QU Qiang , PENG Jun , LI Da-Yuan
Abstract:This paper designs a hierarchical operational decision-making support system based on Multi-Agent. The system is divided into decision-making, decision-support and data platform layer. It has functions like intelligence analysis, program evaluation, plan Deduction, and directly interacts with user through the general information processing platform. And the use of multi-agent technology such as collaborative mechanisms, drive mechanisms and knowledge-learning mechanism can ensure the system to respond fast and flexibly, to make correct decision in real time and to realize the intelligent human-machine combination.
Abstract:This paper introduces the vehicle remote monitoring system based on the Atom processor with the third generation (3G) mobile communication technology and GPS technology. This system is composed of the on-vehicle terminal and the remote vehicle monitoring center. The Embedded Mobile Database, GPS data, video and other vehicle information in the vehicle terminal system is encapsulated and transmitted by using the two-dimensional code via 3G mobile communication technology. By exchanging related information between embedded mobile database and the remote monitoring center database, the synchronization of databases and vehicle monitoring and management are realized, which will provide a versatile platform for various applications in mobile intelligent control and management.
XIONG Hong-Lin , FAN Chong-Jun , LIU Wu-Jun , ZHANG Hai-Ying
Abstract:Based on "two airports in a city" management mode of Shanghai airport, according to actual demand, this paper analyses the feasibility of building a unified information system for passengers' safety. According to the way in which the international and domestic passengers obtain information, it proposes a specific design of the passenger information system security with the idea of software engineering. Experiments are conducted based on the established prototype system, and the results prove that this design can meet the practical requirements and it plays a positive role in gurantee of air safety.
LI Da-Yuan , PENG Jun , QU Qiang
Abstract:C4ISR demonstrates its powerful function in modern information warfare, and how to access the information, in particular, is the key to the technology. To meet the needs of video surveillance systems of C4ISR, this paper designs a video reconnaissance system of C4ISR based on wireless multimedia sensor network, taking advantage of WMSN's (wireless multimedia sensor networks) self-organization and strong character. This work designs its network architecture, gives the design methods of the node and the sink node, and also provides the realization of communication protocols.
Abstract:In this paper, based on the analysis of the system structure and security demand prescribed in the paperless examination system-based campus network, an advanced bidirectional identity authentication in the client and the server is proposed by using username-password and the digital signature solution. It guarantees the security and efficiency of the examination system.
Abstract:In this paper, the development process of Internetware software based on component composition is analyzed. A service-oriented component composition platform for Internetware (CCP-I) driven by workflow is designed, which can achieve dynamic assembly of service components and loose coupling between component and web form. Finally, the implementation scheme of CCP-I is introduced on the basis of those extended open source projects. CCP-I can provide reference for development of Internetware supporting platform in the open, dynamic and uncertain Internet.
HE Jing , JI Jun-Chuan , LI Xin
Abstract:With regard to the disadvantages of financial reimbursement which used paper in corporations, this paper designs and implements an online reimbursement system. This system uses the most advanced middleware product EOS, and exactly follows the MVC design-concept for J2EE framework. It implements the business logic of financial reimbursement system. The use of this system improves the efficiency of the financial reimbursement, and upgrades the management efficiency and ability of the corporate. It has really achieved the sharing and integration of data.
LIN Li-Wei , XU Li , YE Xiu-Cai
Abstract:In this paper, a new measure of wireless sensor network connectivity is proposed based on the charac- teristics of the data collecting network. A new definition of invulnerability is proposed, and two measures of invulnerability are proposed for the two different damages. At last, this paper studies the invulnerability of the wireless sensor networks based on the small-world model. The simulation indicates that it is a new and effective method to research the invulnerability for the wireless sensor networks.
ZHOU Wei , SHEN Yong-Zeng , WANG Yan , YAO Meng-Meng
Abstract:Data organization and storage of digital map are studied for the demand of digital map display and navigating service in embedded systems. A map data method is put forward to realize the data storage. Due to data inconsistency in map data storage method, the approach of handling data breakpoints is studied. Experimental results show that dynamic data organization method greatly improves the speed and data consistency of in map display.
