Loading...

Table of Content

    12 September 2016, Volume 0 Issue 9
    An Optimized Data Mining Algorithm Based on Apriori Algorithm
    CHEN Zhi-fei, FENG Jun
    2016, 0(9):  1-5.  doi:10.3969/j.issn.1006-2475.2016.09.001
    Asbtract ( 1247 )  
    References | Related Articles | Metrics
    This paper studies the fundamental problems of mining association rules. Based on the summary of classical mining algorithms and the inherent defects of Apriori algorithm, some related improvements are researched. Firstly, in order to avoid scanning the database repeatedly, the paper proposes a new method changing the database mapping way. Secondly, with the support of candidate item sets got, each candidate item set should be determined whether it is a frequent item set or not based on the prior knowledge of Apriori algorithm. If the candidate item sets generated by the element of the existing frequent item sets are certainly not frequent item sets, the element is not necessary to connect with others, avoiding producing lots of candidate items, which leads to an optimized connecting step. Lastly, for Apriori algorithm, the intersection operation is introduced to address the problems that it costs too much time to match candidate item sets with transaction patterns. Furthermore, to verify the effectiveness, the optimized algorithm has been applied to the hydrological historical data. The results of the experiments show that it costs shorter execution time under different supports and confident levels, gaining higher efficiency.
    Imputation Algorithm of Continuous Missing Values Based on Temporal and Spatial Correlation
    JIANG Chen-yang, ZHANG Yun-fei, LI Xin
    2016, 0(9):  6-9.  doi:10.3969/j.issn.1006-2475.2016.09.002
    Asbtract ( 212 )  
    References | Related Articles | Metrics
    On wireless sensor network, the missing data causes many difficulties in data analysis. Prior to data analysis, data preprocessing is necessary. Sensor network data has some change rules both in time and space. Existing imputation algorithms of missing values solve the problems only from a single point of view. In this paper, a imputation algorithm of missing values based on temporal and spatial correlation is proposed in order to make full use of the characteristics of space and time. It adopts regression model and improves BP neural network to estimate the missing values. Experiments show that this method can improve the imputation accuracy of missing values effectively.
    Multi-feature Fusion Paragraph Similarity Calculation Related to the First and the Last Paragraph and the First and the Last Sentence
    JIANG Zong-li, ZHAO Jie
    2016, 0(9):  10-14+20.  doi:10.3969/j.issn.1006-2475.2016.09.003
    Asbtract ( 204 )  
    References | Related Articles | Metrics
    For their greater contribution to the semantics of the paragraph, the first and the last paragraphs and the first and the last sentences of the paragraph should be taken as the main factors in computing the similarity of the paragraphs. By using them in SiteQ with appropriate weight, we propose Topic-SiteQ calculation algorithm. It uses a multi-feature fusion algorithm to compute the semantic similarity of the first and the last sentences that contribute to the paragraph similarity by weight. At the same time, we improve the score of the first and the last paragraphs, recommend and sort the paragraphs by the final score. Experiments show that, with Topic-SiteQ, the MRR value of relevance ranking of paragraph increased about 0.032, and the F-measure increased about 1.4%. The experimental results show that the optimized algorithm is effective.
    Adaptive Differential Evolution Artificial Bee Colony Algorithm Based on Segmental-search Strategy
    LIU Jie, ZHANG Xi-huang
    2016, 0(9):  15-20.  doi:10.3969/j.issn.1006-2475.2016.09.004
    Asbtract ( 303 )  
    References | Related Articles | Metrics

    An Adaptive differential evolution Artificial Bee Colony (ABC) algorithm based on segmental-search strategy is proposed, in order to overcome the problems of good exploration but poor at exploitation and poor convergence of conventional algorithm when using ABC algorithm to solve function optimization. In this algorithm, the mutation in differential evolution algorithm is introduced into the local search process of onlooker bees, and then, onlooker bees could do the local search around the current optimal solution which after employed bees dimension variation, and segmental-search strategy is used to improve the updating rate of food sources, which aims to improve the local search capability of the algorithm. Simulation results of six classic functions show that compared with the basic ABC algorithm, the modified ABC algorithm effectively balances the exploration and exploitation, and greatly improves the accuracy of solution and convergence rate.

