2011, 20(8):1-4.
Abstract:By the research of tax information system based on semantic grid(T-S-Grid), this article proposed the design of T-S-Grid architecture, described T-S-Grid hierarchy and its functional characteristics, applied OWL XML/RDF technology for constructing "tax management organization ontology" and "tax management task ontology", and showed the meaning of further development of information technology application in Chinese tax management area.
CHEN Yu-Ming , YAN Shi-Feng , TANG Jian-Zhong
2011, 20(8):5-9.
Abstract:Through application of 3G technology and video surveillance technology, this paper realizes such functions as remote monitoring of the tobacco Law Enforcement official and remote preserving of evidence for law enforcement and remote commanding of tobacco monopoly cases. It analyzes the system architecture and its realization in detail.
XU Nan-Shan , WANG Chao , LU Gang
2011, 20(8):10-13,4.
Abstract:The safety assessment of power industry was mainly operated manually in the past. That is laborious, time-consuming, less informationized, and tends to be inaccurate. To solve these problems, a task management system for Safety Assessment of Power enterprise is proposed. The main function requirements and the main framework of the system are introduced. The design of task packages and database accessing interface, user authority management and organization structure of the enterprise are addressed. The successful practical application of the system proves its importance and usability.
2011, 20(8):14-17,22.
Abstract:Based on UWB body area network (BAN) and multi-view video coding (MVC) techniques, this paper designs a panoramic surveillance system for wearable computing applications, which focuses on the acquisition, encoding and transmission techniques of the panoramic video. In the wearable panoramic surveillance system, the resources of BAN nodes (such as processing capacity, battery power and transmission bandwidth) are very limited, and high-quality reconstruction of panoramic video is required by the system. Therefore, for the acquisition, encoding and transmission of the panoramic video, this paper proposes a resource-quality control algorithm according to the H.264/MVC sub-frame coding structure, and thus the wearable panoramic surveillance system can achieve low-power, low-delay, high-quality performance.
WANG Gang , MAO Jian-Fei , TIAN Qing , MAO Fei-Fei
2011, 20(8):18-22.
Abstract:This paper designs a wireless video surveillance system based on ARM11 and Linux operating system. To improve processing speed, the system adopts ARM11 as the main processor, and the video capturing equipment is OV9650 camera, also uses hard-coding to compress the video data with H.264. Then it can transfer encoded data to remote server and display that. It realizes a wireless video surveillance platform, which has stable running, quick speed, lower expenditure and small volume. It has great practical value.
WANG Hua , DUAN Hui-Fen , LIU Huan-Min , SUN Feng , ZHANG Juan
2011, 20(8):23-26,90.
Abstract:To highly effectively carry out and manage the quality management system with convenience, according to the features of quality management system and the system requirements, a Quality Management Information System based on service-oriented architecture is studied, which is robust, well extensible and can be easily maintained. The main functional module of system can help in the PDCA circle of tasks, and can effectively assist the running of quality management architecture, as well as provid data support in its improvement process. This paper expounds the design and implementation of this system, and main functional module is also discussed in detail.
LIU Li , HE Wen-Lin , LIU Yan , LE Quan-Ming , WANG Wei-Guo , ZHAO Yong , DAI Shuan-Qing
2011, 20(8):27-32.
Abstract:The comprehensive analysis software of on-line monitoring and fault diagnosis system for power transmission equipment is a set of application system that embedded in the information integration platform. Analysis software implements those functions that real-time data monitoring, analysis, prediction, evaluation and fault diagnosis to on-site devices, at the same time it provides configuration management, data management, system configuration, user rights management and improve systems management capabilities, meeting the functional requirements for information integration platform.
YANG Chuan-Bin , LIN Pen , XIA Zan-Zhu
2011, 20(8):33-36.
Abstract:As more and more people suffered from psychological problems and the lack of psychotherapists, remote consultation has served as an effective resolution. We analyze the problems in this area and proposed a network-based platform for interactive video psychological counseling. Our platform supports abundances of gesture language to emulate face-to-face psychological counseling. We also discuss the development and the design of the platform.
