Loading...

Table of Content

    09 March 2017, Volume 0 Issue 2
    Cloud Task Scheduling Algorithm Based on Modified K-means Clustering
    WANG Huan, LI Hong-hui, ZHANG Jun-wen
    2017, 0(2):  1-5+11.  doi:10.3969/j.issn.1006-2475.2017.02.001
    Asbtract ( 250 )  
    References | Related Articles | Metrics
    Aiming at the problem of low efficiency and high cost in cloud task scheduling, a new cloud task scheduling algorithm based on modified K-means clustering is proposed. Based on the hardware properties of the virtual resources, the improved clustering algorithm is used to cluster the virtual resources. The task preferences are computed, so that different preferences of the task could select resources in different clusters. Taking into account the scheduling cost problem, the task scheduling is performed on each cluster by using the improved Min-min algorithm. We improve the K-means clustering algorithm aiming at the problem that the initial cluster centers are randomly selected and it is easy to fall into local optimal solution. Finally, the cloud simulation platform CloudSim is used to carry out the experiment, and the results show that the proposed algorithm can improve the efficiency compared with the non-clustering scheduling algorithms.
    An Improved Genetic Algorithm for Solving Graph Coloring Problem
    LI Kai
    2017, 0(2):  6-11.  doi:10.3969/j.issn.1006-2475.2017.02.002
    Asbtract ( 249 )  
    References | Related Articles | Metrics
     When the people apply the genetic algorithm which is encapsulated with the structure of line and coded by integer in solving the graph coloring problem, redundancy codes makes the performance of algorithm degrade and easily plunges into local optimum. In order to solve these problems, the paper proposes a new fitness function which can deal with the redundancy or similar codes. Based on the fitness function, the paper also extends the genetic operator, such as selection operator and so on. These operators can make sure that in the preliminary, the genetic algorithm can generate good individuals and enforce their guidance function, while in the later period they can weaken the control function of good individuals which are generated in the preliminary, at the same time, they also can optimize the better individuals and make them evolve to the best which is useful for the convergence of genetic algorithm. The experiment results show that: the method proposed in the paper not only can converge the global optimal solution but also can improve the genetic algorithm performance.
    Batch Picking Path Planning Simulation of Warehouse Mobile Robot
    PAN Cheng-hao, GUO Min
    2017, 0(2):  12-16.  doi:10.3969/j.issn.1006-2475.2017.02.003
    Asbtract ( 229 )  
    References | Related Articles | Metrics
    In order to solve the problem of warehouse mobile robot path planning with high efficiency and real time in the process of picking operation, an effective method was proposed. First of all, according to the demand of order picking, a flexible storage space model was made and the task of order picking was described. Secondly, according to the characteristics of the batch picking task, the mathematical model of the Traveling Salesman Problem (TSP) was established. Once again, an improved adaptive genetic algorithm was proposed to solve the TSP. Finally, under the premise of considering the cost of the path turning angle, an improved A*algorithm combined with the improved adaptive genetic algorithm was used to solve the problem of batch picking path planning. The simulation results show that the method which meets the requirement of batch picking path planning of warehouse mobile robot is of faster convergence speed, less average path length and less algorithm running time.
    Characteristic Matrix of Power Set and Its Application
    YU Xian-feng, QU Zheng-geng, ZHANG Lin
    2017, 0(2):  17-21.  doi:10.3969/j.issn.1006-2475.2017.02.004
    Asbtract ( 219 )  
    References | Related Articles | Metrics
    The function of the eigenvector of the subset, the characteristic function of the eigenvector of the subset, and the characteristic function of the subset of the set are defined. The definition of characteristic matrix of power set is given, and its properties are reserched. 2 kinds of formal algorithm for generating characteristic matrix of power set——Modulo 2 and Toss about Evaluation are given. The complexities of the algorithms are analyzed. Finally, the characteristic matrix of power set is used for generating the power set and the propositional formula true value table. The result shows that the algorithms are reasonable and efficient.
