AIPUB归智期刊联盟
TAN Shou-Biao , XU Chao , JIANG Yuan , NING Ren-Xia
2010, 19(9):1-4.
Abstract:The Web Information Extraction and Knowledge Presentation System is proposed to extract information from data intensive web pages. It downloads dynamic web pages, based on a knowledge database, changes them to XML documents after preprocessing, finds repeated patterns from them, by using a PAT-array based Pattern Discovery Algorithm, recognizes their data display structure models, automatically based on the repeated patterns and an ontology-based keyword library, and then extracts the data and stores them in the knowledge database with the object-relational mapping technology of XML. Through these steps, web data is extracted automatically, and the knowledge database is also expanded automatically. Experiments on the traffic information auto-extraction and mixed traffic travel schemes auto-creation system showed that the system has high precision and is adaptive to web pages in different domains with different structures.
DU Xiu-Chuan , XU Hui-Min , LI Qiang
2010, 19(9):5-9.
Abstract:High-resolution satellite geographical images, a 3D virtual environment, and a friendly man-machine interface in Google Earth provide the exploitation of information resources for Ship Monitoring and Emergency System. On the basis of research and development on KML language and COM API of Google Earth, a hierarchical design of a ship monitor, information and emergency system is created, and the whole level in Ship Management Information System is improved. The system is applied to improve the fishery emergency project in Zhejiang Province.
2010, 19(9):10-14.
Abstract:Workflow technology is needed to implement many key applications in Consolidated Supervision of Safety Production system. Using the workflow technology, an embedded workflow engine is designed for Shenyang Consolidated Supervision of Production Safety System. This thesis gives an introduction to the Architecture of the application system and the workflow engine and analyzes the design of the engine. The workflow engine shortens the developmental cycle of the key application significantly. After the application system based the workflow engine is deployed, it has improved the efficiency of business greatly displaying great results.
2010, 19(9):15-18.
Abstract:This paper designs Rich Internet Application (RIA) system integration that combines Flex and Web services. Application systems business processes are encapsulated by standard Web services. Discovery and sharing of enterprise data resources can be achieved by using the publishing and discovering mechanism of services. Transmission messages are digital signatures and encryptions by using the encryption algorithm. The unified rich client user interface and high interactivity and response of the client and rich user experience are provided by using Flex. System performance, which are improved by using modules, navigation, components of dynamic load, and components of reuse. Feasibility and rationality of the built RIA integration are verified using Flex and Web services combined with the J2EE.
TONG Lv-Ping , YANG Guan-Zhong
2010, 19(9):19-24.
Abstract:This paper presents a framework to construct a learning resource management system based on an extended electronic learning object structure. This framework makes the comparison between various learning objects and enhances the reuse and management efficiency by modeling on specific domain and extending the structure of the electronic learning object.
FAN Xu-Bo , LEI Wei-Min , WANG Ning , ZHANG Wei , LI Jun-Chao
2010, 19(9):25-30.
Abstract:With an increasing number of friends, Peer to Peer subscription in Presence causes a great dataflow and many other issues. The Resource List Service is a very good approach to solve this problem by subscribing to the list. This paper proposes a framework for the implementation of Resource List Service Model which refers to SIMPLE standards. Based on this, the RLS as well as its descriptions are designed. Upon testing the RLS in WAN, the experimental results show that RLS can correctly complete the subscriptions of a list and provide an excellent solution for the frequent subscription issues.
2010, 19(9):31-34.
Abstract:This paper designs the scheme of LWD (Logging With Drilling) Data Remote Transmission System based on GPRS. First, the paper introduces the GPRS technology in the remote transmission system application, and then describes system components, business processes, implementation process of LWD Data Remote Transmission System Based on GPRS in detail, and the application effect of LWD Data Remote Transmission System Based on GPRS.
ZHANG Jia , LI Xiao-Juan , WANG Yan-Bing
2010, 19(9):35-38.