    Matrix Algorithm for Minimum Spanning Tree Problem on Fuzzy Weighted Network
    SUN Xiao-jun
    2016, 0(9):  21-24.  doi:10.3969/j.issn.1006-2475.2016.09.005
    Asbtract ( 158 )  
    References | Related Articles | Metrics

    The minimum spanning tree problem on fuzzy weighted network was studied. Based on the weighted ranking of fuzzy number’s structured element and the improved weight matrix method for the classical minimum spanning tree problem, a matrix algorithm was proposed for the minimum spanning tree problem on this fuzzy weighted network whose weight is triangular fuzzy number. And its complexity and correctness was analyzed.  Experimental result shows that the algorithm is effective.

    Effective Bandwidth Allocation Mechanism of Supporting QoS in IEEE 802.16 Standard
    SUN Ya-nan, PAN Zhong-qiang
    2016, 0(9):  25-29+34.  doi:10.3969/j.issn.1006-2475.2016.09.006
    Asbtract ( 242 )  
    References | Related Articles | Metrics
    Based on IEEE 802.16 protocol, the effective bandwidth resource allocation and scheduling problem of the QoS guaranteeing are studied on broadband wireless access network. First, an efficient QoS scheduling algorithm is designed in PMP model. The algorithm uses the adjustment of parameter to provide more flexible service quality, in order to help rtPS service supporting the rapid growth of multimedia transmission. Then, QoS parameters provided by standards schedule various different types of service business and allocate upload bandwidth to reach the aim of using network resource effectively. Last, it is also verified by the numerical results of simulation experiments that the algorithm can guarantee the QoS requirements and allocate the bandwidth resource effectively.
    Privacy Preservation Mechanismin of Opportunistic Networks Based on Stochastic Game
    HE Yu-hui
    2016, 0(9):  30-34.  doi:10.3969/j.issn.1006-2475.2016.09.007
    Asbtract ( 201 )  
    References | Related Articles | Metrics
    There exist severe privacy security risks on opportunistic networks because of the need to rely on unknown nodes to forward the message or receive data from strange nodes. Accordingly, an optimal defense strategy is designed to avoid privacy leaking in terms of privacy security problems which may be caused by attacks from malicious nodes on opportunistic networks. Firstly, we model an opportunistic network that depicts the changing process of user’s context using Markov chain. Based on the system model, we formulate the attack-defense relationship between users and attackers with the stochastic game. Then, we propose a defense strategy depending on the min-max learning algorithm. At last, we prove the efficiency of this algorithm to protect privacy security by comparing with other traditional defense algorithms, which not only prove the higher convergence speed of the proposed algorithm, but also outperform better than others with user’s QoS guaranteed.
    QoS Performance Analysis of Wireless Sensor Network Based on Network Coding
    LI Yi-yu, LIANG Zheng-you
    2016, 0(9):  35-39+44.  doi:10.3969/j.issn.1006-2475.2016.09.008
    Asbtract ( 196 )  
    References | Related Articles | Metrics
    Aiming at the QoS assurance requirement of real-time network application on wireless sensor network (WSN), a WSN model based on network coding was proposed. The new model applies the network coding characteristics to the Differented Service(DiffServ) mechanism. The same type of data flows with DiffServ classifying were encoded and composed by encoding nodes before transmitting, which reduced the amount of data to be forwarded and improved the QoS performance. The QoS performance of the new model was analyzed by the stochastic network calculus theory. By numerical analysis, we conclude that our model can improve the QoS performances of an DiffServ WSN, such as delay and data backlog.
