• Volume 21,Issue 12,2012 Table of Contents
    Select All
    Display Type: |
    • Real-Time Full Software CNC Engraving System Based on RTX Platform

      2012, 21(12):1-7,37. CSTR:

      Abstract (2235) HTML (0) PDF 1.15 M (4255) Comment (0) Favorites

      Abstract:The computer simulation design and manufacturing needs to be a very high level of real-time and controllability, Windows operating system itself as real-time nature of the defect, brought some uncertainties to the computer simulation applications. After full argument in this paper, the author has introduced the RTX, one based on the real-time Windows simulation solutions from IntervalZero Inc. Combined with the design requirements of a particular model of CNC engraving machine, we conclude that the RTX real-time simulation applications in a Windows environment, and we write the full software CNC engraving main function modules of the program in the RTX, and this design methodology was successfully applied to a certain CNC engraving system, The actual carving examples show that the full software programs can meet the requirements of CNC engraving system in real-time based on the RTX platform.

    • Design of the Software of a Rehabilitative Gait Training Robotic System Based on the Virtual Reality Technology

      2012, 21(12):8-11,21. CSTR:

      Abstract (2683) HTML (0) PDF 997.56 K (3577) Comment (0) Favorites

      Abstract:This paper proposes a rehabilitative gait training robotic system based on the virtual reality technology, which improves the current tedious and boring patients rehabilitative training process. Virtual game is activated by the information from the brain-computer interface and runs in the form of a thread with a singleton design pattern as the main mode. Interacting with the main software, virtual game can achieve quick and effective access operations of heart rate and other physiological information of patients, which are properly reflected in the game. Virtual game makes rehabilitation training more interesting and attractive and significantly increases patients' initiative to participate in rehabilitation training.

    • Key Technology of Sharing Computer-Based Patient Record Safely

      2012, 21(12):12-16. CSTR:

      Abstract (1821) HTML (0) PDF 495.72 K (3684) Comment (0) Favorites

      Abstract:Computer-based patient record is the most important part of electronic medical information. The main problem for applying computer-based patient record is how to share patient information safely and protect patient privacy in the meantime. In this article, the safe sharing issues of computer-based patient record are described. The principle of dynamic password is described and an access control system based on dynamic password is designed. Dynamic password (one time password) can be produced by software, mobile phone and electric token according to the user safety level and different request of user. This identity authentication system based on dynamic password can be easily merged into most of hospital information systems. By using this technology, computer-based patient record can be shared by different organizations safely, quickly and conveniently. In the meantime, the patient privacy can be protected very well also.

    • Web Instant Messaging System Based on Server Push Technology and php

      2012, 21(12):17-21. CSTR:

      Abstract (1878) HTML (0) PDF 484.05 K (5089) Comment (0) Favorites

      Abstract:Based on the http protocol used in the Web side, it realizes a not browser based, easy to transplant, highperformance real-time web chat system. System uses the ajax long polling model of the server push technique to build the http communication, using the open source LAMP architecture to build server-side programs, and use the xml file system to store real-time chat content, the front using the javascript jquery framework to achieve and browse deviceindependent ajax front-end program. Text chat and expressions, and ease of integration into the sns type of site. Project practice shows that the web php-based server push model real time chat system stability, it has a certain value.

    • Telemedicine System Based on Cloud-Computing for Medical Diagnosis

      2012, 21(12):22-25. CSTR:

      Abstract (1967) HTML (0) PDF 550.37 K (4972) Comment (0) Favorites

      Abstract:A telemedicine system based on cloud computing is designed. It provides electronic medical and health records management mechanism, and makes android-based mobile terminal a remote mobile medical tool, also, it builds various "Cloud service" resources for doctors to freely use, such as content-based image retrieval(CBIR), virtual 4D CT, automatic detection of tumor etc. This system solves problems people face when managing personal health and medical information and resorting to medical advice in other regions, meanwhile, it mitigates the problem of the uneven distribution of medical resources. It is a prospective medical service platform with cloud computing application.

    • Certain Diagnostic Expert System for the Aerial Electronic Instruments

      2012, 21(12):26-28. CSTR:

      Abstract (1692) HTML (0) PDF 511.88 K (4536) Comment (0) Favorites

      Abstract:The diagnostic expert system is applied widely in ATS, and it is one of the pivotal technologies in the automatic test and diagnosis field. This paper constructs a diagnostic expert system for the aerial electronic instruments. The expert system made use of integrated reasoning modes based on rule reasoning and Hash algorithm, and rapid fault location and fault prediction were performed. The proposal of condition-based maintenance was brought forward. This method improves fault detection rate and fault diagnosis efficiency.