Abstract:With the rapid development of rural socio-economics in China, how to make an in-depth analysis on the volume of multi-source statistical data to enhance decision-making for the government has become a major problem. In this paper, a set of GIS spatial analysis methods of rural social-economic data are proposed and researched and spatial data and statistical data are integrated to create a comprehensive spatial database to enhance data sharing with the existent e-government system. On this basis, a GIS based rural socio-economic statistical system is constructed using COM pattern and is put into effect in the National Bureau of Statistics of China. It has been proven that GIS technology applied in rural statistics department, which provides an information platform that manages and analyzes statistical data and spatial data, is feasible and increases the efficiency proces.
LIU Jun , LIU Yu-Wei , WANG You-Mu
2010, 19(9):39-43.
Abstract:Based on a review of supply chain management and intelligent agent theory, this paper establishes a multi-agent technology as a tool for solving strategic selection of supply chain management. It also constructs a supply chain framework based on MAS. Secondly, emphasis has been put on the combination and work content of data-agents, dynamic forecast-agents and decision support-agents. Moreover the operation mechanisms of supply chain framework and vendor status of framework are also discussed. Furthermore, this paper makes use of data-mining technology and genetic algorithms to optimize system learning ability as well as strengthen the self-determination and sociality of the system to find the appropriate vendors.
DONG Shuai , LIAN Dong-Ben , LIU Peng
2010, 19(9):44-48.
Abstract:The Enterprise Service Bus (ESB) is the infrastructure for the implementing of SOA (Service Oriented Architecture). The existing enterprise service bus has a serious decline in the performance in a high-concurrent situation. To address this issue, this paper analyses the principles of SEDA (Staged Event-Driven Architecture) model and the ESB functional requirements. The SEDA model is applied to the design of ESB, and a SEDA-based Enterprise Service bus is designed and implemented. According to the test and the analysis of the SEDA-based ESB, the SEDA-based ESB performs better in the case of high-concurrency.
HU Xi-Ling , WANG Guo-Jun , DENG Yue-Ming
2010, 19(9):49-54.
Abstract:The disclosure of user identification password can endanger information data in a role-based access control (RBAC) policy. In order to achieve access control action for the users, a RBAC policy on dynamically adjustable trust degree is proposed. The policy combines a trusted computing theory with access control policy. Firstly, an analytical hierarchy process is adopted to evaluate the trust degree of the system. Then, a dynamical regulation method of a trust degree is introduced to make the user’s trust degree a foundation of the system while assigning user's roles. This model is applied to a virtual database experiment. The result shows that through the implementation of the trusted access control, it is possible to effectively improve the security of database.
SHU Cai-Liang , YAN Xuan-Hui , ZENG Qing-Sheng
2010, 19(9):55-59.
Abstract:Previous research has indicated there are some defects in the traditional immune-based algorithm of detecting abnormity. Two common defects of this are as follows: the detectors created by the algorithm cannot cover all Nonself-space, and the number of the detectors in the algorithm is too big to keep the detectors from covering each other. These defects are the main reasons why the algorithm is not efficient. In this paper, an algorithm, which can deal with mixed-type data and produce detectors in different sizes to improve the capacity of covering Nonself-space is proposed. The simulated and compared experiments show that this algorithm can preferably process mixed-type data and effectively improve the efficiency of generating detectors .
WU He , JI Jun-Chuang , LI Xin
2010, 19(9):60-63.
Abstract:The XML-Based dynamic forms designer can modify the forms dynamic management and the database. The dynamic form designer harnesses the power of writing by constructing the data items into XML, saving the XML into a big field. The dynamic form designer harnesses the power of reading by searching the big field XML, reading and resolving the XML, and displaying the data on the output device.
LONG Bin , CHI Xue-Bin , XIAO Hai-Li
2010, 19(9):64-68.