WANG Xiao-Yan , LIANG Jin-Chun , GUO Xiao-Xia , YAO Ying-Ying , WANG Ying
2011, 20(8):37-41.
Abstract:The rapid developing Internet has become an important reflection of public opinions. It has been an urgent problem to be solved how to analyze and monitor public opinions in digital media and on Internet, and how to timely and effectively spot all kinds false information harmful to social security, in order to promote the healthy development of information security and content supervision. This paper proposes a www-based digital media content public opinion analysis model. A digital media content public opinion analysis system based on the Internet is designed and realized, and the practical key technologies are discussed.
ZHANG Qing , CHI Xu-Guang , XIE Hai-Bo , ZHAO Kai-Yong , WU Qing , CHEN Wei , WANG Shi-Hu , ZHU Xiao-Wen
2011, 20(8):42-46.
Abstract:The computation of traveling time of Pre-Stack Time Migration (PSTM) is the most time-consuming part of whole procedure. In this paper, we present a novel parallel algorithm to low the time of traveling-time computation. By using static interpolation with step of 8 points instead of dynamic step length, the new designed algorithm performs more accuracy and performance. Experimental results show that the speed-up number reaches 22.76 times. The statistical relative error demonstrates the better accuracy comparing with the commercial codebases.
XIONG Zhi-Ting , TAN Yang-Hong , YI Ru-Fang , CHEN Sai-Hua
2011, 20(8):47-51,71.
Abstract:A new parallel adaptive quantum particle swarm opitimzation algorithm is proposed in this paper to solve the problem that standard particle swarm optimization(PSO) algorithm may easily trap into local optimal points and may obtain exact solutions at the late of the iteration with difficultly. By sharing the two extreme values of the particles, the proposed method is able to adaptively search their optimum solutions in parallel by combination of an improved adaptive PSO with a quantum Particle Swarm Optimization of boundary variation. It is proved effectively to overcome the shortcomings of standard PSO. Test results show that the accuracy and the velocity of global search for optimal solutions have been greatly improved.
2011, 20(8):52-57.
Abstract:As the Internet becomes more widespread, the comments according to various products are also growing, these comments which contain abundant information are extremely analysis value for the manufacturers and consumers. Based on the correct analysis of opinion object, the results of opinion mining can be accurate and reliable. Based on the summarization of predecessors' achievements, according to the customer comments on the network, this paper proposes a new evaluation object extraction method. This method is based on the ICTParser syntactic analysis and IR dependence analysis, adopts the likelihood testing methods to screen irrelative candidate opinion objects. The experimental results preliminarily verified the validity of this method.
WANG Wei , LU Gang , XU Nan-Shan
2011, 20(8):58-62.
Abstract:In this paper, we analyze the current situation of Literature Management. According to the attributes of literatures, a relational model of literatures is designed, and the interconnection between literatures is quantitatively analyzed. Based on the relational model, we design and implement a prototype of Personalized Literature Management System. Users of the system can manage their literatures in convenient and personalized way.
HE Li , LI Tai-Cheng , WU Bin
2011, 20(8):63-66,133.
Abstract:We study the location locking mechanism for H(e)NB in 3GPP TR 33.820. By now 3GPP has only proposed a few solutions for H(e)NB’s location locking in certain specific situations. In this paper, we propose an improved scheme for H(e)NB, which can be used for locking H(e)NB’s location in general situations. The scheme can deal with the security threats brought by unreliable location locking for H(e)NB in practical use. It also increases the reliability of H(e)NB’s location locking and increases the probability of locking successfully.
LI Tai-Cheng , HE Li , WU Bin
2011, 20(8):67-71.