    • Real-Time Encoder System for Dealing with High Definition Video Based on DSP

      2012, 21(12):29-32,128. CSTR:

      Abstract (1516) HTML (0) PDF 931.36 K (3248) Comment (0) Favorites

      Abstract:In this paper, optimization of a H.264 encoder and video capture driver using TMS320DM642 are presented, and some speciality are considered according to the analysis of the video capture driver structure and the architecture of DM642. The problem of dealing with high definition video, such as video frame of 1024×768 resolution, is finally resolved based on DM642. The testing results demonstrate that encoder has sped up remarkably after optimization, which can meet the real-time encoding requirement for the video resolution of 1024×768.

    • Monocular Vision Car Distance Monitoring System Based on ARM11

      2012, 21(12):33-37. CSTR:

      Abstract (1639) HTML (0) PDF 553.73 K (3431) Comment (0) Favorites

      Abstract:Driver while driving prone to visual fatigue and stall phenomena, at this time it is difficult to judge the safety car distance, easily lead to rear-end collision accident. In order to solve this problem, uses the ARM11 core SAMSUNG S3C6410 devices build a car safety distance monitoring system. Combine of vehicle features such as shape and texture, system uses multi-feature fusion technology to complete the vehicle identification under complex environment, uses the monocular vision principle complete the car distance detection with the camera under multi-angle. The experiments show that this system can effective monitoring the front cars distance, accurate measurement, high reliability and meet the requirements of real-time.

    • An Opinion Mining System of Stock Recommendations Based on Web

      2012, 21(12):38-42,51. CSTR:

      Abstract (1550) HTML (0) PDF 961.27 K (3278) Comment (0) Favorites

      Abstract:Internet has become the main channel of information on investment for individual investors. “market trend” is a major consideration for individual investors to investment market. Here to try to design the opinion mining system of stock, the system uses model-based method of tendentious analysis of stock analysts, to identify and extract the predictable view of statement classification and tendentious analysis of the final stock analysts. The experiment results show that the use of the approach makes the opinion mining system’s precision rate arrive at 91.7%.

    • WSN Localization System Based on ZigBee

      2012, 21(12):43-46,79. CSTR:

      Abstract (1617) HTML (0) PDF 1.04 M (4462) Comment (0) Favorites

      Abstract:We researched and designed WSN localization system based on ZigBee. This plan used CC2430/2431 of TI Company as core chip; gateway, reference node and blind node module were designed combined with peripheral components. The hardware principle and software design of the localization system was discussed, and present the principle diagram of system and software design flow chart. IAR Embedded Workbench was used as platform to develop system software. We adopted improved DV-Distance algorithm as location algorithm. What’s more, the improved DV-Distance algorithm was compared with traditional algorithm by simulation, and the results show that improved DV-Distance algorithm could improve location accuracy and efficiency. So the scheme designed is feasible, and it is suitable for practical application.

    • Total Quality Management System for Graduation Project Based on B/S Model

      2012, 21(12):47-51. CSTR:

      Abstract (1639) HTML (0) PDF 609.26 K (3852) Comment (0) Favorites

      Abstract:Graduation Project is a significant step for undergraduate students to synthetically practice their knowledge learned in universities. Due to many reasons, e.g. the low efficiency for title-electtion, there are no tools to support total quality control process for the entire graduation project management, the completion quality of graduation project is not as good as the authorities expected. To address this issue, we implemented a graduation project management information system based on B/S model to monitor, manage and control those which participate in the graduation project processes. It is driven by total quality control method and is supported by workflow technology. This system has been applied in our university for 6 years and becomes a very perfect, efficient and powerful-fuctions information plat.

    • Optimizing the Reliability of Flexible Workflow Based on the N-Version Programming

      2012, 21(12):52-55. CSTR:

      Abstract (1686) HTML (0) PDF 520.33 K (2954) Comment (0) Favorites

      Abstract:To improve the description ability and reliability of the workflow management system used in large enterprises, this paper proposes a flexible workflow model based on the N-version programming. Compared with the traditional workflow model, the model applies the N-version programming method on the key node in the workflow to significantly enhance the reliability of the workflow management system. Furthermore, how to maximize the reliability of the N-version programming method is described to meet the practical needs of the model application. Finally, this paper introduces the realized workflow model and the corresponding system in detail. The experiment result shows that the new modeling method is high efficient and satisfactory.