Abstract:How to make use of computing resource effectively and conveniently is one of urgent topics in grid computing. In order to solve the problem, this paper introduces Super Computing Environment (SCE) based on Linux command line. SCE can do job process such as submission, compiling, query, download file and so on. It has characteristics of deploy simple configuration and high extensibility. Through shielding the bottom of heterogeneous computing nodes, it can be used in more grid computing environments.
2010, 19(9):69-72.
Abstract:This paper proposes the design and implementation of Sip Agent, which meet IMS(IP Multimedia Subsystem) specifications based on OSGi(Open Services Gateway Initiative). It uses the Equinox, which implements OSGi specification as the core framework, combined with JAIN-SIP, as the underlying protocol stack, and can meet most of the IMS application. This paper includes the explanation of the logical structure, the main module's structure, the introduction of key technology, and the development of a call procedure using Sip Agent, to prove its availability. The applications, which is built on Sip Agent presented in this paper, has low coupling, high cohesion, easily extensible, high-performance features, and it can build SIP-related application quickly and easily.
KUANG Yue-Juan , YANG Guan-Zhong , LU Shao-Fei , YANG Wei
2010, 19(9):73-76.
Abstract:In order to reduce the power consumption of a mobile station, IEEE802.16e introduces the sleep mode, in which a mobile station stops its normal service. Network arrivals are often modeled as a Poisson process for analytic simplicity,but recent traffic Studies have shown that data packet inter-arrivals including Pareto distribution, are not exponentially distributed, but are heavy-tailed distributed, including Pareto distribution. In order to balance the average energy consumption and the average waiting time, this paper proposes a power function decrease algorithm for sleep mode based on Pareto distribution. Experiments and theoretical analysis show that the algorithm has a lower average energy consumption and shorter average waiting time than the algorithm proposed in IEEE 802.16e standard.
FAN Gui-Hua , FANG Bin , WANG Yi , YANG Shi-Zhong
2010, 19(9):77-80.
Abstract:A method of 3D liver vessel system segmentation is presented. Firstly, a statistic threshold is used to segment vessel roughly. Secondly, a vas tree search method based on spatial connected area is presented to remove noise. In the end, linear curve evolution is used to smooth the edge of vascular image. Experiments show it’s a useable method to extract liver vessel systems.
2010, 19(9):81-83.
Abstract:Because the number of web pages is sharply increasing, information searching and excavation have drawn people's increasing attention. However, besides some thematic information, there is also inappropriate noise information on the Web pages, so Web purification technology has become a concern for more and more researchers, and various algorithms have been proposed. This paper refers to the application of artificial immune system in the computer network intrusion detection and proposes a Web page de-noising algorithm based on the AIS. At the same time, this paper does non-linear study on the data anomaly recognition of the Web.
2010, 19(9):84-87.
Abstract:With the development of information technology, enterprises are facing a serious problem--IT manage- ment. To solve this problem, this paper introduces the principles of cloud computing and ITIL, and then proposes the implementation of cloud computing based on the ITIL.
2010, 19(9):88-91.
Abstract:Traditional Single Sign-On solution is not suitable for the heterogeneous applications since it’s generally for web portals and other distributed web applications, there isn’t a suitable solution for the disparate applications in which both C/S and B/S mode exist, and whose server sides are not allowed to modify. This paper introduces the characteristic of the traditional single sign-on solution CAS, combines it with the assistant technology in B/S and C/S mode that are Windows message mechanism and browser plug-in technology, then proposes a new sign-on model for heterogeneous applications that is based on assistant technology and authentication data centralized managed.
HUANG Fang , SHI Zhen-Hua , ZHANG Feng
2010, 19(9):92-96.
Abstract:In this paper, a general method of heart surface triangulation mesh reconstruction is studied and designed for different contour data formats from various contour extraction methods in the heart slice images process. Through utilizing the basic characteristics of the heart shape and slice data, both Cosine rotating and postponed sorting are combined with the three-subdivisions. The recovering of the relationship among contour points and reconstructing the triangular mesh is implemented simultaneously. This paper describes the basic principle, implementation strategy and algorithm design. The experiment verifies the effectiveness of the proposed approach.