Abstract:Long Term Evolution (LTE) is the next-generation mobile communication system beyond 3G, whose security is predominant for the successful deployment of such networks. In this paper, we address the cryptographic key management during local cell handovers known as X2 handovers in LTE, which currently only achieves two-hop forward security. An enhanced key refresh scheme is proposed, which features the desired one-hop forward security. Our proposal not only makes up for the deficiency in the standardized LTE technical specification, but also retains all existent key materials and parameters without incurring extra communication costs. Therefore, it is technically feasible for the standardized key refresh to be smoothly upgraded to the enhanced proposal.
SHEN Ying , XU Dong-Ping , PANG Jun
2011, 20(8):72-75,121.
Abstract:A clustering method based on concept was provided to analyse the sentiment polarity for Chinese Bloggers. The concept is introduced into Vector Space Model (VSM) on the basis of HowNet. Firstly, sentiment words are extracted from blog texts which would be expressed by VSM with the concept of sentiment words. Secondly, blog texts are clustered with k-means algorithm to finish the analysis of sentiment polarity for Chinese Blogs. The precision of sentiment polarity analysis of Chinese Blogs is improved with concept as feature in VSM. The experiment proves the concept based VSM to be of better performance than traditional term based VSM in clustering analysis of Chinese Blogs on sentiment polarity.
CHEN Li-Ping , KONG Xiang-Zeng , YAO Zhi-Qiang
2011, 20(8):76-80.
Abstract:A novel method for the watermarking of 3D models is proposed, which is embed robust and fragile double watermark by once operation and the strength of the watermark signal is adaptive with respect to the local geometry of the model. We can detect the intact watermark vertex by fragile watermarking. Furthermore, this paper developed a weighting process of for watermark detection by let the intact watermark vertex have more weight. It can realize the double aims of the copyright protection and the integrity authentication of 3D mesh model. The watermarking schemes is designed for the sender to check the copyright ownership (robust watermarking) and for the receiver to verify the authentication of the received media
SHEN Yong-Zeng , CHEN Xuan-Yang , JIA Lian-Lian
2011, 20(8):81-85.
Abstract:Based on researches on TEEN protocol and combined the characteristic of monitoring emergences system, an event-driven hierarchical routing algorithm (TEEN-PE) has been proposed to reduce the energy consumption in the monitoring system of emergences and prolong the lifetime of the wireless sensor networks (WSN). TEEN-PE has solved the problems of the difficulty in determining the initial number of the optimal clusters and the asymmetrical distribution of cluster in TEEN protocol. And to improve the communication balance of the networks on times and space, the algorithm is taken into accounts the factor of the residual energy of the nodes and the distance of the node to the base station during the phase of cluster formation and communicates among clusters. The algorithm can effectively reduce energy consumption and prolong the lifetime of the networks. It is proved by simulated in NS-2, and the simulation results show that TEEN-PE has an advantage over TEEN protocol on nodes survival and energy consumption.
HU Xiu-Zhen , ZHANG Jian , LI Miao , YUAN Yuan
2011, 20(8):86-90.
Abstract:The visualization method of fruit tree branches that combines morphological information and parametric L-system is presented. Based on studying on the structures of pear tree, morphological characteristics, characteristics of ecological change and so on are extracted, then L-System model of pear tree including the thickness of the branches, bifurcation angle etc. are established, and geometric information of plant growth are transformed into intuitive graphical information and visual output through 3D modeling algorithm basing on OpenGL. Finally, we simulate basic forms of common pear tree (natural open center type, sparse layer of the main crown shape, small crown layer shape), which lays a foundation for developing the computer simulation system of pruning pear tree.
ZHAO Hong-Xia , YANG Jiao-Ping , WAN Jun
2011, 20(8):91-94.
Abstract:The collaborative filtering recommendation algorithm is the widely used technology in the personalized e-commerce recommendation system. However, the traditional recommendation algorithm neglected trading hours and product pricing when recommended products, which led to the lower quality recommended. To solve this problem, a collaborative filtering model considering time and price factors is proposed in this paper, and experiments show that the improvement of algorithm is most effective when time and price factors are taken into account in the calculation of Pearson correlation coefficient.