    Irregular Projection Transformation Matrix in CAVE System
    LIU Jin-song1, DAI Yong-min1, SUN Jian-gang1, ZHOU An2, MING De-lie3
    2016, 0(9):  40-44.  doi:10.3969/j.issn.1006-2475.2016.09.009
    Asbtract ( 210 )  
    References | Related Articles | Metrics
    CAVE system consists of four square projection planes forming a three-dimensional space, and it can visually show complex data and bring users exceptional immersive experience. Based on the analysis of the projection transformation matrix, the paper proposes a fast calculation method of constructing irregular projection transformation matrix by constructing CAVE projected coordinate system. This method enables that CAVE system is no longer limit to the standard cube space. Through obtaining the users’ coordinate position in CAVE projection matrix and realtime computing projection transformation matrix, a best observation position is given to the users by using this method.
    Tactile Rendering System Based on Wide Friction Control
    LI Yuan-ze, LU Xiong, HU Xu-sheng, ZHAO Li-ping, CHEN Si-fan, MA Lu
    2016, 0(9):  45-48.  doi:10.3969/j.issn.1006-2475.2016.09.010
    Asbtract ( 228 )  
    References | Related Articles | Metrics
    Tactile rendering is able to express the surface characteristics of virtual objects, enhances the fidelity of virtual reality systems, so it becomes the research focus in the field of human computer interaction. This paper presents a novel tactile rendering method through combining squeeze film effect with electromagnetic actuation, and a tactile rendering system based on wide friction control is presented, where the electromagnetic actuation is used to enlarge the controllable friction range. Several experiments have been carried out based on the prototype tactile rendering system, which verifies the proposed method. And the experiment results show that the proposed method is able to achieve wider controllable friction coefficients than traditional friction control based tactile rendering.
    Design and Implementation of Enterprise Cloud Storage and Management System
    YUAN Jian-wei
    2016, 0(9):  49-53.  doi:10.3969/j.issn.1006-2475.2016.09.011
    Asbtract ( 195 )  
    References | Related Articles | Metrics
    According to the requirements of enterprises for a large amount of storage, the characteristics and application of OpenStack cloud computing platform and Swift object storage are analyzed. Combined with the analysis of current enterprise demand for storage, the enterprise storage application is integrated and classified, and the unified authentication and management of storage resources is designed and implemented based on Swift object storage cluster, so as to solve the flexible application problem of storage requirements. Finally, a complete Web management platform is designed and developed with the Express framework that is easy to operate and manage the storage cluster.
    A SIFT Pixel Filter Pretreatment Dimensionality Reduction Bidirectional Matching Method
    HU Chen1, JIANG Ze-tao2
    2016, 0(9):  54-59+72.  doi:10.3969/j.issn.1006-2475.2016.09.012
    Asbtract ( 280 )  
    References | Related Articles | Metrics
    Aiming at the problem of many error matching points and slow matching speed of SIFT algorithm, this paper presents a SIFT pixel filter pretreatment dimensionality reduction bidirectional matching method. Before SIFT constructing DoG space, the pixel point needs to preprocess, in order to reduce the useless feature points producing. During feature descriptor generating, the dimensionality needs to be reduced, in order to reduce the amount of computation. Finally, using the constraint registration method, the SIFT bidirectional matching is realized. The experimental results show that the improved method can improve the accuracy and efficiency of matches.
    Color Image Edge Detection Algorithm Based on K-means and Improved Ant Colony Optimization
    LIU Bo-ping1,2, MENG Sha-sha1,2, RAO Lan-xiang1,2, FU Kang1,2
    2016, 0(9):  60-63.  doi:10.3969/j.issn.1006-2475.2016.09.013
    Asbtract ( 171 )  
    References | Related Articles | Metrics
    In order to improve the accuracy of image edge detection, this paper proposes a color image edge detection algorithm based on K-means ant colony optimization. By embedding the clustering in edge detection, the two kinds of algorithms about image segmentation are combined effectively and the advantages are enhanced. Experimental results show that the proposed algorithm solves the problem of slow convergence in traditional ACO. Compared with the typical segmentation methods, it also better retains the image edge details and reduces the computational complexity, which has a better performance.