WU Chun , ZHU Guo-Hun , XIE Yu-Zhong , LIN Hong
2010, 19(9):97-100.
Abstract:The minimum vertex cover problem is a classical problem in combinatorial optimization and has a wide range of values in real life. The problem of the minimum vertex cover and the maximum independent set is actually the equivalence problem in the graph theory. In this paper, the maximum independent set angle and design a maximum independent set algorithm for solving the planar graph is formed, according to characteristics of the maximum independent set, and then the minimum vertex cover is obtained. After many experiments, the results show adequately that the algorithm presented in the thesis is correct and effective.
HU Yu-Qing , GUO Xiao-Jun , SONG Zheng-Yang
2010, 19(9):101-104.
Abstract:The focus of current research is how Self-similarity impacts network performance. A queuing delay jitter model, based on FBM for self-similar network, is proposed and self-similar traffic as input on the impact of the delay jitter of queuing system is discussed, which is important. Theory fractional traffic and actual measured traces are used to simulate experiment. Simulation confirms the correctness and efficiency of these results. The experimental results demonstrate that the degree of the long-range dependence for the self-similar traffic has quite a different impact on the delay jitter of queuing system, especially on the condition of a large buffer size. The state changes of long-range dependence is related to the parameters of queuing system. These findings are new, which is an important reference for the performance evaluation of real-time network .
2010, 19(9):105-109.
Abstract:This paper introduces an input method in detail based on embedded Linux and Qtopia matrix keyboard. By reimplementing the Qt event filter, combined with signal and slot mechanism to deal with the use of two-tier status, it is possible to use the definition of the effective input to simplify the input process, reduce the number of pressing button, and enhance the efficiency of input. At the same time, with the use of Qtopia graphical display, the input interface is clearer and more applicable to the embedded device.
2010, 19(9):110-114.
Abstract:This paper analyzes the security problems of RFID technology, builds the security model of RFID in library, designs a security protocol PA-Lock, which ensures the security of library RFID system. This paper solves the privacy and mutual authentication between Tag and Tag reader. Lastly, this paper analyzes the security and performance of PA-Lock protocol and compares it with other protocols to prove that PA-Lock protocol is secure and efficient.
2010, 19(9):115-119.
Abstract:Network Intrusion Prevention System (NIPS) is one of the effective tools in providing network security. The core computing function of an NIPS is Pattern Matching Engine (PME), which is used to search pattern data of a known network intrusion from network packages. In current NIPS, PME consumes a significant portion of the computing time. PME is a computing consuming application, requiring high level performance from the system’s base computing power. This article proposes a parallel pattern matching approach and maps the computation onto the existing multi-core CPU by fully utilizing the computing power of the base hardware structure of the prevention system. The implementation of the proposed approach on IBM System x3455 server shows that it provides a typical processing speed of 17.2 Gbps with a capacity of 50,000 pattern signatures, which has exceeded the results of all current documentation, including FPGA, ASIC, network CPU, and GPU.
CHEN Hong , WANG Li-Ping , JIANG Bo
2010, 19(9):120-123.
Abstract:Amblyopia is a developmental disorder of the visual system. There are about 2.8% of people in China who have amblyopic disease. The examinations of visual functions for amblyopia can help doctors make better treatment for patients. In this paper, a system with a psychophysics method is introduced to examine different visual functions of amblyopia. For the software system, MFC is used in the user interface and the overall framework. The Psychophysics Toolbox based on Matlab is adopted to realize the model of visual functions examination. SQL Server is used to generate back-end database. Meanwhile, a hybrid programming system between VC++ and Matlab is adopted to combine the entire system into one. For the hardware of the system, a Vedio-Switcher is used to improve the display accuracy to meet the special requirements of the vision test. The results show that this system has good stability and can meet the needs of visual functions examination for amblyopia.
2010, 19(9):124-127.
