Loading...

Table of Content

    15 October 2016, Volume 0 Issue 10
    An Improved Sound Signal Compression Algorithm Based on Discrete Cosine Transform
    XIN Xin1,3, CHEN Shudong2, TONG Minglei4, HU Wenhao1,3, LIU Chenwei1,3, GE Haodong3
    2016, 0(10):  1-5.  doi:10.3969/j.issn.1006-2475.2016.10.001
    Asbtract ( 248 )  
    References | Related Articles | Metrics
    Sound compression and transmission is very important part in abnormal sound detection system. However, the existing sound signal compression methods cannot meet the realtime requirements of the system. For this situation, the paper proposed a sound signal compression algorithm adopted piecewise fitting of limited angle error and discrete cosine transform. The algorithm first set a reasonable angle error, according to waveform characteristics, from the first sampling pointbypoint to determine whether it can be compressed according to the geometric angle, then piecewise analog sound signal waveform, after that using the traditional algorithm based on discrete cosine transform, select the appropriate threshold to compress again. Simulation results show that, the proposed algorithm has better performance compared with the traditional compression algorithm.
    A Hybrid Ant Colony Algorithm Based on MapReduce
    CAI Ming, ZUO Yongan
    2016, 0(10):  6.  doi:10.3969/j.issn.1006-2475.2016.10.002
    Asbtract ( 218 )  
    References | Related Articles | Metrics
     The traditional ant colony algorithm has a slow rate of convergence and is easy to result in local optimal solution. This paper raises a new hybrid ant colony algorithm, which is based on a mixed mode of elite mode and normal mode. The algorithm selects a mode proportionally in each iteration to obtain the optimal path. In this way, we are able to find the optimal path in a less time and avoid falling into local optimal solution. Because of the parallel property of ant colony algorithm, it’s feasible to use MapReduce to run it. Experimental results show that the MapReducebased hybrid ant colony algorithm can find out the optimum path in a relatively less time.
    Application of Modified Particle Swarm Optimization in Vulcanization Dispatch
    HU Naiping, GUO Chao
    2016, 0(10):  10-14.  doi:10.3969/j.issn.1006-2475.2016.10.003
    Asbtract ( 203 )  
    References | Related Articles | Metrics
    Based on a particle swarm optimization algorithm, a scheduling strategy was put forward in connection with the characteristics of vulcanization. Firstly, the new PSO algorithm which combining the advantages of local search and global search was introduced, the concept of local extreme is induced to modify speed formula, the advanced algorithm avoids the premature convergence problem effectively. Then, the new PSO algorithm combined with GA operators. The method makes result approach to the best value. An encoding based on curing workshop production tasks made production tasks correspond vulcanization machine. Compared with other algorithms used in the vulcanization dispatching, the new PSO algorithm displays better validity and feasibility.
    A Cloud Computing SEFFD Algorithm for Probability #br# Distribution of Virtual Machine Resource
    WU Weimei1, CHEN Xun2, DUAN Banxiang1, YANG Zhongming1, ZENG Wenying1
    2016, 0(10):  15-20.  doi:10.3969/j.issn.1006-2475.2016.10.004
    Asbtract ( 196 )  
    References | Related Articles | Metrics
    Aiming at the problem of NP hard optimization in the process of cloud computing virtual machine resource allocation, a new method based on cloud computing simulated evolutionfirst fit decreasing algorithm is proposed to improve the efficiency of virtual resource allocation optimization. Firstly, the optimal degree evaluation scheme of virtual machine resource allocation is put forward by using of the strong ability of climbing of simulated evolution, and for which the choice of virtual resource allocation, evaluation and sorting process is carried out; Secondly, the first fit decreasing rule was adopted to the sort of virtual machine and physical host resource allocation to improve the efficiency and effectiveness of resource allocation; At last, by comparing the experimental results with the CloundSim Grid Laboratory and Gridbus cloud simulation platform, it shows that the proposed algorithm is more than 55% of CPU usage, memory usage rate can reach more than 60%, which can improve the utilization rate of the host resources, and achieve the purpose of energy saving.
