image recognition. Common matching methods are the linear scanning methods based on greedy algorithm, and they are applied to low dimensional data. When data dimension exceeds a certain degree, the time efficiency of matching will decrease sharply, even not stronger than the strong linear scanning method. This paper proposes a binary feature matching method based on minimum hashing. By the mapping transformation in minimum hashing function, the original feature set will be divided into several subsets. It can be transformed into a problem of searching the adjacent elements within a tiny set instead of a huge set, which decreases the computational cost. Using Jaccard distance, minimum hashing function can maximally ensure the similarity of similar vectors in original data after hash transformation. Experiments show that this method can obtain better matching performance than KD-Tree when it is applied to binary feature.
    Artificial Bee Colony Algorithm Based on Improved Search Strategy and Chaotic Mechanism
    YAO Hong-man, QIN Liang-xi, HU Pan
    2016, 0(6):  79-84,90.  doi:10.3969/j.issn.1006-2475.2016.06.017
    Asbtract ( 258 )  
    References | Related Articles | Metrics
    Artificial colony algorithm has strong ability of exploration, but has poor exploitation ability, low search accuracy, slow convergence speed during the later period. In order to solve the above problems, an artificial colony algorithm based chaotic mechanism is proposed. In order to avoid the imbalance between the exploration and exploitation ability, the historical average optimal solution was added to the search strategy; and chaotic sequence was used in the late period to make the population mutation if the population falls into local extremum, to enhance the exploitation ability and the quality of solutions, maintain the diversity of the population. Experimental results tested on functions show that the improved algorithm is superior to the basic ABC algorithm and other improved algorithms in solving speed and precision.
    An Abstract Action Tree Construction Algorithm Based on Demonstration Trajectories
    WANG Lei
    2016, 0(6):  85-90.  doi:10.3969/j.issn.1006-2475.2016.06.018
    Asbtract ( 184 )  
    References | Related Articles | Metrics
    Automatic construction of abstract action is one of the key technologies in hierarchical reinforcement learning. Skill chaining is a typical algorithm for automatically discovery abstract actions in continuous reinforcement learning domains, but the skill chaining algorithm needs to iterate many times and the convergence speed is slow. This paper presents an abstract action tree construction algorithm based on demonstration trajectories (ACADT). By using a change point detection method, ACADT segment each trajectory into a chain. The chains obtained from the multiple trajectories are merged into an abstract action tree. Experimental results show that ACADT can construct an abstract action tree and faster convergence.
    Ant-colony Optimization Energy-saving Scheduling Algorithm for Multi-core Systems
    SONG Qi, JING Chao
    2016, 0(6):  91-96.  doi:10.3969/j.issn.1006-2475.2016.06.019
    Asbtract ( 214 )  
    References | Related Articles | Metrics
     This paper mainly studies the energy consumption optimization on the multi-core systems. Firstly, according to the characteristics of the multi-core systems, we formulated the task model and energy consumption model on the multi-core systems. Then, based on ant-colony optimization, we designed and implemented an energy saving algorithm on multi-core systems. The core idea of the proposed algorithm is to use the transition rules of probabilistic state to obtain the proper solution. Furthermore, the global pheromones update strategy is used to avoid falling into local optimum. The experimental results show that the proposed algorithm outperforms better than that of greedy algorithm, etc. And it has only 0.7% higher energy consumption than that of the exhaustive algorithm. Moreover, it has a low-complexity in the large-scale data set.
    Applying Artificial Fish Swarm Algorithm to Automatically Determine Thresholds in Three-way Decision-theoretic Rough Set Model
    HU Pan, QIN Liang-xi, YAO Hong-man
    2016, 0(6):  97-102.  doi:10.3969/j.issn.1006-2475.2016.06.020
    Asbtract ( 217 )  
    References | Related Articles | Metrics
    The traditional three-wany decision rough set model needs to set up appropriate threshold. It requires the user of the model to have the relevant professional knowledge and experience, which hinders the application of the model in practice. To solve this problem, the artificial fish swarm algorithm is proposed to generate the threshold automatically, without requiring priori knowledge. Taking the conditional probability of sample as the target, using the artificial fish swarm algorithm, it can effectively learn from the data to the threshold required by the three-wany decision rough set model. It can make the risk loss minimum. The experimental result in part of UCI data sets shows that the algorithm run much faster than the adaptive learning parameters algorithm, and a three-decision-making classifier was built by using the threshold and this classifier can also make classifier better.