Abstract:Most solutions in a roaming system building are using three-dimensional graphics library drawing geometric structure to produce a target object. Although this technology has already been developed proficiently, the process is complex and time-consuming. Because of the inadequacies of this technique, a solution is proposed in this paper, and thus, the three-dimensional interactive ramble system of Southwest University of Science and Technology is established, based on VR-Platform by using 3ds Max modelling and scene pictures with auxiliary, which has not only the function of a three-dimensional navigational system, but can also display campus in a multi-position combined with animation.
2010, 19(9):128-133.
Abstract:For the trivial design and the complexity of the permission management in digital certificate-based system development, human resources are being used unwisely in writing codes of various business functions.To solve this problem, a kind of general and digital certificate-based permission management module, using function vector code, is successfully designed through analyzing and comparing the differences between digital certificate-based systems and the traditional username/password system. This kind of module can be embedded in various digital certificate-based systems by replacing the verifying module without rewriting the code, which makes the separation of permission control and transaction possible. This strategy has been tested and verified through different systems and has achieved good performance.
ZHAO Lin-Hai , LI Xiao-Feng , TAN Hai-Bo
2010, 19(9):134-137.
Abstract:In order to guarantee multiple ORACLE database system initiatively, a distributed guarantee warning system is proposed based on CACTI. By using the “one-manager-multi-agent” mode, CACTI adds agent model to ORACLE database server to enable continous centralized monitoring on a distributed ORACLE database. Multi-level and flexible monitoring strategies are realized by setting different granularity on CACTI for various ORACLE databases. The system alerts abnormal states of mail and message in a database. The experimental results and the practical application in model projects verify the effectiveness of the system.
XING Zhi-Yan , SUN Jian-Wei , YANG Hai-Bo
2010, 19(9):138-142.
Abstract:It is an inevitable trend that the fax function is integrated into the traditional IP voice gateway. This paper analyzes the IP fax technology and development situation and proposes a project that adds a software fax module to the gateway without any change of the hardware, so that the gateway can be able to store and forward faxes. The paper gives the fax module’s design and implementation based on Blackfin+uClinux platform. After testing, the voice gateway can successfully send and receive faxes.
DING Xiao-Ling , ZHAO Li-Xin , LIU Min , LI Jie
2010, 19(9):143-146.
Abstract:The purpose of this puper is to adopt Virtual instrument technology to collect and handle the alternator property parameter. It discusses the data acquisition system,introduces the mehtod of the signal acquired of sensor in a realistic situation with an economical suitable principle, and selects the fitting and proper data acquisition card. Lastly, by using LabVIEW of the National Insturments Co,it acquires and displays wave forms of EFI engine sensors. The data acquisition system designed by LabVIEW has stable perofmrance, high accuracy, and a user-friendly interface. It fully embodies the advantages of a virtual insturment.
2010, 19(9):147-150.
Abstract:Presently, a variety of rule-based classification methods in e-mail filtering obtain good results. In the training of e-mail filtering, the training set has the notion that some e-mail messages will be sent to the hazy category. Extracting these e-mails from training set will have a noticeable increase in the results of classification. Therefore, a clustering-based filtering method is proposed in this paper. The common features of the hazy-category email include cluster the training set. Experiments demonstrate that the method has better performance on the appraisal standard than that of a simple rule-based classification algorithm.
2010, 19(9):151-154.
Abstract:Moving object segmention in traffic video requires a large amount of information and a long computational time. A new fast moving object Segmentation method is proposed. Two appropriate images are sclected. Then, the absolute value of subtraction is taken. This paper proceeds to block images and decides which block images should be given up. The remaining sub-blocks for otsu are chosen, and the moving objects are segmented. Experimental result shows that this algorithm can greatly improve the speed of moving object segmentation.
XIONG Zhe-Yuan , FAN Xiao-Ping , LI Yan
2010, 19(9):155-158.