    Optimal Search Algorithm for Missing Target Based on Bayesian Approach
    YU Mei1, XU Zijian2
    2016, 0(10):  21-24.  doi:10.3969/j.issn.1006-2475.2016.10.005
    Asbtract ( 291 )  
    References | Related Articles | Metrics
    Based on Bayesian approach, an optimal searching algorithm is proposed in the article to solve the problem of searching for missing target in a particular area. This article introduces the application of Bayesian approach and optimization method of searching strategy, then simulating the searching process of different strategies and making comparisons. The results indicate that this strategy put forward in this article is more effective than random search and linear search. This article also explores the effects of the quantity of grids on search efficiency.
    Energysaving Optimization Model Under Big Data Environment #br# Based on Genetic Algorithm
    XU Yuanbin
    2016, 0(10):  25-29.  doi:10.3969/j.issn.1006-2475.2016.10.006
    Asbtract ( 199 )  
    References | Related Articles | Metrics
    To overcome the problem of the high power consumption of the servers in the cloud computing environment, this paper proposed an energysaving optimization model under big data environment based on genetic algorithm, which optimized the task scheduling to reduce the server power consumption, and then this paper designed some algorithms to formally indicate the model. We test the algorithm in real world, the experiment result shows the proposed model and the algorithms can effectively reduce server power consumption, which improved the system resource utilization.
    Recommendation System for Large Website Based on Enhanced Association Rules Mining
    ZOU Yu, XIAO Qian, WU Shurong
    2016, 0(10):  30-34.  doi:doi: 10.3969/j.issn.1006-2475.2016.10.007
    Asbtract ( 144 )  
    References | Related Articles | Metrics
    Aiming at the problem that the content based recommendation system has high delay and low degree of satisfaction of recommendation in the large web site, an enhanced
    association rules mining based recommendation system for large web site is presented. Firstly, the items with low frequency occurrence are eliminated so that the database is
    minimized; Then, a counter is introduced to each transaction, and the counter is used to count the number of replication of the transaction instead of the directly clustering
    process of repeated transactions in the traditional recommendation system, this improved strategy not only improves the efficiency of recommendation but also the scalability of
    the recommendation engine. Real data based experiments results show that the proposed system is real time and has high recommendation accuracy.
    A Clustering Routing Protocol for Wireless Sensor Network
    LI Huan, XU Du
    2016, 0(10):  35-39.  doi:10.3969/j.issn.1006-2475.2016.10.008
    Asbtract ( 203 )  
    References | Related Articles | Metrics
    We propose a new cluster routing protocol method which combines EEMLC with DSR (called EEMLCDSR) for realtime monitoring the physiological parameters of special
    patients in moving such as patients with serious infectious disease, senile dementia patients, patients with mental disorder, and so on. Our approach is based on wireless sensor
    networks having the advantages of AdHoc Network and multihop routing and searches for network topology changes caused by nodes moving randomly and the routing protocols for
    WSN. Experiments simulated on NS2 show the practicability of the new method.
    Application of Multiadaptive Lifting Wavelet Denoising in Computer Videointercepting
    REN Kaiqi, DAI Hepeng, ZHENG Jun, WANG Jingjing
    2016, 0(10):  40-43.  doi:10.3969/j.issn.1006-2475.2016.10.009
    Asbtract ( 206 )  
    References | Related Articles | Metrics
    For computer video radiation signal of low SNR, denoising is necessary for restoring video signal accurately. Based on the basic structure of lifting wavelet
    algorithm, the denoising algorithm of multiadaptive lifting wavelet is proposed. In the operations of predicting, updating, and threshold denoising, the adaptive factors are
    added. The algorithm of traditional denoising, lifting wavelet denoising, and multiadaptive lifting wavelet denoising are used to deal with the computer video radiation
    signal of low SNR, the results show that the effect of multiadaptive lifting wavelet denoising algorithm is better than others.
    Machine Vision AGV Indoor Navigation Method Based on Ground Feature Block Matching
    WANG Fan1, XING Yanwen2
    2016, 0(10):  44-48.  doi:10.3969/j.issn.1006-2475.2016.10.010
    Asbtract ( 178 )  
    References | Related Articles | Metrics
    A machine vision technology is used to detect the ground feature, based on block matching algorithm for AGV navigation. First, the overlap of each two frame images is
    identified. Second, the overlap of two images of different frames is found by using feature block matching algorithm. Last, through calculating the overlap image in the previous
    frame offset, the distance of the car moving is calculated. So far, the calculation of the cars track is completed. Experiment results show that prototype system of this
    method reached the anticipated result under different conditions of ground, and the method is proved to be effective.