    Convolutional Sparse Autoencoder Neural Networks
    NIU Yu-hu
    2017, 0(2):  22-29+35.  doi:10.3969/j.issn.1006-2475.2017.02.005
    Asbtract ( 282 )  
    References | Related Articles | Metrics
    Convolutional neural network is a hotspot in the research of image recognition field. This paper proposes a convolutional sparse autoencoder neural network (CSAENN) to improve and simplify the existing convolutional autoencoder. Firstly, the traditional deconvolution methods are replaced with zero padding around feature maps. Compared with the traditional deconvolution methods, our approach reduces the complexity and has little affect on feature extraction and reorganization. Secondly, only the weights of encoders are updated during training and those of decoders are set to be the transpose of the encoders’ weights. This setting can establish a relationship between the weights of both encoders and decoders and realize feature extraction as well as sample reorganization with the same weights that can be regarded as well pre-trained. Finally, in order to improve the network performance, the techniques of population sparsity, lifetime sparsity and high dispersal are applied to encoders to make the weights and outputs sparser. Experimental comparison results on the MNIST and CIFAR10 datasets demonstrate that CSAENN has better performance.
    NAO Robot Player Recognition Based on Haar-like Features and Color Features
    ZHANG Jun-jie1, DING Shu-yan2, LI Lun-bo1
    2017, 0(2):  30-35.  doi:10.3969/j.issn.1006-2475.2017.02.006
    Asbtract ( 259 )  
    References | Related Articles | Metrics
     In the RoboCup games, recognition of the players is the basis of route planning, passing and other top strategy. Due to the limitation of hardware condition of NAO robot and the disturber of the background, the speed and accuracy of the algorithm are required. In order to meet these requirements, a recognition algorithm based on Haar-like features and cascade Adaboost classifier is proposed. Firstly, NAO was first recognized by a cascade classifier trained by the Adaboost algorithm in the offline environment; then, the candidate target regions are identified by using the color histogram matching for second times, in the removal of false detection area at the same time, NAO also identified other robots being friend or foe. The experimental results show that this method can effectively identify the NAO robot, and meet the requirements of the robustness and real-time of the recognition algorithm.
    Software Defect Prediction Model Based on DA-SVM
    GAN Lu, ZANG Lie, LI Hang
    2017, 0(2):  36-39+44.  doi:10.3969/j.issn.10062475.2017.02.007
    Asbtract ( 159 )  
    References | Related Articles | Metrics
     Feature extraction is an important step in software defect prediction technology research. However, the existing feature extraction cannot accurately obtain the nonlinear dependence relations among features, thus these methods are unable to improve the accuracy of software defect prediction model. In this paper, to solve this question we propose a software defect prediction model (Denoising Autoencoder Support Vector Machine, DA-SVM) which is based on denoising autoencoder and Support Vector Machine. Firstly, the model extracts features by using denoising autoencoder, secondly uses these features as input of support vector machine, lastly, uses this model to predict bugs. Experimental results show that DA-SVM not only improves the accuracy of software defect prediction model, but also reduces the noise of history data and enhances the robustness of the software defect prediction model.
    Programming Platform of Supporting Non-compiling and Encapsulation-reuse of Logical Graphics
    ZHANG Lei, CHEN Hong-jun, ZHOU Qiang, ZHOU Lei, WEN Ji-feng
    2017, 0(2):  40-44.  doi:10.3969/j.issn.1006-2475.2017.02.008
    Asbtract ( 168 )  
    References | Related Articles | Metrics
     To settle the problem that modified logical graphics must be recompiled and logical graphics cannot be reused in traditional graphical programming, this paper promotes and implements a graphical programming platform supporting non-compiling and encapsulation-reuse. The platform uses dynamic registration method for generating C source code and logical file. When logical graphics have been modified, users only need to regenerate logical file without compiling again. Also the platform can encapsulate and reuse logical graphics, conceal the technical details of the logic graphics effectively and reduce code space of embedded program.