Abstract:Software architecture style is important in the software architecture area. It restrains the system's activities in life cycle and improves the system's reuse level. This paper proposes a mixed architecture style-RROS (Rich Representational Orthogonal Service) which is more suitable for WEB environment based on the existing style. This style of WEB application system can be used as reference for the development and to guide the design, definition and deployment of WEB application system. The paper demonstrates the value of its practical application to the CKM (Customer Knowledge Management) system.
WAN Zheng-Wei , HUI Xiao-Wei , ZHU Ting
Abstract:This paper makes a comparison between common LMS and NLMS. It analyzes their error, convergence speed and stability of different algorithms with Matlab program. The structure of the Adaptive Filter based on the NLMS and the simulation of its application in the removal of noise signal are given. The results show that improved NLMS algorithm can significantly help the Smart Antenna receive signals with less error. The analysis of the NLMS Adaptive Filter is useful to the design of Smart Antenna.
WEI Dong , LIU Tong , YU Guan-Hua
Abstract:This paper has analyzed the build-in mouse interactive function of Java3D to solve the problem that user cannot pick the objects which are too closed to each other accurately. A solution is proposed. First, a ray can be built that connects the viewpoint and the mouse point in the imageplate as the mouse is moved. Then, the ray can be checked if it intersects with any object. If yes, we can return to the object intersecting the ray and closest to the viewpoint. Finally, we can add an animation effect on the node to remind the user that this node is a pre-selected node. This paper focuses on explaining the realizing process of this method. In the final part, a practical application verifies that this method can facilitate the user in mouse picking effect- tively.
TAO Si-Nan , FU Li , CAI Bin
Abstract:To overcome the shortcoming of the genetic algorithm and the tabu search algorithm for solving the job shop scheduling problem, this paper proposes an adaptive genetic tabu algorithm. By adjusting the mutation probability adaptively and putting the tabu search algorithm to the process of the genetic algorithm, the improved genetic tabu algorithm promotes the rate in convergence and avoids such disadvantages as premature convergence. Simulation experiments demonstrate that the proposed improved genetic tabu algorithm is fast in convergence, and it does not get stuck at a local optimum easily.
WANG Xian , TAO Chong-Ben , YANG Guo-Liang
Abstract:To overcome the shortcoming of the traditional method used to improve the low contrast of fingerprint images, a novel method is proposed for enhancing the low contrast of fingerprint images based on Fast Discrete Curvelet Transforms (FDCT). After the input image is decomposed, to enhance the contrast of the fingerprint image, this paper uses nonlinear function based on Successive Mean Quantization Transform (SMQT) to adjust the coefficient of low frequency sub-band in low frequency component. It uses threshold denoising to enhance the details of the image in high frequency component. The simulation results show that the proposed method is better than histogram equalization and the method based on wavelet transform. The proposed algorithm enhances the contrast of low contrast fingerprint image and reduces noise at the same time. The images have satisfactory visual quality after enhancement.
FEI Hong-Xiao , QIN Si-Ming , LI Wen-Xing , LI Qin-Xiu , DONG Xin
Abstract:Data mining based on Web logs is of great significance. For instance, it can discover groups of people with similar interests and facilitate recommendation and personal service. A new clustering method based on Web users' interests regressively analyzes users' behaviors, partitions the interesting matrix with a threshold λ, and finally relocates some elements of clusters based on the joint strength between an element and a cluster. The favorable precision and scalability of the algorithm are studied through the experiments.
Abstract:Maze algorithm is an important part of the computer algorithm. The construction of the maze by human beings has a history of 5000 years. So far, the long-exiting mazes are still hot issues for people. Such famous mazes include that on the island of Crete on Aegean Sea, the labyrinth of the Minotaur meters, the Scandinavian maze-the Fortress of Troy, etc. There are maze algorithms such as Recursive Algorithms, the Shortest Path, Exhaustive Method, Random Mouse, Wall Follower, Pledge Algorithm, Chain Algori- thm, Recursive Backtracker, Tremaux's Algorithm, Collision Solver, Shortest Paths Finder, Shortest Path Finder, etc. This paper utilizes these algorithms, reversing from each dead-end of maze and finally finds out the optimistic route for the maze.
Abstract:This paper analyzes the design and realization technology of auto source code generator based on Orad render engine controller. It uses a document analysis process, which takes a documentation of control commands as input and conformed to predetermined regular expression rules, to analyze the structured data of commands, and to dynamically generate XML-based code templates. Finally, this system automatically generates the source code of controller in accordance with the generated templates.