    Research on Stitching Method Based on UAV Aerial Image of Road
    ZHOU Min1, LIU Ningzhong2, WANG Lichun2
    2016, 0(10):  49-53.  doi:doi: 10.3969/j.issn.1006-2475.2016.10.011
    Asbtract ( 189 )  
    References | Related Articles | Metrics
    With the rapid development of the highway construction, using traditional artificial view to detect road marking and road infrastructure is no longer applicable. With
    the mature of the UAV aerial technology, using UAV aerial to analyze the road infrastructure will undoubtedly be a better way of detection. In this paper, we mosaic the road
    images taking by the UAV aerial, and propose a new optimization method. Firstly, we extract the road image point by the SURF method, and then we match and filter the feature
    points by BBF algorithm and our optimization algorithm, finally we use image weighted method to mosaic the road images and get a whole highway image. The experimental results
    show that the method has stronger applicability and generality, can meet the practical requirements.
    Modeling Analysis of Management Information Platform of #br# Crop Seed Business Recordfilling Based on UML
    TIAN Yaling
    2016, 0(10):  54-61.  doi:10.3969/j.issn.1006-2475.2016.10.012
    Asbtract ( 146 )  
    References | Related Articles | Metrics
    At present, agricultural departments still employ a traditional manual method to manage crop seed business recording. In view of this situation, this paper conducts a
    modeling analysis of the main function modules of the management information platform of crop seed business recording by means of the objectoriented method on the basis of a
    study of the workflow of crop seed business recording and a description of the business requirements of the platform mentioned above. Relying on this, it proposes a model and a
    method to manage crop seed business recording by application of Internet technology. Experimental results show that the management information platform of crop seed business
    recording, whose designing is based upon the model initiated in the paper, can well satisfy the business demands of agricultural departments in charge of the management of crop
    seed business recording and it also can serve as a useful exploration of the ITbased crop seed business recording system.
    Research on Scheduling Problem of Software Testing Platform Based on Cloud Computing
    TIAN Liying, WANG Yu, JIANG Xueting
    2016, 0(10):  61-66.  doi:doi: 10.3969/j.issn.1006-2475.2016.10.013
    Asbtract ( 144 )  
    References | Related Articles | Metrics
    In recent years, the rise of cloud computing technology was favored for its superior computing power, ondemand resources, charging by volume or time and other characteristics. While at the same time, the traditional software testing techniques still plague many enterprises for the high cost and low efficiency problems. So to migrate software testing to cloud computing environment has become welcomed. In this paper it briefly introduced the basic definition and characteristics of cloud testing, elaborated the framework of cloud testing platform and improved the dynamic scheduling algorithm. In the end, the emulation experiments prove the effectiveness of this algorithm by CloudSim a cloud computing emulator.
    SQL Injection Detection Based on Neural Network
    ZHANG Zhichao, WANG Dan, ZHAO Wenbing, FU Lihua
    2016, 0(10):  67-71.  doi:doi: 10.3969/j.issn.1006-2475.2016.10.014
    Asbtract ( 160 )  
    References | Related Articles | Metrics
    A novel approach to detect injection attacks was presented by identifying characteristics of injection attacks and using a neural network model to determine the likelihood that a given query is malicious. Based on the recognition of SQL character injection attack, the analysis model comes into being used to determine whether to inject SQL statements of model by using a large number of known data and the neural network algorithm. After that, based on the neural network model presented, the user input SQL statement can be directly analyzed and processed. This approach is implemented in a proxy that locates between a Web application and a database and prevents suspected malicious queries from being executed. This requires no modification of existing application code and is capable of identifying unknown attacks. Experimental results show that the model can effectively improve the accuracy and efficiency of the detection.