    • Graphics Development of Android System Based on NDK Mode

      2012, 21(12):56-59,124. CSTR:

      Abstract (2005) HTML (0) PDF 748.59 K (9361) Comment (0) Favorites

      Abstract:Google provided NDK development tools to produce C/C++ development base on Android system, through use of this tool, C/C++ code can be embedded into the Android application, then use “Java+C/C++” programming way to develop application. Based on this model to produce Android graphics development, through use C/C++ to call link library of two graphics engine Skia GL and OpenGL ES, realize 2D/3D graphics development in application without to call graphics API of Android SDK.

    • Formal Analysis of Gossip Protocol-based Publish/subscribe Systems Using the PTA Model

      2012, 21(12):60-66. CSTR:

      Abstract (1829) HTML (0) PDF 705.24 K (3470) Comment (0) Favorites

      Abstract:Based on the study of traditional publish/subscribe message middleware, we study the publish/subscribe message middleware with the combination of the characteristics of Gossip Protocol. Finally we use the PRISM simulation tools to formally analyze the simulation model with the formal methods. The experimental results show that the real-time performance of the publish/subscribe message middleware system is affected by the message generation rate, and under the two condition of each subscriber subscribe the same messages or different messages, the network characteristics show different changes, but ultimately decreases with the increase of the message generation speed. The reliability decreases with the increase of the message generation speed, and increases with the increase of subscriber's receive buffer, but the increase rate will become increasingly smaller. The experimental model and experimental methods will certainly help for studying the publish/subscribe message middleware system and adjusting the system parameter in the real environment.

    • Access Control Model Based on Spatial Specialty

      2012, 21(12):67-71. CSTR:

      Abstract (1881) HTML (0) PDF 455.96 K (4600) Comment (0) Favorites

      Abstract:Targeting on the ineffectiveness of authorizing mobile clients in the access control system, SDT_RABC--an access control model, which based on supporting space and time dimension was provided. It defined the constraint of the activation area in the spatial environment, spatial cardinality constraint of role activation and separation of duties spatial constraint, a generalized and well-represented control mode was finally set up which enhanced the capacity of spatial safety description to the traditional role-based access control model.

    • TCSC Nonlinear PID Control Strategy System

      2012, 21(12):72-75. CSTR:

      Abstract (2206) HTML (0) PDF 532.62 K (3794) Comment (0) Favorites

      Abstract:Through the study design based on a nonlinear PID control the controlled series compensation system, which does not rely on the characteristics of the controlled object model, to make up for the traditional linear PID control some shortcomings. The results of the study show that: with the traditional PID control based on linear fixed series compensation system in comparison, based on nonlinear PID control controllable series compensation technology, because in the feedback of the nonlinear combination to make full use of the function, strengthen the system damping, improve the system of the transient stability, and the system robustness and adaptability of has also improved.

    • Wireless Sensor Networks Routing Algorithm Based on Load Balance

      2012, 21(12):76-79. CSTR:

      Abstract (1584) HTML (0) PDF 582.25 K (3145) Comment (0) Favorites

      Abstract:It is a challenge to prolong the stable period in wireless sensor networks. Load balance routing algorithm is one of the solutions to the problem. The paper proposed a load balance routing algorithm(LDBRA), which select cluster head nodes and implement load balance according to the condition of energy distributing and the communication cost to prolong the network lifetime stable period. In the process of cluster head selecting, based on the above two factors to select optimal cluster head nodes. Simulation results show that the LDBRA could better implement load balance and prolong the network stable period.

    • Particle Filter Algorithm Inserting Mean Shift for Object Tracking

      2012, 21(12):80-84. CSTR:

      Abstract (1810) HTML (0) PDF 724.23 K (3544) Comment (0) Favorites

      Abstract:Traditional particle filter algorithm needs a large number of particles to show posteriori probability density function of object state, the calculation of this algorithm is large, and the real-time of tracking is poor, so it is hard to track fast and sheltered object accurately. Considering above problems, this paper proposes a new algorithm that is inserting Mean Shift into particle filter algorithm, this method can make full use of clustering effect of Mean shift to make particles distributed more reasonably, which not only improves the diversity of the particles but also greatly reduces the number of particles used to describe object state. The experimental results show that the improved algorithm has stronger robustness and better real-time performance.