    An Improved Image Segmentation Method Based on Graph Theory
    YE Qing1,2, HU Chang-biao1,2
    2016, 0(9):  64-67.  doi:10.3969/j.issn.1006-2475.2016.09.014
    Asbtract ( 176 )  
    References | Related Articles | Metrics
    The traditional image segmentation method based on graph theory is based on pixel level, whose application is limited when pixel number gets larger. So an improved image segmentation algorithm is proposed, in which image pixels are aggregated to form a super pixel using the Dijkstra algorithm and the Kruskal algorithm is used to get minimum spanning tree, determine and delete the inconsistent minimum spanning tree, and complete image segmentation. The experimental results show that the improved algorithm has the characteristics of regional segmentation uniformity and good consistency.
    LBP Texture Classification Based on Multi-resolution of Gaussian-Hermite Moments
    ZHANG Jing-jing
    2016, 0(9):  68-72.  doi:10.3969/j.issn.1006-2475.2016.09.015
    Asbtract ( 161 )  
    References | Related Articles | Metrics
    LBP(Local Binary Pattern)as a texture descriptor to capture images of local texture information in a single resolution, a method based on multi-resolution of the Gaussian-Hermite moments and LBP texture classification is proposed. Firstly, with the multi-resolution characteristic of image texture, the multi-resolution of the Gaussian-Hermite moments is used to reconstruct image. Then LBP is used for the feature extraction of reconstruction image. Finally, the K-nearest neighbor feature space distance method is used to classify image texture. KTH-TIPS texture library images are selected for texture classification test, the experimental results show that compared with the traditional LBP texture classification method, the method based on multi-resolution of the Gaussian-Hermite moments and local binary pattern texture classification is used to texture classification, which make more comprehensive to describe the image texture information to get higher classification accuracy.
    Face Recognition Algorithm Based on High-order Structure Constrain Sparse Representation
    FAN Yin-di
    2016, 0(9):  73-76.  doi:10.3969/j.issn.1006-2475.2016.09.016
    Asbtract ( 195 )  
    References | Related Articles | Metrics
    To capture the high-order structure information on sparse representation for more accurate face recognition information, a new face recognition algorithm based on high-order structure constrain sparse representation was presented. Gabor features extracted from face images were used to construct sparse linear coding model. The sparse coefficients were obtained by the optimization with the high-order structure constrain, and face images were classified by sparse coefficient mean. Comparing with the distribution structure constrains and non-structure constrain sparse representation, the proposed algorithm significantly improves the accuracy of face recognition.
    Routing Optimization Problem of Vehicle Transport in Plateau Region Based on Ant Colony Algorithm
    LING Yun-xiang1,2, SONG Zhi-yuan1, ZHANG Shi-hai1, MA Li2
    2016, 0(9):  77-82.  doi:10.3969/j.issn.1006-2475.2016.09.017
    Asbtract ( 191 )  
    References | Related Articles | Metrics
    Taking the transport of relief supplies to plateau region as study background, this paper is from the starting point of promoting the delicate logistics support capability of CAPF. In view of the current disadvantages in logistics transportation, the army logistics transportation route-choice problem of Sichuan Tibet regions is studied by using optimized ant colony algorithm. Function model of plateau stability troop logistics transportation supply on time is set up and the feasibility and effectiveness of the model and algorithm is verified through transportation cases. At last, project management software (Project 2013) is used to manage the material transportation schemes and resource allocation, thus, the dual goals of the shortest transportation time and the highest transportation efficiency are realized.
    Design and Implementation of Logging Module in Personnel File System Based on AOP
    WU Hai-tao, LI Fu-rong
    2016, 0(9):  83-86.  doi:10.3969/j.issn.1006-2475.2016.09.018
    Asbtract ( 243 )  
    References | Related Articles | Metrics
    Based on the analysis of the function module in personnel file system, the Aspect-oriented Programming (AOP) technology is used to separate the logging module from function module as an independent module. It used advice notice in AspectLog to write log in the database log table and used the DAO pattern to achieve the display and maintenance of log records. The actual running results show that the AOP technology is feasible in solving the design of logging module, and has certain theoretical value and application value.