    Simulation of Carrier Battle Communication Network Based on Mesh
    GAO Wei1, XU Da-qin2, ZHANG Gui-ying2
    2017, 0(2):  45-48+66.  doi:10.3969/j.issn.1006-2475.2017.02.009
    Asbtract ( 216 )  
    References | Related Articles | Metrics
     With the continuous development of maritime combat, integrated communication has become an important factor for winning the war. Carrier battle is an
    important fighting force, its existing communication methods cannot meet the demands of modern communication. By researching on the properties of selforganization, high-bandwidth, multi-hop transmission of wireless Mesh network, the paper proposed a Mesh+Ad Hoc networking mode in order to meet
    high-bandwidth, low-latency communication needs of the carrier battle. We simulated the network performance by OPNET simulation software and the results showed that the communication network supports transmission of voice, data, video, etc.
    Visual Simulation of Image Guided Bomb Based on Vega Prime
    LIU Qing-song, XIE Xiao-fang, CAO Jian, PANG Wei
    2017, 0(2):  49-52.  doi:10.3969/j.issn.1006-2475.2017.02.010
    Asbtract ( 188 )  
    References | Related Articles | Metrics
    Aiming at the simulation of visible light in the hardware in the loop simulation of image guided bomb, this paper realizes a visual simulation system by using Prime Vega simulation software. Through the shared memory technology, the visual simulation process can read the trajectory calculation data of the trajectory simulation process in real time, and refresh the scene. By using interpolation method, the smoothness of the flight trajectory of image guided bomb in visual simulation is ensured. The LOD (level of detail) technology and viewpoint center ocean model effectively save the simulation expenses of ocean scene simulation, which guarantees the simulation frame rate. Through experiment, the system simulation frame rate can reach 25 frames per second, which can meet the requirements of the real-time simulation in hardware in the loop simulation system.
    An Encrypted Communication Device of Underwater Blue-green Laser Based on FPGA
    CHEN Qing-hua1, KONG Xiang-yi2, LIU Chong-yi3
    2017, 0(2):  53-56.  doi:10.3969/j.issn.10062475.2017.02.011
    Asbtract ( 171 )  
    References | Related Articles | Metrics
     Blue-green laser is featured by a short wavelength, high energy, easy underwater transmission and strong anti-jamming capability, etc. In recent years it has cut a figure in the military field. In order to explore the security communication problems of bluegreen laser, an encrypted communication device of underwater blue-green laser based on the FPGA is designed. The device is composed of data encryption equipment, data decryption equipment, and laser transmitter and laser receiver. With blue-green laser being the carrier, the AES algorithm is embedded in the FPGA chip to realize 128-bit encryption and decryption on chip-level. The experimental results show that the device can satisfy the stability, real-time and security demand of underwater communication. And the feasibility of applying blue-green laser in secure underwater communication field is verified.
    Key Technology of Power Grid Safety Product Interaction
    WANG Hong-kai1, HUANG Yi-bin2, MA Zhi-cheng3
    2017, 0(2):  57-60.  doi: 10.3969/j.issn.1006-2475.2017.02.012
    Asbtract ( 128 )  
    References | Related Articles | Metrics
     With the development of cyber-attack technology, it is more and more difficult for a single safety product to respond to cyber-attacks, so combination of various safety products is required. In power grid, various safety products are independent, lack interactions and can not find potential cyber-attack. So an online interaction module of power grid information secure three-defenses is proposed. With the mapping of connections information, this module achieves accurate interaction of power special safety protection products with various firewalls. By the global association analysis of security event, the module can achieve active defense in power grid.
    Wireless Mesh Network Intrusion Detection Algorithm Based on Link Complete Coverage
    CHU Gui-yang
    2017, 0(2):  61-66.  doi:10.3969/j.issn.1006-2475.2017.02.013
    Asbtract ( 163 )  
    References | Related Articles | Metrics
     The existing wireless mesh network (WMN) security monitoring methods do not consider the resource constraint of the nodes in WMN, so they are not practical. Centralized and distributed intrusion detection algorithms are proposed based on the link complete coverage. The security of each link is maintained by base station in centralized intrusion detection algorithm, and the genetic algorithm is used to find the optimized solution of the problem of link complete coverage, so the detection rate is improved; IDS is adaptively distributed into the nodes with enough remaining resource based on the prediction machinery of the resource cost, so the resource cost of each node is balanced. Simulation experiments results show that the proposed two methods are of better security in single hop intrusion attack, multi-hop intrusion attack, and compromised attack.