LI Hao , HAN Fang-Xi , WANG Xiao-Lin
2011, 20(8):95-99.
Abstract:In migrating workflow system, the security and route of migrating instance for the completion of the workflow plays a vital role. This paper presents a migration strategy based on immune algorithm. This method draws on the immune system's features, encodes migrating instance’s needs and security requirements as antigen and work location of service information and security as antibody, and simulates the matching process of the immune system in order to get the migration routes dynamically. The algorithm considers both the resource requirements of Agent’s task and the security of the workstation according to Agent’s risk in order to achieve safer route planning. The simulation results show that the algorithm effectively avoids the malicious host, significantly reduces the probability of migrating instance attacked and enhance the security of migrating instance.
2011, 20(8):100-103,180.
Abstract:To overcome the problem of lower control precision caused by parameters varying of the controlled object, the paper proposed a sort of predictive control algorithm based on BP neural network model. In the paper, it applies the predictive parameter of PID controller based on BP neural network on line to control the controlled object, and the system model parameter was on line predicted by means of least recursive squares algorithm. The algorithm would be based on model prediction. It first validats its control effect in the linear system, and then the non-linear problem would be treated as the linearity. The non-linear system would be controlled by use of predictive control algorithm based on BP neural network model. The simulation curves showes that it could achieve high control precision in the linear system to PID controller of BP neural network, and own the ability of adaptation and approaching arbitrary function. The simulation researches show that it is stronger in adaptation, better in stability, and higher in control precision compared with the traditional BP neural network PID controller.
ZHENG Qi-Long , WANG Rui , WANG Xiang-Qian
2011, 20(8):104-109.
Abstract:HPMR is a high performance computing platform based on MapReduce model. It has improved the MapReduce model to meet the need of high performance computing. Efficient memory management module ensures the efficiency of HPMR. There are two roles in HPMR, Master and worker. Master reads data blocks from the input data file and assign them to workers. Worker receives the data blocks from master, manages input and output module of the map and reduce function. The current memory management module in HPMR has some shortcomings: redundancy, inefficiency and lack of parallelism. This paper redesigned the underlying data management mechanism of HPMR based on mature memory optimization theory, proposed new memory management way based on memory pool. Experiments show that the new memory management module is necessary for efficient HPMR system.
2011, 20(8):110-114.
Abstract:Three-Phase asynchronous motor’s power factor and efficiency are usually very low when the loads are free or light. Regulating the input voltage of motors properly can raise the power factor and reduce the losses, which is a kind of Energy-saving technology. This paper introduces an adaptive control method of three-phase asynchronous motors which is a kind of energy-saving technology based on R8CL38. The reference model with optimum control method is adopted. It can control the voltage of three-phase asynchronous motors directly. Simulation results show the designed energy-saving power controller is effective, and the control system is stable and reliable.
ZHUANG Qi-Dong , WANG Jian-Wen , ZHANG Nan , ZHANG Shuang , REN Na
2011, 20(8):115-121.
Abstract:This paper describes the application and performance optimization of Online Judge Systems in terms of web page and database caching, server architecture, testing and processing rules in multi-core environment, front-end asynchronous response, data table design, cross-platform support, source code plagiarism detection, automatic generation of test cases, etc., which enhances the evaluation efficiency while reducing the number of servers, saving operating coses. And then, it discusses the general idea on the implementation of a unified test platform for intelligent optimization algorithms.
2011, 20(8):122-125.
Abstract:Finished Vehicle Logistics (FVL) is an important component of the national automotive industry. There are problems in it especially the problem of waste of capacity, which makes the efficiency of logistics low and make the cost high. In this paper, the VRP pattern is built and solved by Genetic Algorithm(GA) through Matlab at first, resulting in a good distribution plan, and the plan is simulated and analyzed by Flexsim. Second, the pattern of FVL common distribution is designed to solve the backhaul problem. At last, the common distribution is simulated and analyzed by Flexsim to show that cooperation can get the rate of wasting capacity lower and reduce the cost.