    Indoor PDR Algorithm Based on RSSI Ranging Positioning
    HU Hong, LI Xue-mei, QIN Li-yuan, KANG De, LU Chang-jiang
    2016, 0(9):  87-90.  doi:10.3969/j.issn.1006-2475.2016.09.019
    Asbtract ( 251 )  
    References | Related Articles | Metrics
    In the indoor positioning system, the RSSI ranging positioning system encounters unpredictable random variation due to environmental uncertainty and Pedestrian Dead Reckoning positioning (PDR) system drift errors causes cumulative effect of prolonged positioning. An indoor PDR algorithm based on RSSI ranging positioning is proposed, which the final positioning result is based on extended Kalman filter output of fusion location information. The simulation results indicate that the fusion positioning algorithm shows up its good performance in the aspects of stability, which average location error is about 0.83205 m, maintaining from 0.51948 m to 1.13529 m. The rationality and availability of the scheme are verified.
    A Fault Prediction Method Based on Granular Relevance Vector Machine
    ZHANG Yong-liang1, LI Guo-lin1, LIN Zhen-yu1, LI Gao-yang2
    2016, 0(9):  91-95+99.  doi:10.3969/j.issn.1006-2475.2016.09.020
    Asbtract ( 181 )  
    References | Related Articles | Metrics
    Aiming at the shortages of low learning efficiency and overfitting of relevance vector machine (RVM) in the prediction of largescale fault data with RVM, the theories of granular computing (GrC) and RVM were combined systemly, then a fault prediction method of granular relevance vector machine (GRVM) was proposed. Firstly, taking fuzzy C-means clustering (FCM) as the granulation method, then by FCM, the original data set was granulated into several granules and replaced by the clustering centers. Secondly, the clustering centers set was taken as the training set to train the model of RVM. Finally, we used the trained model to predict the unseen data. The simulation results indicate that, the suitable selection of clustering number and kernel parameter is the key to ensure the performance of GRVM, and GRVM can improve the learning efficiency while it avoids the overfitting and keeps the high prediction accuracy.
    A Method for Paint Database Establishment and Color Matching Based on Absolute K&S
    WANG Qiang, ZHAO Long, WU Peng
    2016, 0(9):  96-99.  doi:10.3969/j.issn.1006-2475.2016.09.021
    Asbtract ( 163 )  
    References | Related Articles | Metrics
    The computer color matching simulation needs to establish a color optics database for all the pigments, at first. The traditional database model adopts relative K&S value to establish database, but this approach causes a heavy workload and inflexible. This thesis analyzes the optical properties absorption coefficient K and scattering coefficient S of the pigment properties, then puts forward a new type of absolute K&S value for database establishment algorithm and verifies the accuracy of database model by combining the tristimulus values color matching algorithm. The experiment shows that the new database model can greatly reduce database establishment workload and solve variable titanium white recipe prediction problem, thus greatly improve the computer color matching system’s adaptability.
    Improvement of Bayes Classification Algorithm Based on Text Filtering
    LU Jin-quan, XU Kai-yong,Dai Le-yu
    2016, 0(9):  100-103+108.  doi:10.3969/j.issn.1006-2475.2016.09.022
    Asbtract ( 161 )  
    References | Related Articles | Metrics
    As the complexity of the network, traditional Bayes classification algorithm cannot meet the demand of text filtering. Multi Word-Bayes (MWB) classification algorithm is proposed. On the one hand, Term Frequency-Inverse Document Frequency (TF-IDF) feature weight is introduced in MWB algorithm to optimize the traditional Bayes algorithm which only considers the problem of word frequency, but doesn’t consider the relationship between the texts. On the other hand, the new algorithm views the relationship between the word and the word as an important reference, which overcomes the traditional Bayes classification algorithm ignoring the semantic analysis on the classifier training. Experiment results show that MWB classification algorithm is of better classification effect on the text filtering.