CAI Jia-Mei , CHEN Yang , CHEN Tie-Ming , ZHANG Xu-Dong
Abstract:A key-frame is a representation of one shot's content in the video, which usually reflects the main elements of a scene. Therefore, key-frame extraction and video analysis technology is the basis of content-based video retrieval. In this paper, a key-frame extraction method based on combination of mutual information and fuzzy clustering is proposed. In this method, the key-frames can maintain time-series and dynamic information of the video. And also, the key-frames can be a good reflection of the main contents of the video. Finally, one key-frame extraction system for MPEG-4 video is designed, and experiments show that the key-frame extraction system can be a better representative of video content, and conductive to the realization of video analysis and retrieval.
Abstract:The method of granting users directly in traditional content management system is simple to implement, whereas it's difficult to manage. The method of RBAC enhances the flexibility and scalability of privileges management. However, it may lead to the leak of privileges. To slove the problems, this paper proposes a ECMSAC model, based on RBAC. It brings in applicable Least Privilege Theorem, reduces the likelihood of privilege's leak and boosts the security of CMS.
JIANG Hua , LIU Tong-Lai , ZHANG Wan-Zhen
Abstract:As current text classification depends on vector space model and document frequency lacks binary class- ification, a method based on class space model of difference frequency is presented in this paper. The method breaks the constraint on vector space model, and selects feature with difference frequency improved on document frequency, thus realizes the function of binary Classification. The experiment shows that improved method is effective. Three evaluation parameters, including Precision, Recall and F1, are im- proved in classification result, and classification precision is better. In addition, the method is worth learning in binary Classification of other areas.
SHEN Yong-Zeng , YAO Meng-Meng , ZHOU Wei
Abstract:This paper deals with electronic map data index based on Embedded Linux System, and introduces the basic ways about spatial index. By analyzing the common indexed algorithms, such as B Tree, B+Tree, R Tree, Quadtree and so on, it designs the spatial data indexed structure based on Hilbert grid and modifies the data structure. Index eficiency is improved because of the modified structure. Finally, it uses the SQLite database to manage the spatial data and achieves expected effect.
Abstract:This paper, with the securities industry as the research background, proposes a new method that uses XML to build a business knowledge base in the securities industry to automatically generate instruction. It studies the definition of data structures, how to create decomposition rule and use XML to describe the way of the values, how to create converter based on XSLT and so on. Practice shows that this method does not only simplify software development, but is also highly effective to carry out instructions decomposition. Based on this approach, knowledge platform and its corresponding reasoning process can be developed which is interactive and easy to expand for a variety of applications.
Abstract:This paper proposes an algorithm and an instance of the search engine based on clustering users' activities. The algorithm mines users' concepts from activities log and uses users' feedback to identify the concepts. Both of them improve the accuracy of the engine. It resolves the ambiguity problem of full-text retrieval search engine. At last, the paper gives a case to implement the algorithm.
Abstract:Web services have already become one of the most important computing resources and software assets in the Internet. With the increasing number of Web services, how to find the required services efficiently or how to gain the best service from the vast service sets become important. The semantic description of Web service and the efficiency of OWL-S retrieval model of semantic Web service are the key to the discovery of the Web service. This article proposes the OWL-S framework of semantic Web service, and adopts OWL-S to describe the Web service, and raises pointed matching algorithm. Through experiments, in this model, together with the semantic Web service technology, the dynamical searching and composition of Web service are implemented, so that the precision ratio and the recall ratio of Web service can be improved.
Abstract:Causal map is an effective method of software testing, suitable for a wide range of conditions described in the portfolio, with a number of test cases produced from the corresponding forms of action. Causal map is finally converted to the determine table, but the conversion from the causal graph to the determine table is very difficult. This paper describes the principle of Causal mapping, presents a detailed description of the Causal map to determine meter conversion algorithm, and introduces the causal mapping methods to generate test cases.
WENG Jie , LIU Jing-Biao , YU Hai-Bin
Abstract:This paper introduces the design and implementation of the control subsystem. The control subsystem can be divided into monitoring data collection platform underwater and communication platform on water which respectively realize collecting and storing monitoring data of vertical profiler and satellite communi- cation. Water platform and underwater platform use AT91SAM9260 as core chip which has abundant port resources, to satisfy various profiler of the data collection, storage and communication needs. Experiments show that the control subsystem functions perfectly, operates stably, which meets the design requirements.