Abstract:Vehicle-license-plate character segmentation is one of the most important steps in license plate recognition. Traditional methods always need high quality original images and thus, will inevitably affect the ultimate recognition rate. In this paper, a method for segmentation of license plate characters, based on Renyi’s entropy and mathematical morphology edge detection, is introduced. The algorithm binaries the license plate by two-dimensional Renyi’s entropy first and then detects the edges by morphology erosion. After getting rid of the outer bounding frame, the license plate character is segmented by projection. Computer simulation results show that the character is much clearer after preprocessing based on Renyi’s entropy and mathematical morphology edge detection. This is favorable for the character segmentation based on projection. The algorithm is not only simple and fast, but also robust, and performs better than traditional methods.
YANG Xing-Chun , WANG Gang , ZHANG An-Ni
2010, 19(9):159-162.
Abstract:With the continual advanvement of Information Construction in Public Security, it is important to boost the direction and the validity of police work and improve the level of Information Construction, if interested information can be mined from the large amount of historical data. Based on an earlier study, this paper improves the GA-FCM from the population selection and the mutation operator. Finally, the improved algorithm is also applied to the traffic accident data mining. The results have shown that the algorihm contributes significantly in preventing traffic accident and improving the traffic situation.
2010, 19(9):163-167.
Abstract:With the rapid development of Sematic Web, application of ontology spring up and ontology reasoner application are widely used. Ontology reasoner is used to reason and query semanteme, and is one key technology in implementing Sematic Web. This paper introduces the techniques, classification, and structure of Ontology reasoner, and then introduces several Ontology reasoners. Lastly, this paper summarizes the application and the future work to be done on this topic.
2010, 19(9):168-172.
Abstract:The malware detection is one of the important parts in a secure Linux frame.Most existing malware detection methods are based on the signature and generally leave behind the development of the malware technology, which cannot meet the ever increaing needs of security. Behavior-based detectors require high-quality specifications of malicious behavior. This paper introduces an automatic technique to mine specifications of malicious behavior based on system calls and explores multiple execution paths for malware specifications, which helps the specifications to be more specific and more comprehensive, and improves the rate of detection of the behavior-based detectors.
ZHANG Xiao-Yan , FAN Bing-Bing
2010, 19(9):173-176.
Abstract:In addition to the message service, the download service is another important business. The effective management and control of the download process is a prerequisite for stable operations for the business. The data integrity is the core content for download business. This article describes the content integrity check program in the download process of a mobile platform. It proposes a content integrity check strategy on the mobile platform based on Merkle tree, which reduces the cost of the integrity check effectively by shortening the size of checksum on the course of the network transmission. Theoretical analysis and the project has proven that the mechanism has high security connectivity and low network latency.
2010, 19(9):177-182.
Abstract:RCS is an interoperable standard for IMS communication services, which was developed by GSMA. Presence and authorization are important parts of the RCS program. According to the requirement of presence and authorization, as well as referring to IETF, OMA, GSMA standards, this paper proposes an implementation project for RCS privacy, which includes a framework and a SIP signaling sequences. This paper mainly discusses the key technologies used in the implementation process of RCS privacy, which includes the processing strategy of presence, signaling sequences of subscription, and the processing strategy of authorization documents. The experimental result shows that this project has implemented functions, which are required by RCS privacy.
WANG Xiao-Di , WEN Jun-Jian , ZHANG Yue , YE Juan-Juan
2010, 19(9):183-186.
Abstract:The paper proposes a personalized recommendation system framework based on Fuzzy Interest Model and Multi-Agent to solve the recommentdation system’s inability to collect information from the customers’ evaluation on the commodity’s properties implicitly. The recommendation system creates and updates the UserProfile in accordance with customers’ private information collected on the client and combined with information in which customers are interested in.
2010, 19(9):187-190.
Abstract:The palmprint recognition is a new biometric technology, which has a good prospect of applications in the areas of network security, identity authentication etc. In this paper, the principal component analysis method is applied to palmprint image feature extraction, and the differences between the traditional principal component analysis(PCA) and the weighted principal component analysis(WPCA) in addressing the palmprint image are explained. According to the experimental results of two methods on two databases, PCA has a higher precision of palmprint recognition than WPCA, and the affection of light condition is weakened by WPCA.