2011, 20(8):126-128.
Abstract:Embedded Web server has very good security and stability. The embedded web server in this paper is mainly applied in control system. It is based on the feature of control system, through to the small single task Boa server on improvement to realize. Its rich hardware interfaces can be used to adaptive data acquisition device and control equipment. This paper expounds the embedded web server hardware platform and software system development, and technical support and so on. All sorts of problems are encountered, complete the solutions to design and realize the embedded web server's basic functions.
ZHANG Qing-Lin , GU Zheng-Qi , QIU Jian , WANG Shi , GUO Jian-Cheng
2011, 20(8):129-133.
Abstract:In view of the characteristics of experiment equipment for automotive aerodynamic force and the requirement of data processing and its result, a certain mathematic model was built. Also, software of automotive wind tunnel data processing was developed, by virtue of Visual Basic 6.0. The data was extracted, analyzed and displayed by reading data files in format TXT. The software integrated Excel software successfully. Users could observe and analyze the aerodynamic force and coefficient of automotive wind tunnel model intuitively. The paper discussed software structure, data processing method and display technology of the software. Finally, the software has already been used in the HD-2 wind tunnel test of Hunan University.
ZHANG Rui-Juan , PU Bao-Ming , PAN Shi-ming
2011, 20(8):134-137.
Abstract:For the loss and loose of CRH train parts, this paper design a set of automatic video image recognition technology for fault detection system. In this important part of image processing, using a template matching algorithm based on contour to detect whether the CRH train parts is lost or loose. This paper elaborates the architecture, implementation of each part of the CRH train fault detection system and puts forward the template matching method based on contour, and gives a detail from the image pre-preprocessing, feature regions to determine the components to the process of setting the minimum score. Application process showed that the application of template matching algorithm to fault detection CRH train parts could achieve the desired results.
SHAN Zhi-Hua , ZHOU Yan-Tao , WANG Xing-Xian
2011, 20(8):138-141.
Abstract:The design of communication module for intelligent circuit breaker based on the PROFIBUS DPV1 protocol is introduced according to the demands of high-speed and real-time communication technology for network monitoring application. The system networking applications, the mechanism of communication protocol conversion based on data object map and the implementation of PROFIBUS DPV1 protocol was introduced. The main circuit diagram of hardware and software design was given. The actual operation shows that this module effectively implement the real-time monitoring and network control of circuit breaker.
LI Er-Qiang , QUAN Hui-Min , ZHOU Qin , WANG Xing-Gang
2011, 20(8):142-145.
Abstract:The design of communication module for intelligent circuit breaker based on the DeviceNet protocol is suggested according to the technical demands of intelligent low voltage circuit breaker with communication capability. The form of networking and mechanisms of DeviceNet communication, as well as DeviceNet protocol stack software implementation are expounded. The power circuit, DeviceNet interface circuit, the interoperability test interface and the result of inrush current test of conformance test are also presented. The module is effective to achieve the long-distance communications and the centralized monitoring.
2011, 20(8):146-150.
Abstract:The paper studies the application of automobile insurance assess system based on case-based reasoning. It uses knowledge project technology to organize and construct cases based on automobile insurance assess cases express. Building a automobile insurance assess cases database. During looking for the cases, the multi-layered structure of the knowledge base of the system is formed. This method can improve the efficiency of insurance assess. The test to the software proves the reasonability of the design and the validity of the implementation.
CEN Qin , LIU Li-Na , YE Yi-Ru
2011, 20(8):151-155,163.
Abstract:The amount of books has been one of the important indexes for the level of library. While the daily management work of books such as how to classify and place books has aggravate the burden of the librarian. The rapid development of mobile-robot technology and multi-Agent give a new possible method to solve this problem. Therefore, this paper provides a move-robot model based on multi-Agent technology, which can recognize, classify and placed books automatically, and navigate the walk route by improved BUG algorithm which can complete the classified and arranged work quickly and correctly. This model can simplify the manual work and lighten heavy and repeated labor.