    IDbased Forward Secure Threshold Proxy Signature Scheme
    LI Cun, LI Zhihua
    2016, 0(10):  72-76.  doi:doi: 10.3969/j.issn.1006-2475.2016.10.015
    Asbtract ( 146 )  
    References | Related Articles | Metrics
    In terms of bilinear pairing and identityrelated cryptography, a forward secure threshold proxy signature scheme is proposed. The scheme realizes the periodic updating of the proxy signature key, and effectively improves the security of proxy signature. The analysis results show that the proposed scheme is safe and reliable, and has forward security, backward security and anonymity.
    Keyinsulated Proxy Signature in Standard Model
    YAN Songhui, WAN Zhongmei
    2016, 0(10):  77-83.  doi:doi: 10.3969/j.issn.1006-2475.2016.10.016
    Asbtract ( 140 )  
    References | Related Articles | Metrics
    Keyexposure seems inevitable in proxy signature scheme. To minimize the damage caused by key exposure in proxy signature scheme, keyinsulated mechanism to proxy signature scheme was introduced. However, existing keyinsulated proxy signature schemes are based  on identity. In this paper, we present a keyinsulated proxy signature scheme in the standard model. The scheme is keyinsulated security and unforgeability of the proxy signature.
    A Low Cost Secure Ownership Transferring Method of RFID Network
    CHU Guiyang
    2016, 0(10):  84-87.  doi:10.3969/j.issn.1006-2475.2016.10.017
    Asbtract ( 183 )  
    References | Related Articles | Metrics
     Concerned at the problem that the existing ownership transferring protocol has high computational and storage cost, a low cost ownership transferring protocol of multi
    tags and multiowners is proposed. Firstly, a pseudorandom number is generated by the third trusted party and the secret is delivered to new owner, the secret is verified
    by new owner; then, the secret is delivered to all tags, the secret is verified by each tag. Only one XOR operation and 128 bitwise pseudorandom number generation operations
    are used in the proposed method and the computational load of passive tag is satisfied, and the proposed method shows good privacy and security performance. Simulation results
    show that the proposed method performs lower endtoend delay.
    Research and Implementation of Native Layer Reinnforcement #br# Technology Based on Android Platform
    ZHANG Zhen, ZHANG Long
    2016, 0(10):  88-91.  doi:10.3969/j.issn.1006-2475.2016.10.018
    Asbtract ( 215 )  
    References | Related Articles | Metrics
    After Google launched NDK, it enables developers to use more secure C/C++ language to develop Android applications. Based on the current DEX reinforcement scheme
    analysis, Native code security and ELF file parsing, a new Native layer reinforcement scheme based on a specific section is proposed to achieve the key program logic hiding, and
    effectively increases the safety of Android program for reverse engineering.
    An Improved Method of Data Integrity Auditing for Cloud Storage
    DAI Yingling, CHEN Junjie, ZHOU Dehua, CHEN Jielang
    2016, 0(10):  92-95.  doi:10.3969/j.issn.1006-2475.2016.10.019
    Asbtract ( 205 )  
    References | Related Articles | Metrics
    Cloud storage service provides cloud users with significant convenience. However, losing the physical possession makes users can not ensure the integrity of the
    outsourced data. After analyzing the current auditing scheme, the paper proposes a RSA Signaturebased data integrity verification scheme, which is privacypreserving, also
    supports public auditing and locating the error data. The detail security analysis and performance analysis show that the proposed scheme is secure and efficient.
    Design and Implementation of Edible Gelatin Production Safety Quality Traceability System
    LIU Boping1,2, QIU Feng1,2, WANG Lei1,2, HU Min1,2
    2016, 0(10):  96-99.  doi:10.3969/j.issn.1006-2475.2016.10.020
    Asbtract ( 167 )  
    References | Related Articles | Metrics
    Edible gelatin as a kind of commonly used food additives, are widely used in the food industry production process, it is of great significance to ensure food safety by
    the software way to trace the quality of the production process. In this paper, through analysis of the edible gelatin production process, an edible gelatin production safety
    quality traceability system is designed and implemented, and the design and implementation method of the system is introduced and expounded also.