LIU Huai-Yu , LI Jing , HONG Liu-Rong
2010, 19(9):191-194.
Abstract:To make full use of the color feature of a vehicle, a color transform model based on Karhunen-Loeve(KL) transform is proposed. Utilizing the model, all pixels can be transformed from RGB color space to a 2-D color space. On this 2-D color space, vehicle pixels and non-vehicle pixels will respectively concentrate on detachable areas. On this basis, vehicles can be detected from static images by using a classifier. Testing results demonstrate that when the model is applied the vehicle detection can be used with high accuracy.
2010, 19(9):195-198.
Abstract:In huge amounts of road data, calculating the short path is time-consuming. A completed solution for improving the efficiency of Shortest Path Problem is proposed. In the solution, file-mapping, evaluation function and simplification of polylines are used for increasing huge topo file loading, filling out ineffectual data to improve Dijkstra algorithm and accelerating results. With practical experience, the system works out the problem in no more than 5 seconds.
2010, 19(9):199-203.
Abstract:Based on operation principles about digital down conversion, this paper designs its structure with modules, including multirate signal processing and carrier recovery with the NDA frequency offset estimation algorithm to improve DDC. The design of each module is stated in detail. By using a System Generator to complete the simulation of an improved DDC system, applying in FRS, the correctness and feasibility of the NDA algorithm is confirmed, and the serviceability of this system in SDR receiving set is expressed.
2010, 19(9):204-207.
Abstract:The paper proposes a semantic lock mode in the Web services environment. The lock mode implements the dynamic control of locking granularity, based on the amount of resources, to apply by current transactions and also explores the deadlock lifting mechanism to minimize loss of enterprise spending on the basis of the semantic information in the semantic lock. The mode increases transaction concurrency amony transactions in Web services and reduces the probability of the occurrence of the deadlock, which effectively improves the economic efficiency of enterprises.
LUO Guang-Hong , ZHAO Zheng-Wen , WANG Yu-Qing , YANG Yun
2010, 19(9):208-210.
Abstract:With the development of information technology, more and more card games have been moved onto computers and networks. Among a large variety of poker games, Finding-Card game is more fun. After the introduction of the general situation of Kakutani-Conjecture, a deformation of the transformation is given, and used as an algorithm to design and implement a Finding-Card game.
2010, 19(9):211-213.
Abstract:The appearance of visual programming language has brought great changes to the design of man-machine interface. In the paper, through the research on current visual programming, a graph control is proposed and used as an interface design of an image processing platform. Algorithm information, which is implemented by DLL of VC, is encapsulated in these graphical controls through the use of packaging technology, and users can develop their own software by using the graphical controls, in order to avoid the compililation of code and improve the speed of image processing. The development methods of graphical controls can enhance the flexibility of configuration and improve development efficiency, and to achieve software reuse.
2010, 19(9):214-218.
Abstract:The stock market changes rapidly. Thus, the stock price reversal points play a vital role in investment decisions. Technical analysis can reveal some features of stock price reversal, but to use a sole technical indicator to predict the reversal points can end with sesults that have very low recall and precision rates. In order to improve recall and precision rates, a novel method of using Support Vector Machines (SVM) is proposed to data mine a combination of technical indicators. The experiment results show that this method has a higher recall and precision rate than the original ones.
2010, 19(9):219-223.
Abstract:In Image super-resolution methods, the classical interpolation methods have checkerboard effect and image blur. Using the partial differential equations with the post-processing is more complicated. In this paper, it is proposed to obtain a new PDE model which is coupled between isotropic and anisotropic partial differential equations. This model is processed for image super-resolution. It does not only decrease computational complexity, but also ensures a better image super-resolution effect. The experimental results show the advantages of this method.