    Application of Learning Analytics Technology in Big Data Environment
    LE Yi1,2
    2016, 0(9):  104-108.  doi:10.3969/j.issn.1006-2475.2016.09.023
    Asbtract ( 227 )  
    References | Related Articles | Metrics
    Learning analytics has become the focus in education application of big data. In this paper, We analyzed the core step of learning analytics from technological angle, summarized the main instruments of learning analytics, and with examples respectively from different users including constructors, administrators, and tutors, demonstrated the application process of learning analytics. To analyze the access frequency of course module, know the impact on students’ login times from different teaching groups, describe the students’ classification characteristics and find out the implicit inherent rule, this study took the learning behavioral data of certain course platform as the research sample, used some research methods including statistical analysis, visualizing, clustering, association rules mining, etc, and also some instruments such as Excel, SPSS, and Weka, etc. This study shows that the application of learning analytics can fully demonstrate the value of big data, with which we have an important basis of teaching intervention and implementation decisions.
    Design and Implementation of Wisdom Campus under Big Data Environments
    LUO Dan, XU Hong-yan, ZHANG Shi-yu
    2016, 0(9):  109-114.  doi:10.3969/j.issn.1006-2475.2016.09.024
    Asbtract ( 269 )  
    References | Related Articles | Metrics
    With the advent of the “Internet +” era, wisdom campus as an important part of information technology in education, its construction is urgent. Wisdom campus used mobile Internet, big data technology to integrate, analyze and share various types of data in the universities. This paper designed the overall architecture model of wisdom campus under big data environment. From bottom to top of this model has infrastructure layer, data layer, application support layer, business application layer and terminal display layer. Wisdom campus integrated various applications in an information portal, unified identity authentication, and optimized the campus display system, analyzed and processed data that are generated by students in school. Then it can give more convenient data for students to learn and live. In terminal display layer, a more convenient mobile terminal is designed which makes users feel the wisdom campus anytime, anywhere.
    Application of PSO-SVM Theory in Pavement Recognition
    YAO Qing-hua, PU Wen
    2016, 0(9):  115-118.  doi:10.3969/j.issn.1006-2475.2016.09.025
    Asbtract ( 186 )  
    References | Related Articles | Metrics
    The road has a serious impact on the speed of the car, and affects the road traffic safety to some extent. In the identification and detection of pavement, the noise points and outliers are difficult problems in the identification and detection of pavement data. In this paper, with the support vector machine for road noise in the data points and outliers being of sensitive features, we present an improved PSO-SVM recognition algorithm. The algorithm firstly uses parameter to optimize hyperplane equation, then optimizes SVM kernel functions and their parameters by using Particle Swarm Optimization (PSO) algorithms, and finally recognizes and detects the pavement. The experimental results show that the proposed algorithm has the advantages of faster speed for the detection and calculation of pavement fluctuation, and high recognition accuracy which can reach up to 92%.
    Design of Network Search Platform of Open Style Wharf Security and Early Warning System
    YUE Jun-tao
    2016, 0(9):  119-122+126.  doi:10.3969/j.issn.1006-2475.2016.09.026
    Asbtract ( 309 )  
    References | Related Articles | Metrics
    According to the present situation of open type wharf mooring operations and the demand for security network search platform, the network search platform design scheme of open style wharf security and early warning system based on the mixed mode of B/S and C/S is designed. The platforms architecture, functional architecture and the main implementation technology are introduced. The operation results show that the platform has a good practicability and convenience that decision makers can login the platform according to the authority to understand and master the status of mooring operations and the historical data, and provides support for the further production plan decision. It will have the popularization and application value if the platform is further improved.
    Design and Implementation of Hemodialysis Distribution System
    HUANG Xia, CHEN Long
    2016, 0(9):  123-126.  doi:10.3969/j.issn.1006-2475.2016.09.027
    Asbtract ( 233 )  
    References | Related Articles | Metrics
    A hospital hemodialysis distribution system is designed and implemented. This system’ hardware uses data acquisition card, relay control, AD conditioning board, sensor, solenoid valve and pump to implement hemodialysis distribution. Software uses C# Language and SQL Server database to realize automatic control and manual control of hemodialysis distribution including inlet water, dosing, stir, effluent and compression, and related information management. In order to satisfy requirements for stability, correctness and accuracy in practical application, the software realizes the functions of transport anomaly judgment, alarm processing, and abnormal reminder of the operation. The practical application indicates that this system can well satisfy hospital hemodialysis’s need, and have better application prospect.