FANG Fang , CHEN Shi-Ping , QIU Hui-Qi , WANG Jia-Bing
2011, 20(8):156-159.
Abstract:In order to solve the problem which has existed in the mobile p2p network, for example, the excessive consumption of system resources and the attacks of denial service, a new access control is proposed in this paper. Based on RBAC access control framework, MT-RBAC access control framework adopts the techniques of spatial context, trust constraint and resource control to achieve the access control mechanism of the Mobile P2P System. The new access control framework can effectively and efficiently increase the usability of the system, and prevent the system from the irrational resource request from spite nodes.
2011, 20(8):160-163.
Abstract:This approach makes robot path planning distinguished from the traditional raster method, then with the window rolling it can achieve global path planning, avoiding the traditional method of grid environment, low resolution of information thereserves big shortcoming, so it has certain research and application value. This method does not only adapt to the static obstacles, but also to the dynamic obstacles. Lastly, the path selected is optimized by Bezier curve. Simulation results prove the effectiveness of the proposed algorithm.
FU Huan-Rong , SUN Yong , JIA Jun-Ying
2011, 20(8):164-168.
Abstract:GSM AMR_WB speech codec being used for both Internet and mobile networks, robustness to both frame erasures and random bit errors assumes significance. This paper presents a high-performance concealment algorithm for AMR_WB speech. The proposed algorithm includes using Mutipulse-based Forward Error correction technique at encoder to address the error propagation cased by the Adaptive codebook. And at the decoded side, to alleviate audible artifacts at the boundary between the previous and the current frame by modificating the pitch contour of the current frame. The algorithm has been implemented in the AMR_WB 12.56kb/s standard. Subjective tests have demonstrated that this improves perceived quality in the presences of frame erasures.
2011, 20(8):169-173.
Abstract:An MDB Service Model for Telecommunication is proposed to be used in a mobile real-time accumulative system to process mass data. The proposed model offers the ability of shielding the relationship between business and storage medium. The TTHA failure recovery mechanism makes it possible to make the memory database revert from malfunction and achieve high availability. A comparison experiment is also provided to prove the high performance of our model in a mobile real-time accumulative system.
ZHAO Xing , DING Shao-Fan , WANG Ling
2011, 20(8):174-176,159.
Abstract:This paper has mainly researched on the conference system based on WMN which is a promising technique. Firstly, discussed the different ways of conference, and selected the distributed architecture for WMN. Then, proposed the extended end-system mixing method, applied it to the ditributed conference based WMN and detailed the implementation. The simulation data shows the scheme can reduce the network congestion.
CHEN Jia-Ling , LI Fu-Hai , LI Qiang , XIANG Yong-Jia , LU Jia-Zheng , LUO Jing
2011, 20(8):177-180.
Abstract:Ice accretion on power line usually causes great damage to high voltage transmission system. A novel algorism is proposed for detecting thickness of ice covered on the power line. Based on image taken by the digital camera, the method for automatic analysis and identification of power line icing was studied by using algorithms of image matching and edge detecting.
2011, 20(8):181-183.
Abstract:Test scheduling will reduce testing time and decrease testing cost. As many IP cores as possible can be tested in parallel by scheduling. But too many parallel tests will lead to over power and do harm to the SOC. To solve the problem, an IP cores test scheduling optimization method based on genetic algorithm is proposed. Searching for the shortest test time under considering power constrain. The experiment results of an ISCAS circuit based SOC verify the good optimization effect of the method, achieves reliability and economic for IP cores test scheduling.
LI Ai-Ning , TANG Yong , SUN Xiao-Hui , LIU Xin-Tong
2011, 20(8):184-187,173.