    Design and Implementation of Hierarchical Storage System FQ-HSM Based on File Queue
    ZHANG Rui-jie1, ZHANG Wen-sheng1, LI Zhan-huai2
    2017, 0(2):  67-72+97.  doi:10.3969/j.issn.1006-2475.2017.02.014
    Asbtract ( 180 )  
    References | Related Articles | Metrics
    Through simplifying the architecture of hierarchical storage system, this paper puts forward a hierarchical storage system FQ-HSM based on file queue. Based on the FVAP(File Value Accurate Prediction), FQ-HSM calculates the system relative values of files and builds file queue, then it decides the data migration plan through storage early warning mechanism. After testing FQ-HSM, the results show that it has had due functions: data classifying, data automatically migrating, user transparently accessing and so on. FQ-HSM shows a good performance compared with present data classifying methods in hit rate and back-migration rate.
    Web Load Test Method Based on Web Usage Mining
    XUE Qun-qun1, ZHANG Jun-wen1, ZHANG Da-lin2
    2017, 0(2):  73-77.  doi:10.3969/j.issn.1006-2475.2017.02.015
    Asbtract ( 148 )  
    References | Related Articles | Metrics
    As an important means to guarantee stability and reliability of Web applications system, Web load testing is becoming a very important part in software development lifecycle. However, different from traditional software testing, Web load testing is very difficult because of the complexity and unpredictability of user behavior of Web applications. Against the above problems, a Web usage frequent pattern subtree ming algorithm is proposed. This method gets frequently visited Web pages from the user's access log, analyzes the behavior characteristics of the user and makes the test load environment close to the real world. Finally, the performance testing tool LoadRunner is used to conduct load test on an actual project and the result verifies the effectiveness and practicality of the method.
    Processing of Null Value in Multiset Relations
    GUO Yong-ke, MAO Yu-guang, XIANG Ri-feng
    2017, 0(2):  78-82.  doi:10.3969/j.issn.1006-2475.2017.02.016
    Asbtract ( 122 )  
    References | Related Articles | Metrics
     Databases use Null value and duplicate tuples to simulate incomplete information and duplicate entities in real world respectively. Multi-set is allowed to be query’s result in most of existing database, however, these databases still use data models based on traditional set relations to handle Null values, and that would bring hidden danger to database security. In order to formally describe Null value’s behavior in multi-set relations, the paper extends Kleene’s three-valued logic system by adding a new logical connective ψ based on Null’s Unknown interpretation, redefines the multi-set relation data model, and extends the standard relational algebra with Null. What’s more, this paper gives the demonstration analysis of the algebra satisfying properties such as associate law and distributive law, and this makes sense to the query optimization. The extended standard multi-set algebra can be used to handle Null value in database as an abstract query language.
    Automatic Reasoning Identification of Multidimensional Attribute Based on Decision Tree
    TANG Kun1,2, JIANG Bing-nan1,2, PENG Yan-bing1,2
    2017, 0(2):  83-87+97.  doi:10.3969/j.issn.1006-2475.2017.02.017
    Asbtract ( 152 )  
    References | Related Articles | Metrics
    There exist certain disadvantages to the decision tree classification in the application of attribute recognition, such as sample data attribute category must be known in advance, can’t do automatic reasoning and so on. Against the above, this paper proposes an automatic reasoning machine learning identification model of multidimensional attribute based on decision tree. The paper introduces attribute similarity measure strategy and machine learning method to realize automatic reasoning and recognition for multi-attribute. The experimental results show that this model can effectively realize automatic classification of multi-attribute, accuracy is about 93%, and the final score of identification is above 0.71, which can well meet the requirements of automatic identification of attributes.