    Architecture Design of Orchard Plant Protection Robot System Based on CPS
    JI Guangyong1, AI Changsheng2, YANG Tingsong1, WU Delin3
    2016, 0(10):  100-103.  doi:10.3969/j.issn.1006-2475.2016.10.021
    Asbtract ( 204 )  
    References | Related Articles | Metrics
     Cyberphysical system(CPS) is a new intelligent control system which is highly integrated in computing, communication, control and physical processes. It has the
    characteristics of safety, reliability, real time, high efficiency, and has broad application prospects. This paper applies CPS to the orchard plant protection robot system,
    and puts forward the fourlayers architecture framework according to the features of CPS and plant protection robot system. The architecture is divided into physical layer,
    network communication layer, data service layer and user application layer. This paper introduces the working process of plant protection robot CPS, and the composition and
    function of each layer are described in detail.
    Unimodal and Multimodal Human Perception of Affective States #br# During Humancomputer Interaction
    JIANG Xueting, WANG Yu, TIAN Liying
    2016, 0(10):  104-111.  doi:10.3969/j.issn.1006-2475.2016.10.022
    Asbtract ( 262 )  
    References | Related Articles | Metrics
    Emotion perception is one of the most important research topics in the field of humancomputer interaction. With the increase of channels, research costs and the
    workload are also increasing. In this paper, the human’s basic emotion states were been detected by untrained people in seven conditions during humancomputer interaction, and
    assess stability. It computed and analyzed the agreement between two observers(oo) with mixedeffects logistic regression models. The result is generally low. In addition to
    the overall consistency of the unimodal and multimodal condition, it also compared the consistency of individual affective states in a single model, and classified the results
    with the superadditive, additive, redundancy and inhibitory effect. The significance of the results of automatic emotion detection is still been discussed.
    UWB Antenna of 5.8 GHz Active RFID Tag
    FU Kang1,2, HU Shaowen1,2, TANG Hui1,2, LIU Boping1,2, HU Min1,2
    2016, 0(10):  112-115.  doi:10.3969/j.issn.1006-2475.2016.10.023
    Asbtract ( 178 )  
    References | Related Articles | Metrics
    Ultra Wideband(UWB) antenna used for 5.8GHz active RFID tag is designed. The antenna is etched on a coppercladding substrate,  whose material is F4BK2 with
    relative permittivity of 2.65, and the magnitude is 30.0mm×30.0 mm×1.5 mm. The parameters of the antenna are simulated and optimized with HFSS. The trapezoidal radiating patch
    is used to broaden the impedance bandwidth. The bandwidth ( return loss≤-10 dB) is from 3.1 GHz~11.2 GHz that means a relative bandwidth of 113%. A prototype antenna is
    fabricated, the results show that good agreement has obtained between the simulation and experiment and the proposed antenna can not only realize the ultrawideband, but also
    have the merits of simple structure, small size and ease of integration.
    A Course Selection Assistance System Based on SSM Framework and HttpClient Component
    LIAO Jiacan, HOU Chaojun
    2016, 0(10):  116-120.  doi:10.3969/j.issn.1006-2475.2016.10.024
    Asbtract ( 250 )  
    References | Related Articles | Metrics
    This paper is aimed to provide a course selection assistance system for the school’s educational administration management system, which enables students to select
    the course with efficiency. Our system is composed of user and administrator platform. In particular, the system is developed by using Java language, which is comprised with the
    modules of course selection and data synchronization. Here, the frontUI is developed by Bootstrap framework, and the backend is built by SSM framework. The Web crawler based
    on HttpClient is a component of system for data synchronization and making service requests. The result shows that the system can effectively improve the efficiency of course
    selection.
    An Invoice Management System Based on Load Balancing
    RAN Xun, YUAN Jianhua, LIU Yuguo, HU Yang
    2016, 0(10):  121.  doi:10.3969/j.issn.1006-2475.2016.10.025
    Asbtract ( 226 )  
    References | Related Articles | Metrics
    In order to optimize invoice processing, a solution based on the mobile phone platform is proposed. Comparing with handling the invoice focused in finance shared
    service center, this solution removed the intermediate nodes, applied image recognition technology to optimize the process. This paper studies the mobile platform technology and
    the image recognition technology, and focuses on the business processes and the technology verification. The information barriers between general staff and invoices auditors are
    broke down in the solution, and the invoice image taken by mobile phone under natural conditions can be verification recognized. Meanwhile, to meet users’ needs in terms of
    performance and efficiency, servers cluster is built to achieve server load balancing.