Abstract:This paper discusses the theory of 3DES Cryptography algorithm, describes the optimization process of PyDES module, which is a pure python module that implements the DES and Triple-DES algorithms; and analyzes the problems and solutions encountered in the optimization process; Finally, the optimized algorithm was tested by profile which is a tool for python program testing, and the result shows that the optimized algorithm can Enhance the Security and speed of the original algorithm.
2011, 20(8):188-190.
Abstract:This paper presents a new structure for storing numerous aerial pictures. Storing aerial pictures in some files at local machine by using AVL tree, it can provide required aerial-picture data to application of desktop quickly.
2011, 20(8):191-194.
Abstract:Map building in unknown environment maps is the key to mobile robot navigation. This paper studied the method of building indoor map, discussed the way of extracting the feature of indoor environment, as well as described the main problems of map building and solutions to them. To get the indoor map, we used LMS100 laser sensor of SICK to get the envrionment information, extracted environmental characteristics and matched local map and global map. By getting envrionment information, it is solve the problem of uncertainty error from odometry to robot. Then experiments are given to show reliability and practicality of the method.
JIANG Cheng-Yao , CHEN Qing-Kui , QIAN Jian-Fei
2011, 20(8):195-198,215.
Abstract:Disk based on database performance mainly depends on the disk IO speed. Generally, database system has a large buffer pool, where the db operations take place. Hence, the database performance depends on the size of buffer pool. In this paper, we propose a secondary buffer pool solution based on the flash memory SSD(solid state drive), which uses the high random access speed and high IOPS feature of the SSD. We implemented our solution within MySQL InnoDB. Our real machine experiments running online transaction processing workloads (TPCC) show that after enabling secondary buffer pool, the database performance will achieves up to 100% ~ 320% improvements.
2011, 20(8):199-203.
Abstract:This paper proposed a method to analyzing subjective text. The method uses various strategies to stand for text with feature vectors, and uses SVM to classify text according to the property of subjectivity and objectivity after eliminating the rundant and irrelevant features using feature selection algorithm. The feature selection algorithm in the paper bases on SIMBA. We improve the original SIMBA on the way of iteration and the measure of similarity through experiment, and overcome the instability when putting into application. In the experiment done on English and Chinese corpus respectively, the accuracy overperforms that by SVM algorithm alone and the F-MEASURE is better than that by the baseline method on same corpus.
2011, 20(8):204-207.
Abstract:For the ZigBee sensor network is still not safe enough, this article proposes a simple feasible security solution. It contains two parts. First, with the frame series number as the initial vector, using the AES algorithm encrypts /decrypts the cor responding PANID. Second, judge the validity of the frame received according to the series number. Actually,this solution has a significant effect on ensuring PANID security and preventing disguised attack.
WANG En-Da , PEI Yi-Gian , HE Yan
2011, 20(8):208-211.
Abstract:This paper studies and implements a 3D video player, which can play multiple video at the same time. To expand the application space of multimedia technology, making it closer the engineering applications. Combined with Multimedia Technology and OpenGL technology, designed a 3D video player. It can play a different video in different surface of three-dimensional graphics, and play several different video in multiple 2D planes at the same time. 2D graphics and 3D graphics can be flexible and comfortable in the deformation, moving, rotating, etc. Experimental results show that play picture is smooth and natural. We can freely choose the number of the video. There is no disturbed between various video, reach a more ideal and satisfactory playback effect.
FANG Bing-Wu , JI Hong-Mei , WANG Yong-Tao
2011, 20(8):212-215.
Abstract:Using the semantic matching algorithm, this paper proposes a service request-driven service composition method based on Web services ontology and domain ontology. By recursive calls this method to find the combination tree which should satisfy the service request function and performance constraints. To explain how to get the combination tree, a concrete example is used in this combination method. Example applications which support automatically and dynamic Web service composition can satisfy QOS constraints.
2011, 20(8):216-218,236.
Abstract:In this paper, we integrate Freescale Cup National Smart Car competition, using MC9S12XE128 as the core unit for the design and implementation of smart car tracing system based on a CCD sensor, to adopt the method of nonlinear sampling to find out the location and direction of the path. Based on the path information and direction of deviation from nonlinear sampling, to determine the speed control and direction control of smart vehicle.