    • Combination of Weighted Feature Vector Space Model and the RBPNN Text Classification Method

      2012, 21(12):85-89,71. CSTR:

      Abstract (1572) HTML (0) PDF 866.81 K (3461) Comment (0) Favorites

      Abstract:In this paper, a text classification method combined weighted feature vector space model and the RBPNN are presented. According to the insufficient of traditional text feature extraction method. In the method, the weigthing about text feature is given by the text feature location information and category information, and then the feature frequency is obtained. The characteristic value is calculated using the TFIDF function after that, and the characteristic vector of text is formed. Then the weights between the second network hidden layer and output layer are decided by the least squcre algorithm, so the classification model is built. The experimental results showed that, the good recall and precision are obtained. The performance of text classification method proposed is well.

    • Scenes Editing Based on Image Analogies

      2012, 21(12):90-94. CSTR:

      Abstract (1839) HTML (0) PDF 581.49 K (3092) Comment (0) Favorites

      Abstract:This paper presents an effective scenes editing algorithm based on the Hertzmann’s Image analogies algorithm, using the patch-based texture synthesis to replace the only points matching. With joining a said of boundary width parameter to improve the patch-based texture synthesis and taking example by the texture transfer algorithm to make synthetic effect nature, the result of the experiment is satisfactory.

    • A Duplication Strategy for Data-Intensive Application

      2012, 21(12):95-98. CSTR:

      Abstract (1458) HTML (0) PDF 487.63 K (3205) Comment (0) Favorites

      Abstract:Data-intensive computing application based on workflow accounts for a large share in cloud computing. When processing data being stored in more than one data center. How to get data efficiently plays a big part in improving quality of service(QoS) and process execution efficiency. In this paper, a model is presented to describe the data intensive application. By measuring matched load of data nodes, a domain-based duplication strategy is also declared out. At last,the simulation results show that this strategy can improve the data acquisition efficiency markedly.

    • Evaluation Method for the Network Reliability Based on the Network Topology

      2012, 21(12):99-102. CSTR:

      Abstract (1907) HTML (0) PDF 502.74 K (4453) Comment (0) Favorites

      Abstract:With the rapid development of modern network technology, communication network has been further researched, and the reliability of network is one of the major criteria to evaluate the performance of network. With the previous theories researches and practice about network, this paper evaluates the importance of node and link state according to the node deletion and link contraction method respectively, then make appropriate adjustments, we propose a new method—TNL algorithm based on the inherent network topology, combined with transmission characteristics. This method evaluates the reliability of network with different network topologies effectively, experimental results demonstrate the efficiency of the proposed algorithm which is better than BDD algorithm.

    • A Method about Node Importance Evaluation Based on Flow and Path for Network

      2012, 21(12):103-107. CSTR:

      Abstract (1931) HTML (0) PDF 495.70 K (4294) Comment (0) Favorites

      Abstract:How to evaluate the importance of each node effectively in the network, is very important to the design of the whole network. A new algorithm based on transmission flow and the shortest distance between two nodes in the network is proposed in this article—DFC algorithm. This method takes the flow of each node and the shortest distance between two nodes into account, evaluating each nodal importance to the network of the whole communication. Through the experimental simulation and the comparison with the general effective delete node method, this method is proved to have higher accuracy and more effective.

    • EEXPSort-an Energy-Efficient Sorting Algorithm for Hierarchical Data in External Memory

      2012, 21(12):108-112,107. CSTR:

      Abstract (1532) HTML (0) PDF 867.75 K (2930) Comment (0) Favorites

      Abstract:A fundamental problem in XML data handling is hierarchical data sorting. This paper presents an energyefficient sorting algorithm called EEXPSort for XML document. It exploits multi-core CPU to parallelize the executions of the mutually independent tasks generated by scanning the XML document; For energy-efficiency, it employs data compression, single temporary-file storage and avoidance of tree-matching to effectively reduce disk IOs and CPU process. Extensive experiments on XML documents with different characteristics show that EEXPSort outperforms the existing quickest XML sorting schemes HERMES significantly in energy-efficiency and performance.

    • Edge Signals Offset Problems After Gauss Smooth in Image

      2012, 21(12):113-116. CSTR:

      Abstract (1355) HTML (0) PDF 574.69 K (3978) Comment (0) Favorites

      Abstract:Gauss smooth is a common pretreatment way, but it can’t eliminate noise in small scale and cause image edge offset in large scale. The paper analyzed it,proposed edge offset compensation method under lager scale gauss smooth, and solved the problem of gaining precise and less noise image edge by using multi-scale theory.