Abstract:Test automation is an important way to improve the efficiency of software testing. Various testing tools have excellent executive ability. However, they don't pay much attention to the management of test resources and test execution processes. Therefore, an automated test execution management tool is designed and imple- mented in this paper, which focuses on the management of test execution process and testing resources. The paper elaborates the general architecture, module design and the key technology.
LIU Jing-Biao , AI Yong-Fu , SHENG Qing-Hua
Abstract:To solve the problem of direct communication failure or short distance communication between embedded devices and computer, based on C8051F040 single chip and its High-speed serial interface and CAN con- troller, a general data transmission embedded system has been developed. It can satisfy many kinds of bus interface configuration requirements. The embedded system has the following characteristies: a flexible bus interface configuration, a good processing capability for data and transaction, and suits general purposes for embedded system development based on bus interface. It is stable, reliable and used to transmit data between functional modules in the drilling machine in the deep sea.
LIU Li-Na , GU Ping , YANG Jia-Deng
Abstract:To minimize the cost, by using the simulation and optimization technology, this paper designs a stochastic demand inventory model with a manufacture enterprise as an example. It uses the improved genetic algorithm to optimize inventory model, and then gets the candidate strategy to optimize inventory. Simulation examples show that the proposed optimization technique is feasible and effective, and can provide decision support for enterprises.
ZHANG Jing , JIANG Yu-Yong , WANG Hua-Long
Abstract:Visualization in Scientific Computing is a synthesis technology combining with graphics, image processing, data management, network technique and human-computer interface. The integration of Visualization in Scientific Computing with power system has a good prospect of application because of the large amount of data and its complex analysis. This paper presents a power grid dispatching system based on the Visualization in Scientific Computing. The system will improve the dispatching of the level of scientific decision-making.
Abstract:In this article, the implementation of tracing file trajectory is described in details. The solution of the tracing system based on tracing file trajectory is also provided. Taking advantages of transparent encrypt, which is based on the windows file system filter driver, the file trajectory is tracing as follows: the file is unable to be accessed once the tracing file is taken out of the working security domain. Only when the file in the security domain and the process is secure at the same time, it can be accessed by the handler. The tracing system will record all information about the operations on the file, besides log of the submission to the server. According to the processes above, the file trajectory is tracing on time, and hence can put an end to the dangerous operations. It is convenient to analyze and audit the results.
CAI Yong-Juan , SHEN Chun-Shan , WU Zhong-Cheng , SHEN Fei
Abstract:With focus on various interfaces of robotic sensors, a scheme based on IEEE1451.4 is advanced in this paper, with the purpose of the standardization of roboticc sensor interfaces. This standard realizes the intelligence of the robot sensors by endowing them TEDS, and it solves some of the problems due to sensors' differences. Sensor Plug-and-Play is achieved by using this standard on this foot robot perception system, and configuring TEDS of the sensors on PC is predigested by Labview,.
WANG Yu-Qing , LI Jian , TANG Kai-Shan , WU Jun , LUO Guang-Hong
Abstract:This paper has analyzed the functions and features of Spatiotemporal Database and its model in brief. The conception of difference storage of version is used on the basis of object-oriented spatiotemporal data model. And then, a basic method of designing Spatiotemporal Data model with less historical data redundancy and high usage of current data is discussed. A Spatial data management system with basic functionality and effective balance of storage and operation is also implemented at the end of the paper.
Abstract:To meet the real-time requirement of moving objects detection and tracing based on omnidirectional vision, multi-core programming and parallel processing technology are applied to the redesign and realization of the connected component labeling algorithm. The paper introduces run-length encoding into algorithm to solve separation of connected component by image segmentation. Two segmented connected components for different tasks' block are merged into one connected component. Experiments show that the parallel algori- thm runs faster than the traditional algorithm in multi-core processor. It has better solved the problem of hunger in multi-core processors and made the multi-core processor more efficient.
YANG Huai-Qing , YU Guan-Hua , LIU Tong , XUE Ming-Hao
Abstract:Based on the real supermarket management,this paper discusses the frame structure and the sticking points to be solved for the environment modeling, the products modeling and the shelf morphology modeling. It has given the specific solution strategy, the golden rules and technical routes.