2011, 20(8):219-221.
Abstract:According to the situation of coal samples, in order to achieve the full automation of coal samples, this paper proposes a locating method based on image processing for car positioning. First, this method uses of background-subtraction, image projection method, the improved Canny-edge-detection algorithm and other means to get auto maps, then combined with the size of cars to get the actual regional map. After years of sampling show that the high accuracy of the algorithm, the sampling process to resolve the issue of human factors. The method is important for the sampling the field of automated production.
JIN Min , JIN Jing-Lin , ZHANG Cheng
2011, 20(8):222-224,249.
Abstract:USB (Universal Serial Bus) is a far widely used bus. It has many advantages, such as plug and play, hot plug and small volume of the interface, which have hugely changed the development of the technology of connecting computers to external equipments.μCOS-II is an open-source, complete, portable, ROMable, well custom real-time embedded operating system, which can be easily ported to a variety of microprocessor. The paper uses the LPC2378 reader card which I had used in the SUNTEK as an example to introduce the design of USB host system in μCOS-II.
ZHENG Kai-Hua , ZHANG Xu-Dong , YU Li , BAO Rong , JIANG Guo-Hua
2011, 20(8):225-228.
Abstract:An image acquisition and display system based on S3C2440 and embedded Linux is designed. The image data is captured through USB camera, while the programming interfaces provided by the Video4Linux module are used to implement the image collection. Based on Qt/Embedded, the collected image is real-time displayed on LCD. Further, the images are compressed according to JPEG compression algorithm for subsequent process or transmission. The proposed system which is based on the embedded framework performs image data collection, real-time display and image compression. It can be widely used in the fields of intelligent transportation, computer vision and so on.
2011, 20(8):229-232.
Abstract:A mobile RFID reader based on Zigbee wireless technology is designed in this paper. This paper shows the block diagram of the mobile reader, and detail the external circuit of the RF chip CC2420, and card reader integrated chip MF RC522, and main control chip MSP430F1611, as well as the reader's software architecture. The reader collects tag data, and sends the data to the server automatically through the ZigBee network. Mobile RFID reader reduces the RFID system network cabling, saves the cost, and is used more convenientiy and flexibleiy.
ZHANG Wan-Jin , WANG Yu-Feng , QIN Jing-Wei
2011, 20(8):233-236.
Abstract:In the coal mine, switching operation is an important part of relating to production safety. This article based on Samsung s3c2440 chip and Linux embedded system. Switching controller is develop d based on Qt/Embedded control systems, the use of co-windowed Fourier transform calculation gate time, and porting to embedded devices.
LIN Ting-Yu , LIU Bo-Feng , LI Ya , YIN Yun , ZHANG Jun
2011, 20(8):237-239.
Abstract:This article presents an ultracentrifuge temperature control module, which uses fuzzy PID control algorithm. Through auto-tuning PID parameters using fuzzy logic, the controller adjust input voltage to the semiconductor cooling piece to control centrifugal room temperature accurately and rapidly. Simulink is used to simulate the proposed fuzzy PID controller. The simulation results show that the proposed controller has both the advantage of PID controller and fuzzy controller and it is very efficient in controlling the centrifuge temperature.
2011, 20(8):240-244.
Abstract:With the rapid development of multimedia technology, image database are swelling up, how to obtain useful images from the image resources on the Internet efficiently and quickly has become a hot research. In this paper, several feature extraction technologies of content-based image retrieval are discussed comprehensively and point out the future research directions.
2011, 20(8):245-249.
Abstract:VPN technology provides better network security. There are more technology architectures. It can be realized by configuration on multiple platforms. This paper analyzes the differences of tunneling technologies of VPN, and explain the VPN configuration steps in detail on the Cisco IOS, Linux, Windows etc. It displays configuration features and differences on the platforms.