    • Dynamic Diffusion Simulation of Fick’s Second Law Based on VTK

      2012, 21(12):117-120. CSTR:

      Abstract (1502) HTML (0) PDF 504.88 K (5538) Comment (0) Favorites

      Abstract:Fick’s Second Law is the basic theory of global diffusion under the instability condition for solid physics. Visualization simulation of dynamic diffusion will do help researchers intuitively and conveniently understand how materials affect environment. The paper implements dynamic diffusion simulation of Fick’s Second Law under the one-dimension condition using VTK, and it provides valuable reference and method for researchers understanding diffusion results by applying Fick’s Second Law.

    • Enterprise Group Budget Approval Workflow System Oriented SAP BPS

      2012, 21(12):121-124. CSTR:

      Abstract (1783) HTML (0) PDF 328.54 K (3122) Comment (0) Favorites

      Abstract:After the implementation of SAP BPS in the enterprise,it brings trouble for budget approval due to the C/S structure. It is difficult to make managers at all levels to participate the whole budget approval. Therefore,this article studied data interface and interaction techniques between SAP BPS and workflow system,and designed the solutions of two level process for budget approval based on enterprise group. The practice on the system of comprehensive budget approval for CNR shows that the techniques and process solutions have good interactivity with SAP BPS and high efficiency.

    • Extraction and Application of CATIA Model Information Oriented to Three-Dimensional Assembly Process System

      2012, 21(12):125-128. CSTR:

      Abstract (1466) HTML (0) PDF 502.97 K (5072) Comment (0) Favorites

      Abstract:The tri-dimensional assembly process system is a hot trend in the development of CAPP, its primary source of basic data is information of three-dimensional CAD model. This paper focuses on the pivotal technic and difficulty of assembly information’s extraction in CATIA which is commonly used in auto trade, describing how to apply CAA secondary development technology in depth, extract assembly information and use it to the three-dimensional assembly process system, and compile assembly process.

    • Pork Production Traceability System Based on RFID

      2012, 21(12):129-132. CSTR:

      Abstract (1946) HTML (0) PDF 767.83 K (4354) Comment (0) Favorites

      Abstract:In order to achieve the slaughterhouse’s network management and informationization, ensure the safety of the pork production, the text using modern network technology and Radio Frequency (RF) communications technology, with RFID tags and one dimensional barcode as a carrier of the pig identification information, combined with the SQL Server2008, we construct pig slaughtering traceability system. Using STC11F32XE and RC522, a RFID reader is developed, that communicate based on serial port, and the RFID PC software and the pig slaughter software system are designed based on Visual Studio 2008. The test results show that the system has a good stability and friendly human-machine interaction, extension with high economic and practical value.

    • New Smart Home System Based on Android Piatform and Zigbee Technology

      2012, 21(12):133-136,157. CSTR:

      Abstract (1644) HTML (0) PDF 877.80 K (5404) Comment (0) Favorites

      Abstract:Along with the personal computer and Internet’s rapid popularization,as well as the electrical appliances industry’s rapid development,more and more consumers are eager for Smart Home now.This paper puts emphasis on the constructing of Zigbee network with modular thought.Linux embedded system for mobile intelligent terminal is adopted for design,together with the mobile phone interface of Android system ,the information collection and the wireless control of household electrical equipments are finally achieved to.The system not noly can improve the convenience and comfort of the smart home,but also with good versatility and extensibility.At present,it has been applied to the intelligent household exhibition in Meihu Community of Wuxi,Jiangsu and realizes the intelligent control and remote control of the lamplight,air-conditioning,TV and many other electrical appliances.

    • Design and Application of Network Cable Soft Lock

      2012, 21(12):137-140. CSTR:

      Abstract (1565) HTML (0) PDF 385.64 K (2961) Comment (0) Favorites

      Abstract:The system is based on the working principle of TCP/IP ICMP protocol. First it uses VB6.0 programming language to encapsulate the ICMP data packets. Then, it sends ICMP data packets through API network interface function of Windows operating system in the LAN. This article explores implementation methods and steps of network cable software lock from software development perspective.

    • Design of Rang Equipment Management and Control System Based on Middleware Technology

      2012, 21(12):141-144. CSTR:

      Abstract (1815) HTML (0) PDF 773.75 K (3230) Comment (0) Favorites

      Abstract:In order to adapt to the testing and training mission of the weapon equipment in the new situation, the building of the range gradually transform from "the chimney type" structure to the general integration structure. In this context, how to effectively manage, control and use the range resources accommodate to the general integration building of the range becomes the important problem of the range facing. So, the paper puts forward a range equipment manage and control system design scheme based on Middleware Technology.