GAO Wen , LI Ji-Lai , LIANG Hua-Wei
Abstract:This paper designs an embedded real-time operating system according to OSEK/VDX standard. It focuses on the design of task and resource management. Then it is verified on the automobile stability control hardware-in-loop simulation platform. The result of verification shows that developing on this OS can efficiently improve the real-time performance and stability of the system and it can also meet the require- ments of automobile stability control system well.
ZHANG Xiao-Ling , YANG Jian , DU Ying-Guo
Abstract:In this paper, an orthogonal experimental method is used to set the parameters of Ant Colony Algorithm for solving Job-Shop Scheduling Problem. The performance of Ant Colony Algorithm for Job-Shop Scheduling mostly depends on the parameters settings, the different values of each parameter, the different convergence rates and the solution of Ant Colony Algorithm. The orthogonal experimental method is used to test the parameters on the performance of Ant Colony Algorithm. The best combination of parameters can be drawn by analyzing the experimental results. This best combination of parameters has been tested based on the cases from the JSP classic. The results demonstrate the parameters setting can speed up the convergence rate and the optimal solution or the approximate optimal solution can be achieved.
Abstract:Bidding evaluation decision support system overcomes the shortcomings like subjectivity and uncertainty in traditional bidding evaluation. It takes full advantage of history data to provide decision making support in bidding evaluation. This paper presents a data mining model based on neutral net algorithm, analyzes and studies its features and establishment, then applies the model in the hydropower project bidding evaluation decision support system, with the practical business demands of hydropower project bidding, to implement a fair and rational hydropower project bidding evaluation decision support system.
HUANG De-Nv , LIU Jing-Biao , JI Bin
Abstract:Through analyzing the advantages and disadvantages of the existing automated testing technology, combined with the web's characteristics and business process, this paper proposes a technology based on Robot Testing Framework with Keyword-Driven to improve the efficiency of software testing. Based on the technology, testing tool is designed which can make the Robot Testing Framework run on GUI testing tools such as RFT. The testing script building, testing execution and testing report are generated automatically. It improves the efficiency of automatic test and guarantees the software quality.
Abstract:In the Modern Enterprise Applications, data information needs to be exchanged between multiple appli- cation systems or between multiple users of a system. Therefore, it becomes more and more important to ensure the security of data transmission. The design of using SSL encryption and XML encryption to ensure the security of data exchange and its concrete realization are described in this paper. It is verified by some examples and of practical significance.
Abstract:Oracle is one of the most widely-used large-scale databases at present. For its complex architecture, Oracle's performance is subjected to various factors, and query operation is one of the key factors. This paper analyzes the sharing principle and execution process of SQL statement in Oracle database. It finds out that improving the sharing of SQL statements and the data cache hit rate of the SQL statement is the premise of performance tuning. Lastly, it presents four principles for SQL performance tuning.
Abstract:It often happens in software development that several different applications utilize the same set of sophis- ticated functions to achieve corresponding roles. There are many options to accomplish the task afore- mentioned. This paper proposes herein an approach to realize the Local Process Internal Procedure Call. It further elucidates its application in the above situation as well as some tricks in practical development.
YING Lei , WANG Ru-Jing , YANG Zi-Wei , SU Ya-Ru
Abstract:Agriculture price data from vertical search engines are collected from various agricultural sites. Due to various factors, there are a large number of abnormal data. Since the characteristics of these agriculture price data make traditional methods of detecting abnormal data not work well, this paper presents a new method of detecting abnormal data. Practical applications show that this method can achieve good results.
Abstract:The most important and difficult thing is how to find an algorithm which can resolve the equity problem and network congestion problem caused by concurrent visit to system by multitudinous students. This paper analyzes and researches these existing algorithm, and proposes new algorithms-Algorithms of Web Course Selection-Arrangement System based on probability. These algorithms make every student have equal probability on the move of course selection. Therefore, the equity and network congestion can be resolved at large.
Abstract:This paper mainly studies how to generate test scenarios from UML activity diagram. Firstly, the activity diagram is defined formally, and coverage rules are set down. Then, based on the general thought of dealing with activity diagram with UML activity diagram, a novel method is proposed by adopting semaphore and nested partition to process the concurrent structure of activity diagram for some special elements of activity diagram. It reduces the number of test scenario effectively and also makes automatic generating test case from UML activity diagram become systemic, effective and feasible.