2010, 19(9):224-226.
Abstract:A method of detection about rolling bearing faults based on BP neural network and time domain features of vibration signal is proposed to realize fast fault detection. The input vector of the BP neural network are skewness, kurtosis, crest and margin. The network is trained with BP algorithm. Experimental results show that with this method fast detection of rolling bearing faults can be realized effectively.
HU Rong , FAN Ming-Yu , WANG Guang-Wei , GONG Ya-Feng
2010, 19(9):227-231.
Abstract:To redefine the data types, control flow restoration and custom function, or structure of recognition, are structured languages. In the process of reverse compilation difficulties, previous studies use more data types in assembly language to improve representation and increase the custom function or structure of the characteristic quantities as a way of optimizing the reverse compile the results. This article uses the intermediate language to be compiled against the abstract representation of the assembly language of the linguistic forms and designs a new reverse compile mode to reverse compilation. The results are an improved recognition rate, readability, and integrity.
WU Zhen-Xing , OU YANG Liu-Bo , LAN Xiao-Fei , HUANG Zhi-Gang
2010, 19(9):232-235.
Abstract:This paper presents an ontology merging method based on concept lattice’s attribute reduction, which first conducts an analysis on the extension and connotation of the concept in the original sources. With this background, this paper constructs the concept lattice, then conducts attribute reduction on the concept lattice, removes redundant information on the ontology merging, and reduces any unnecessary attribute. All this is done to use the minimum amaunt of information that accurately reflects the nature and structure of the concept lattice and the body. Finally, an example analysis is used to prove the feasibility of this method.
XIANG Chen , ZHANG Yan-Hua , TU Shi-Liang
2010, 19(9):236-240.
Abstract:The AUTOSAR platform consists of three layers: the application layer, the runtime environment, and the basic software which includes system services, EAL(ECU abstraction layer) and uCAL(uC abstraction layer). Device drivers belong to uCAL and EAL. The memory device driver provides access to different memory devices. In the paper, the specific design of AUTOSAR is followed and a Flash driver on MPC5633M microcontroller is implemented. The proposed procedure is applicable to other device drivers.
2010, 19(9):241-244.
Abstract:Due to the increasing number of functions of the Vending Machine, the VMC(Vending Machine Controller) is becoming more and more complex, so it is becoming more and more difficul to extend and maintain the developing method used before. According to the theory of FSM, this article suggests one FSM Model on the Vending Machine. The abstract model separates and divides the system into ones to establish a list of system states and transformations. If an event occurred, it would search the system transformation list by the system event and the current state. If there is a record that matches the state and event, then the state is transformed to the NextState defined in the record. Based on the experiment, the model can solve the big problem of the system and make the system development easier to maintain.
2010, 19(9):245-247.
Abstract:Due to the shortcomings of the winter heating system in North China, the paper designs an indoor intelligent temperature control system based on ARM-Linux platform of embedded systems and fuzzy control technology. The system uses DS18B20 and ZigBee wireless networking technology to complete the collection of multi-point temperature. The system also uses fuzzy control technology to achieve precise control of room temperature. The establishment of the QT user interface optimizes the environment of human-computer interaction. By using GPRS technology, the system's remote control, the system becomes a great convenience for the user. The implementation of the system will play an important role to reduce energy waste and improve people's quality of life.
ZHU Wei-Sheng , HAO Wei-Dong , XIAO Yong-Jun , HU Xiao-Bin
2010, 19(9):248-251.
Abstract:This paper gives an introduction about hardware connection designing and software driver designing based on FreeScale’s CPU and embedded Linux system. According to that idea, the paper designs the driver system from hardware to software. The driver system will be applied to the home wireless control system. It first introduces the theory of the touch screen, then introduces the characteristics of the AD7873. Based on the content introduced above, it designs the PCB photo of the system. It designs the soft driver which is successfully tested by the professional soft TCLIB. The results of the home smart control system are promising and convert the driver system from hardware to software under the embedded system.