    A Novel Authentication Scheme on The Internet of Things Based on Aggregate Signature
    HAO Yu-wen1, TIAN Xiao2, LI Xiao-xue1, ZHAO Zhe1, ZHENG Jing-chen1, YANG Yang3
    2016, 0(6):  103-106.  doi:10.3969/j.issn.1006-2475.2016.06.021
    Asbtract ( 255 )  
    References | Related Articles | Metrics
     The problems of system resource consumption and signaling congestion are existed in access certification scheme along with the increasing number of user terminals at networking. This paper puts forward a safe and efficiency identity-based aggregate signature (IBAS) scheme for authentication between network terminal and Internet in order to solve these problems in the processes of certification and enhances the efficiency of authentication. This scheme can achieve a number of networking terminal certification by only one signature verification. The scheme also enhances the efficiency of authentication and ensures security at the same time, and also avoids the trouble of managing certificate in the public key certificate based authentication scheme.
    DDoS Attack Detection System Based on Web Service Application Layer under Cloud Environment
    DENG Ping
    2016, 0(6):  107-112,116.  doi: 10.3969/j.issn.1006-2475.2016.06.022
    Asbtract ( 203 )  
    References | Related Articles | Metrics
    Web service technology is of the advantages of low coupling degree, cross platform and language independence, so it has been widely used on the network and electronic commerce. Aiming at the problem that the application layer of Web services in cloud computing environment is vulnerable to be attacked, a defense system is proposed to detect the distributed denial of service (DDoS) attack in XML and HTTP layer. First, extracting characteristic values of the data set from belonging to a particular Simple Object Access Protocol (SOAP) normal operation, the corresponding Gaussian request model was constructed; after setting some of the attributes of network services for Web Services Description Language (WSDL),  attack was achieved initial filter; finally, the service request HTTP headers and XML content were examined and compared with the model data, and the further attack detection was implemented. Experimental results show that the system can effectively prevent many DDoS attacks, and consume less response time.
    A Certificateless Broadcasting Multi-proxy Signature Scheme Based on RSA
    HU Jiang-hong
    2016, 0(6):  113-116.  doi:10.3969/j.issn.1006-2475.2016.06.023
    Asbtract ( 241 )  
    References | Related Articles | Metrics
     The certificateless cryptography has become one of the hottest topics concerned in recent years, for which can overcome certificate management and key escrow problem, and many certificateless proxy signature schemes have been proposed. Aimming to these schemes proposed based on bilinear pairing have the problem of low efficiency and realizing difficult in application, a certificateless broadcasting multi-proxy signature scheme based on RSA is proposed. Based on RSA problem, the security of the new scheme is analyzed in detail. Compared with the existing schemes, the new scheme is more efficiency.
    A Multi-null Value Estimation Method Based on Multi-table Relationship Information in Relational Database
    WU Fei, MAO Yu-guang
    2016, 0(6):  117-122.  doi:10.3969/j.issn.1006-2475.2016.06.024
    Asbtract ( 216 )  
    References | Related Articles | Metrics
    Missing information, indefinite information as well as scarcity of information truly exist due to the complexity of the real world. Relational database, as an important tool to express the real world, uses null value to express the missing information. Focusing on estimation of null values in relational databases, the paper proposes a multi-null value estimation method based on multi-table relationship information. First, it arranges the sequence of estimating null values of each attribute based on the principle of minimizing the bias that is brought in. Then it estimates null values of each attribute based on the information of the basic table. After that it brings in multi-table relationship information when the forecast error exceeds a threshold value. The schema to be brought in information depends on the relationship between the basic table and other related tables. In that case the proposed method can improve the accuracy of forecasting null values. The experiment results show that the proposed method is of relatively high accuracy.
    Data Compression Algorithm in Real-time Database
    DAI Yang, CHEN Fang
    2016, 0(6):  123-126.  doi:10.3969/j.issn.1006-2475.2016.06.025
    Asbtract ( 240 )  
    References | Related Articles | Metrics
    To handle the problem of storage caused by large amount of data in real-time database, a classification data compression algorithm is proposed, which can achieve the lossless and efficient compression of real-time database data. First, the data of the real-time database are divided into three parts: time stamp, quality code and value. Then the LZ78 and LZW data compression algorithms are fused according to the characteristics of each data. Experimental results show that this algorithm can improve the actual storage capacity of database and the real-time performance of real-time database.