LU Liang-Jin , ZHENG Min , WU Hai-Hong
Abstract:This paper analyzes the merits and shortcomings of precompiled workflow and Web form-based workflow model. A Web-based workflow model supporting script embedded into activity is proposed, which combines the merits of precompiled with the form-based workflow. It separates the business logic of activity from the workflow engine, and supports the sole user-definition of interface, business logic and activity transition. Practice shows this model has better expandability and reusability.
Abstract:The advantages and disadvantages of different kinds of data extraction are introduced. The detailed incre- mental data extraction scheme based on Business Continuance Volume of EMC and Oracle LogMiner are analyzed. The incremental data extraction from production platform to data analysis platform in provincial data centralized is achieved.
Abstract:Through supervising the flow rate into network, traffic Policing can ensure the rate of flow in network in a reasonable range. To meet the network multi-user multi-service requirements of Traffic Policing, a second Traffic Policing of QoS is implemented on routing platform based on analyzing and studying the method of QoS Traffic Policing (CAR). The test result on three-tier switch proves the effectiveness of supervision.
Abstract:Software activation is a means to protect the computer software. It could get the identifying information of personal computers' identities based on WMI and gain "Hardware fingerprint" through Hash algorithm of figure identifying information in the case of protecting the user's privacy. Using software installation serial number, together with activation code generated with SHA512 can achieve a safe and useful software activation scheme.
Abstract:Bootloader (boot loader) is an important part of linking up the operating system and hardware platform, and also important for embedded system of software development. This paper describes characteristics of a powerful, stable U-Boot program in the development of the current embedded systems and transplant process. It realizes functions like kernel and file system of yaffs download, and Linux boot. By using the corresponding commands to download the kernel, yaffs file system and boot Linux, it proves the U - Boot accurate.
SUN Shun-Yuan , QIN Hui-Bin , CUI Jia-Dong , DING Hong-Bin
Abstract:This paper introduces the process of porting an open source real time operating system μC/OS-II to the ARM processor STM32F103ZET6. Several basic concepts of the Cortex-M3 and how to optimize the stack of task are briefly introduced. By creating some simple tasks, the grafting process is proved to be successful and the system running on STM32F103ZET6 is proved to be feasible and stable.
MA Yao-Hui , ZHU Qing , SHENG Hai-Bo , PAN Ping
Abstract:To overcome the shortcomings of Power Line Communication Meter Reading, such as low speed, poor anti-interference ability, low success rate and failure to be cross-regional etc, this paper mainly introduces the design of hardware and software of the Low Power Wireless Acquisition based on the CC1110 RF chip of TI company automatic. The Wireless Acquisition cannot only meet the need of real_time meter reading, but also fast in Network, unnecessary for human network management. It supplies a new method of networking technology for the automatic meter reading system. In the pilot projects, Micro-power wireless collector have met the requirements of practical application and will be widely used in the future.
Abstract:Based on a new type of USB bus interface chip CH372, a human interface devices-USB mouse is designed. The working principle and characteristics of CH372 are expounded, and Hardware circuit is given. In terms of software design, the Enumeration process of the HID device descriptor is analysed. According to the main program flow chart, a local single-chip part of the main program is given. Through hardware and software debugging, the mouse functions of the left and the right button are successfully simulated.
Abstract:The paper introduces the method for the design of the PLC hand-held programmer based on a new type of PLC device. It particularly describes the design method of the structure and software on core modules. The CAN bus is used as a main way of communication. The ARM7 chip is selected as the main controller. The RTOS on uC/II is built. The instrument realizes the function of remote monitoring, programing and adjusting the PLC device, and programming in off-line model. It can communicate with the computer directly and will be suitable for the industry field.
Abstract:For the enterprise's most valuable data, it is a fundamental method to backup data to prevent data loss. Only complete data backup can gurantee the completed recovery of system and data when application system has some error. With the development of corporation information construction, data size is getting rapidly increasing. It can gurantee the data security to establish a unified, concentration, automated data backup system that could timely backup the business system data efficiently and safely. It can make the storage system have high reliability, expansibility and easy restorativeness to build an independent storage network- ing system, server and storage resources into storage networking.