    Traffic Smoke Detection and Warning System Based on  Safety Cloud Platform and Mobile Internet
    LI Yao-hua1, YOU Feng1, CHEN Kang1, CHEN Run-feng1, PENG Han-yu2, FANG Wei-chuang3
    2017, 0(2):  88-92.  doi:10.3969/j.issn.1006-2475.2017.02.018
    Asbtract ( 191 )  
    References | Related Articles | Metrics
    In order to improve the control and prevention of traffic  fire, reduce the ill effects of traffic fire effectively, the paper presents a kind of traffic smoke warning system, which is based on the safety cloud platforms, the mobile Internet, and the existing monitoring system in transportation field. The system mainly consists of three subsystems: video monitoring system in traffic scene, smoke detection system in the cloud, and the smoke warning system by the mobile Internet. First, video monitoring system in traffic scene is mainly used to collect the smoke video of accident scene, and upload the video to the cloud storage resource pool, which is convenient for the analysis and accountability after the accident. Second, smoke detection system in the cloud runs the video smoke detection algorithm quickly by the powerful cloud computing, realizing the early recognition of the fire, which is beneficial for preventing the expansion of fire; Third, warning system by mobile Internet can push the fire information to the relevant personnel and institutions in a timely manner, reducing the bad influences of fire as much as possible. After a
    variety of experiments, the system shows its good real-time performance, accuracy and robustness, resulting from the fact that smoke warning rate is 93.75%, the false alarm rate is 5.33%, and the average warning time is 7.55 s.
    KNN-based Verification Code Recognition Technology on Campus Network
    WANG Yang1,2, XU Ying-qiu1,2, PENG Yan-bing1,2
    2017, 0(2):  93-97.  doi:10.3969/j.issn.1006-2475.2017.02.019
    Asbtract ( 192 )  
    References | Related Articles | Metrics
     With the rapid development of technology, verification code technology in the network protection and information security has a wide range of applications. Since the means of network attacks are upgraded, verification code technology is also continuously improved. The campus network verification code used in this paper is the most common type of character verification codes of the current network. It is of the characteristics of diversified background noise and character distortion adhesion, so the code is difficult to achieve automatic recognition program. For these characteristics, this paper proposes a RGB de-noising method in the background de-noising stage, and adopts a segmentation method which combines contour difference projection method with the water droplets algorithm in the single character cutting stage. Finally, all the character models are get, KNN algorithm is used for character recognition so as to receive recognition results. Experiments show that the method is of good recognition effects for the verification code with background noise and distortion adhesion character.
    A Multiple-phantom Node Source Location Privacy Preserving Protocol in WSN
    ZHU Shi-zhao, XUE Shan-liang
    2017, 0(2):  98-104+108.  doi:10.3969/j.issn.1006-2475.2017.02.020
    Asbtract ( 196 )  
    References | Related Articles | Metrics
     In WSN applied for monitoring objects, attackers can get the location of source node by hop-by-hop traceback to data packet, which is an enormous threat to the safety of monitoring object. Thus, it is necessary to apply some appropriate strategies to protect the source location privacy. When existing route strategies based on phantom node select phantom node, these strategies concentrate on source data packet walking randomly or in constructed track, however, the locations of phantom nodes are not diversified and the walk paths overlap easily. During the network initialization phase, we selected two phantom nodes for every node through the triplet creation. The triplet creation method can ensure the two phantom nodes for every node are both outside the visible area by calculating the geographical location of node. During route work phase, source node chose a phantom node through random number and sent data packet, relay nodes transmit data packet by sector region division and selection. Theoretical analysis and simulation experiment shows that, the proposed strategy enhances safety of source node and ensures the balance of transmission delay.