    • Denoising Algorithm of ECG Signals Based on Wavelet Threshold

      2012, 21(12):145-148. CSTR:

      Abstract (1681) HTML (0) PDF 431.93 K (5432) Comment (0) Favorites

      Abstract:In this paper, the wavelet threshold method was applied to ECG signal denoising. We proposed an improved threshold function on the basis of analysis and understanding of the commonly used ones. And the MIT-BIH database was used to simulate the ECG data in Matlab, respectively using common threshold functions and improved one for hard and soft thresholding to remove the noise. Experimental results show that soft thresholding method of improved threshold function can effectively filter out the main interference, and better to retain the characteristics of the ECG.

    • The Application of Clustering and Associate Rule Mining to Fraud Information Identification

      2012, 21(12):149-152. CSTR:

      Abstract (1487) HTML (0) PDF 394.96 K (3189) Comment (0) Favorites

      Abstract:Considering that with the rapid expansion of electronic data, the traditional audit approachs can not cope with vast business data, this paper intend to introduce the Clustering and Association Rule Mining in the audit fields. Based on the study of the meaning of Clustering and Association Rule Mining and their Algorithm—K-Means and Apriori, this article proposed an audit model which is based on the Clustering and Association Rule Mining, at the same time, taking the audit of medical insurance of some a city as an example, it detailed first how to use the Clustering to filter data, then how to mining the potential relationships in vast data so as to determine the audit priorities and audit clues.Through the case, the article is committed to provide a reference for the application of data mining in the fraud information identification.

    • ER-Diagram Automatic Drawing Technology Based on GraphGrammars-Directed

      2012, 21(12):153-157. CSTR:

      Abstract (1929) HTML (0) PDF 446.96 K (3329) Comment (0) Favorites

      Abstract:To software development and technology research, logical model visualization has an important significance. This paper puts forward an ER-diagram automatic drawing technology based on graph grammar-directed, and expands graph grammar named ER graph grammar. It overcomes the shortcoming of limited map number for drawing ERdiagram and difficult changing in original modeling tools, and describes relationship of entities and drawing rules of ER-diagram on the semantic. ER-diagram automatic placement and automatic wiring are presented, and ER-diagram automatic drawing is realized.

    • Identification of the Orange Plant Disease Based on the Analysis of the Image

      2012, 21(12):158-162. CSTR:

      Abstract (1422) HTML (0) PDF 481.62 K (2918) Comment (0) Favorites

      Abstract:To achieve the computer identification of orange secco plant disease and the scientific evaluation of disease levels,the paper proposed a identification method through the analysis of disease image, automatic extract the effective feature, design classifier model.In the paper method was studied how to enhancement processing the diseases of image, segmentat disease spot, extract feature, and Construct classifier model, etc. Then for example five of confusion between the diseases, extracting the disease spots the tone and texture, shape characteristics, after optimization respectively by using support vector machine (SVM) and BP neural network to identify disease categories. The experimental results show that this method can be a very good recognition plant disease categories for scientific control and give a scientific evaluation for the plant disease harm degree.

    • Customer Value Evaluation System in the Golf CRM System

      2012, 21(12):163-167. CSTR:

      Abstract (1421) HTML (0) PDF 590.54 K (3392) Comment (0) Favorites

      Abstract:Customer value evaluation system is the core of the CRM(Customer Relationship Management) system. Through to the analysis of golf industry evaluation of customer value, this article establish the model of golf booking service industry customer value evaluation system, and introduces application of analytic hierarchy process (AHP) to calculate the model’s customer value. Customers are divided into four types according to the different customer value, this article suggest using different marketing, sales and service strategy for different types of customers. Finally, it introduces the model’application in CRM system.

    • Evaluation Model Based on Fuzzy Clustering in Teaching Quality of Teacher

      2012, 21(12):168-172,167. CSTR:

      Abstract (1536) HTML (0) PDF 1.01 M (2977) Comment (0) Favorites

      Abstract:Evaluation of Teaching Quality plays an important role in the over all education system, making a correct and comprehensive evaluation to teachers, fully stimulating the enthusiasm of teachers. In this paper, the approach of fuzzy clustering is applied to analyze the teaching quality of teachers, which comprises selecting appropriatesimilar coefficient, setting up fuzzy similar matrix, and making classification with dynamic clustering. This method could therefore lead to the combination of the evaluation of both quantification and qualification, revealing the performance of the teachers objectively.