    IPRAN Router Fast Switching Function Based on BFD
    LI Ming-chao1, HE Yan2
    2017, 0(2):  105-108.  doi:10.3969/j.issn.1006-2475.2017.02.021
    Asbtract ( 152 )  
    References | Related Articles | Metrics
     BFD(Bidirectional Forwarding Detection) protocol is a mechanism which can improve the rate of detecting trouble and provide a guarantee for quickly repairing trouble among links. In order to quickly detect the trouble of adjacent devices and repair the faults while transmitting real-time traffic in IPRAN routing device, this paper discusses a mechanism between BFD and routing protocols, which deploys BFD to realize fast switching between master and backup routing in milliseconds, and repairs the network problems, improves the reliability of IPRAN network.
    Channel Capacity Analysis of Physical Layer Network Coding Based on AF Relay
    CHEN Jun, FANG Yong
    2017, 0(2):  109-112.  doi:10.3969/j.issn.1006-2475.2017.02.022
    Asbtract ( 177 )  
    References | Related Articles | Metrics
    Combined the Physical layer Network Coding with the wireless cooperative relay technology, this paper investigates the channel capacity of three-node two-way relay system, and verifies the theoretical results by mean of simulation. The simulation results proves that the channel capacity can be largely improved by the application of Physical layer Network Coding. Meanwhile, the channel capacity of two-way relay system which adopts the technique of Physical layer Network Coding will be influenced by the SNR of the system and the position of the relay.
    Food Science Popularization Knowledge Software Based on Android
    ZHANG Gao-zhen, LIU Yuan-bo, ZHANG Xian-kun
    2017, 0(2):  113-116.  doi:10.3969/j.issn.1006-2475.2017.02.023
    Asbtract ( 127 )  
    References | Related Articles | Metrics
    In view of nowadays hot issues for the food safety problems happening frequently, this paper designs and implements a mobile phone software based on the Android——Knowledge of food science popularization. In the process of the implementation of the entire software system, the key technologies mainly adopted are XlistView, Smartupload, etc. The software with rich content and good interactivity, can not only popularize food safety knowledge, but also increase peoples perception of diet nursing and nutrition.
    NFC Application Design for Mobile Devices Wireless Printing
    QIN Yi1, YANG Yun1, MIN Yu-juan1, ZHAO Jing-jing1, YAO Ming1, CHEN Hui-qin2
    2017, 0(2):  117-122+126.  doi:10.3969/j.issn.1006-2475.2017.02.024
    Asbtract ( 163 )  
    References | Related Articles | Metrics
     With the rapid development of information technology and wireless communication technology, the traditional office cannot keep up with the modern life, therefore the mobile office emerges as a modern office pattern. NFC-Based Mobile Devices Universal Wireless Printing Technology combines wireless network communication technology that allows mobile devices to use wireless communication technologies such as NFC, WIFI and Bluetooth to connect wireless printing devices directly, and as a channel for wireless printing operations. In this paper, A NFC-Based Mobile Devices Universal Wireless Printing Technology is discussed. In this way, when people print office documents, they do not need to care what kind of wireless communication technology is used, they do not need to know whether the wireless printer can support and print a variety of office documents. Mobile devices can connect wireless print devices adaptively without user intervention. Research, design and application of NFC-Based Mobile Devices Universal Wireless Printing Technology will greatly lower the threshold of wireless printing, improve office efficiency and promote the wireless printing technology to progress.
    Design and Implementation of Smart Watch Platform Based on SSH Framework
    PAN Fei, XU Sheng-kai
    2017, 0(2):  123-126.  doi:10.3969/j.issn.1006-2475.2017.02.025
    Asbtract ( 166 )  
    References | Related Articles | Metrics
    SSH is an integrated framework based on Struts, Spring and Hibernate, which is a currently popular open-source Web application framework. In order to strengthen the protection and care for the elderly, this framework is used to design a smart watch platform based on the hardware support of smart watch. The platform enables the separation of user interface, business management and data access, and promotes remote and networking physical health monitoring of the elderly. This article describes the integrated framework to build the platform, and analyzes the functional structure of the platform. Taking the smart watch uploading data to the server as an example, the realization of the platform function is described in detail. Finally, the article analyzes the shortcomings of this platform from the aspects of hardware design and software development, and puts forward the direction of further development.