    • A Quick Electric Network Topology Technology Based on Graph Database

      2012, 21(12):173-176. CSTR:

      Abstract (1632) HTML (0) PDF 439.40 K (5938) Comment (0) Favorites

      Abstract:A general topological analysis method based on graph database, multi-state device is mapped to multiple nodes, each node has the parent property of this device, connection between the device is mapped to connection cable node and the relation between each connect device. Every device’s attribute is mapped to properties of nodes and relationships in the network topology. After store these information into graphic database, combined use a variety of graphical analysis algorithm in graphic database, and author also developed electric network algorithm based on these inherited algorithms. Base on the method, monitoring systems and substation intelligent ticket operations have high availability and performance, and achieved good results.

    • Research and Application of Print Technology Based on Logistics Service Platform

      2012, 21(12):177-181,189. CSTR:

      Abstract (1417) HTML (0) PDF 841.45 K (3347) Comment (0) Favorites

      Abstract:In the B/S mode, the problem for reports printing has always been a key in the development process of the Web system. This paper introduces a solution for the reports printing in the B/S structure of logistics service platform, and detailed describes the implementation process by using jatoolsPrinter control to design reports. It is better to meet the actual needs of the application, and it is well applied in logistics service platform. Of course, it also provides a new thought for the reports designer in the B/S mode.

    • Method of Image Edge Detection Based on Edge Image Fusion

      2012, 21(12):182-185. CSTR:

      Abstract (2175) HTML (0) PDF 558.39 K (3928) Comment (0) Favorites

      Abstract:Edge detection is an important part of the image processing, pattern recognition and computer visions. The edge detection results of the traditional image edge detection methods in general. In order to better detect the image edge, presented a method of image edge detection based on edge image fusion on the basis of the analysis of traditional edge detection algorithm. The original image is decomposed by dyadic wavelet get low-frequency sub-image at first. Then the original image and the low-frequency sub-image are enhanced by histogram equalization method, the enhanced original image and the enhanced low-frequency sub-image are detected using Canny operator get edge images. Finally, the two edge images are fused into one complying with relevant rules get an intact edge image. Results show that this method is much better than directly using alone the Canny operator or wavelet transform edge detection method to the original image.

    • Implementation of Data Paging with Stored Procedure

      2012, 21(12):186-189. CSTR:

      Abstract (1502) HTML (0) PDF 374.62 K (3248) Comment (0) Favorites

      Abstract:This paper describes the paging of massive data with stored procedures in the database server, focuses on the design ideas and implementation methods of stored procedures for data paging, and their calls by ADO.NET command object. The method greatly reduces the network traffic when the massive data queries, and improves the efficiency of the system.

    • Text Automatic Clustering Based on Indiscernibility Relation

      2012, 21(12):190-192. CSTR:

      Abstract (1300) HTML (0) PDF 382.61 K (2995) Comment (0) Favorites

      Abstract:This paper studied the automatic clustering method under the Indiscernibility relation of the text objects. In the clustering process, the text sets were converted to the Boolean text information system that the machine may process; secondly the Indiscernibility relation was defined in information systems, and the Indiscernibility relation clustering theory was proposed; then the algorithm was described, which was proved by experiment; Analyzing the time complexity and disadvantages of the algorithm, gives the concrete improvement measures. Based on Indiscernibility relation automatic text clustering algorithm has a theoretical foundation and good experimental results show that this method has better application.

    • Engine ECU and Computer Data Communication in LabVIEW Platform

      2012, 21(12):193-195,107. CSTR:

      Abstract (1610) HTML (0) PDF 1.10 M (4126) Comment (0) Favorites

      Abstract:The paper designs the software system for engine ECU data communication which is based on LabVIEW 8.6 platform. MW60C as a Bus interface, then in LabVIEW platform make use of Call Library Function Node (CLN) to call dynamic-link library (DLL), realizing the engine ECU and computer data communication. Then visit the LabVIEW Database package LabSQL, building the Access database, realize the data storage, management and querying. Experiments show that system has the advantages of simple programming, convenient human-computer interaction, short development cycles, so this research has some practical value.

    • Push-Mode Services Invocation Based on Publish/Subscribe

      2012, 21(12):196-199,162. CSTR:

      Abstract (1575) HTML (0) PDF 854.29 K (3527) Comment (0) Favorites

      Abstract:On the basis of the problems of unnecessary network traffic, long response time, and bottleneck problems caused by traditional services invocation in SOA, this paper proposes a push-mode services invocation method based on publish/subscribe, and compares it with traditional pull-mode method. We find that the push-mode method has advantage on network traffic, response time etc through analysis and experiment.

    • Building Course Content Ontology Based on Protégé

      2012, 21(12):200-202,209. CSTR:

      Abstract (1510) HTML (0) PDF 833.67 K (6928) Comment (0) Favorites

      Abstract:Ontology, an efficient model of expressing concept hierarchy and relationship, can be used to express course content frame. This paper uses visual basic course as research object and using protégé as a ontology construnction tool. The construction of the principle and steps has been discussed preliminary.

    • Schema Matching and Interface Integration for Chinese Deep Web

      2012, 21(12):203-205,185. CSTR:

      Abstract (1550) HTML (0) PDF 927.90 K (2864) Comment (0) Favorites

      Abstract:Many researches about deep web focus on the deep web with English language, ignoring that with Chinese. In this paper, we present our work in schema matching and interface integration for Chinese deep web. We create a dictionary, which stores synonyms, hypernyms and hyponyms, at the very beginning. After interface extracting, we use Principle-based Segmentation algorithm to segment each attribute into words. Then, for each attribute, we look up the pre-created dictionary to find all its synonyms, hypernyms and hyponyms, form a record and store them in a list. Furthermore, we keep a counter for each attribute in the list to record times it appearing in the local interfaces. At last, we choose from each record a synonym with the largest count number as the attribute of union interface.

    • Fault Diagnosis Method Based on Hy- PF

      2012, 21(12):206-209. CSTR:

      Abstract (1635) HTML (0) PDF 415.13 K (3993) Comment (0) Favorites

      Abstract:A novel fault diagnosis method is proposed in this paper which is improved with DRFNN and PSO on basis of PF. There are much more algorithms about fault diagnosis because it has become the spot in intelligent control. As one of status estimation diagnostic methods based on the analytical model, particle filter fault diagnosis has been playing an important role in industrial production. However, it is limited by its shortcoming for its further development, a new particle filter fault diagnosis method based on hybrid algorithm is proposed in this paper, which retains the advantages of the particle filter, and it not only solved the problem of the weight degradation to a certain extent, but also improved particle swarm optimization. A system includes fault detection, prediction and recognized is realized with neural network in the beer fermentation temperature control system.

    • Survey on Distributed Cooperation Incentive Mechanisms in Self-organized P2P Networks

      2012, 21(12):210-214. CSTR:

      Abstract (2003) HTML (0) PDF 414.51 K (3146) Comment (0) Favorites

      Abstract:The nature of self-organized P2P network is that most nodes are autonomous and rational which leads to the conflict between the top objective of the system and own interest of the node. An cooperation incentive mechanism can introduce altruistic behaviors, decrease the conflict between the system and the individual. In order to improve network availability, the author discusses a few efficient, practical distributed cooperation mechanisms and points out the pending problems and research directions in the design of cooperation mechanisms in self-organized P2P networks.

    • Application of Time-series Decomposition with Dummy Variables to Cigarette Sales Forecast

      2012, 21(12):215-220,148. CSTR:

      Abstract (1776) HTML (0) PDF 912.20 K (5411) Comment (0) Favorites

      Abstract:According to the long term and seasonal trends of time series, time-series decomposition makes a reasonable forecast of future, but when dealing with seasonal factors in China, it’ll be influenced by Chinese traditional festivals. Based on time-series decomposition, this paper built a modified model consisting of time-series decomposition and dummy variables which represent Chinese traditional festivals. In an example of the 90 months’ cigarette sales forecast in a province, the new model can effectively improve the prediction accuracy, and it’s helpful for enterprises to make production and sales plans.

    • Comparison of Decision Tree, Native Bayesion and Natvie Bayesion Tree

      2012, 21(12):221-224. CSTR:

      Abstract (3398) HTML (0) PDF 293.74 K (13186) Comment (0) Favorites

      Abstract:In this paper, we used the normal dataset ‘adult’ to compare the runing time, correct rate and error rate of c4.5 decition tree , native bayesion and native bayesion tree, with the data mining tool called weka. The result shows that: we can choose the NB Tree when the memory is big enough and the running time is undemanding; and choose natvie bayesion when the job should be done quickly; and the c4.5(j48) decision tree is an compromising approach.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063