• Volume 21,Issue 4,2012 Table of Contents
    Select All
    Display Type: |
    • >系统建设
    • Crops Analysis and Evaluation Thematic Map System Based on GIS

      2012, 21(4):1-5.

      Abstract (2259) HTML (0) PDF 633.63 K (3524) Comment (0) Favorites

      Abstract:Currently, the pattern of agricultural production and management in China are scale production and operating management, and lack of the production and management according to difference fields (including crop variety, pesticide and fertilizer). This paper takes the agricultural base of Shenyang Military Regions in north-east as an example, synthetically analysizing the current situation and development potential of crops on the basis of fertility, seeded area, crop yields of different fields, design and realize the thematic system based on component GIS, realize the variable-rate production of different fields, contains the practical value in variable-rate production mode and implement of precision agriculture.

    • Conerged Network System Platform Based on Adaptation Layer

      2012, 21(4):6-9.

      Abstract (1881) HTML (0) PDF 1.02 M (3393) Comment (0) Favorites

      Abstract:Heterogeneous network convergence is the inevitable trend of information and communication technology, which is the basis for modern service industry. In order to solve the the consistency of network convergence and multi-access multi-terminal requirements, a novel system architecture of converged network network-based integration architecture base on adaptation layer is proposed to set up the user-centric heterogeneous platform for the applications of modern service industry. Furthermore, the logic framework and the physical topology of system platform are also brought forward. The network architecture based on adaptation layer has been applied in the modern service industry, which shows that the architecture can effectively settle the consistency of cross-network and cross-terminal system to ensure network QoS performance and enhance the user experience.

    • Design of Architecture on Transporting Data for Data Exchange Platform Based on MOM

      2012, 21(4):10-13.

      Abstract (2177) HTML (0) PDF 464.82 K (4351) Comment (0) Favorites

      Abstract:During the process of constructing data exchange platform for different application systems which belong to LiaoHe Basin, We found that there existed several problems by using web services to transport data between two application systems such as low reliability, the difficulty of supporting the complex data from different data source, the only support of synchronous process. In this article, firstly, we did a research on the solution of reliability data transmission based on web services. Secondly we had the idea of designing the Architecture on Transporting Data based on MOM. At last, we described its working process and the details of its components.

    • Application of Design Patterns in Resource Management of the File Exchange System

      2012, 21(4):14-17,35.

      Abstract (1557) HTML (0) PDF 1.05 M (2821) Comment (0) Favorites

      Abstract:This article analyses the deficiencies of scalability and maintainability of the traditional resource management system from the perspective of the business layer of the system, and to put forward this paper is to develop resource management system. In this paper, the complexity of the business layer is to be re-designed through the design pattern idea, the introduction of a proxy pattern, a simple factory pattern, visitor pattern, double dispatch pattern and strategy pattern makes file exchange system the indirect interactions of function module components and resources processing algorithms. Functional modules of the business layer through configuration information call the appropriate components to complete a business, so that each business is no longer a direct link between the components, so a business component of the change will not affect the other business group pieces. With this development approach is basically to achieve the open-Closed Principle (OCP), reducing the system's coupling to increase the reusability of the system modules, and to build a scalable, easy to maintain business systems.

    • Analysis of Information System Data Exchange Technology

      2012, 21(4):18-22,40.

      Abstract (2241) HTML (0) PDF 1.03 M (3757) Comment (0) Favorites

      Abstract:Data exchange is a key factor to affect the development of Enterprise Information Management. Its goal is sharing data in the heterogeneous environment (loosely coupled, different data formats, cross-platform, cross-regional distribution environment), to use resources effectively to improve the performance of the entire information system, speed up data flowing between information systems, implement data sharing and integration. Power Enterprise has a large system, its information systems interact frequently, so how to ensure the data exchange between systems convenient, fast, safe, reliable to execute, is an important topic for Power Enterprise to research. In this paper, the objective is to implement the data exchange in the heterogeneous environment, analyze and discuss the existing data exchange technology in detail, and raise the implementation scheme of heterogeneous data exchange base on the actual situation of power enterprise. It has some reference value for power enterprise to build information system data exchange platform .

    • Application of WBS Tree Structure in Scientific Research Project Management

      2012, 21(4):23-26.

      Abstract (1791) HTML (0) PDF 547.35 K (4672) Comment (0) Favorites

      Abstract:Aiming at some questions of structure complexity and long period for big scientific research project management, we design the system of scientific research project management and experimental data analysis, creat Work Breakdown Structure (WBS) by use of project management theory, and define project step by step with tree-shape date structure, and build a platform of clearly management process and information sharing system.

    • ARP Data Analysis System Based on Data Mining

      2012, 21(4):27-30.

      Abstract (1582) HTML (0) PDF 573.03 K (3182) Comment (0) Favorites

      Abstract:Academia Resource Planning project is an information system project to achieve resource planning of Chinese Academy of Sciences. ARP project serves two-level management organizations including CAS and its institutes, integrating and optimizing the business management flow of scientific research programs, human resources, comprehensive finance and scientific research conditions. This paper attempts to analyze large amounts of ARP data based on currently data mining techniques, obtaining valuable information and knowledge to provide information services and decision support to facilitate leaders, managers and researchers, maximizing the effectiveness of ARP system.

    • Strategy of Resource Scheduling and Management in Integrated Desktop Cloud Architecture

      2012, 21(4):31-35.

      Abstract (1746) HTML (0) PDF 1.03 M (4548) Comment (0) Favorites

      Abstract:Desktop Cloud, as the beginning of clouding on operator IT Architecture, has already succeed in small-scale pilot project, however Desktop Cloud, as the project of innovation, will impact on existing technology infrastructure and control systems, and how to protect the User Experience is one of the most important issues in the course of large-scale promotion. This paper, concerning operator task oriented scene, such as businesshall, analysed the shortcomings of traditional architecture, established integrated desktop cloud architecture, and also setUser Experience as the core, optimized the strategy of resource scheduling and management in traditional architecture.

    • Automatic Adjusting Height System of Shearer Drum Based on Predictive Control

      2012, 21(4):36-40.

      Abstract (1633) HTML (0) PDF 493.59 K (3734) Comment (0) Favorites

      Abstract:In order to follow fast roof fluctuating of a face, improve response speed of an adjusting height system of a shearer cutting drum and prevent cutting roof which cause the damage of parts, an automatic adjustment height system of a shearer drum based on predictive control is established with the theory and method of predictive control. In the system, the coal-rock interface is predicted by means of historical data, a displacement of adjustment height cylinder is adjusted in real-time, to make the shearer cutting drum following the coal-rock interface. A simulation model of control system is constructed by the SIMULINK of MATLAB. Simulation results show that height of the shearer cutting drum can be anticipated in the system, the adjustment time is decreased by 0.25 s and overshoot is decreased by 4.8% than a conventional system. The system has sensitive response, small fluctuations and steady working .The increased of sampling point in predictive algorithm have decreased role to fluctuation and overshoot of height of the shearer cutting drum, but adjustment time increased.

    • Part Library System Based on Cloud Manufacturing

      2012, 21(4):41-45.

      Abstract (2131) HTML (0) PDF 835.23 K (3585) Comment (0) Favorites

      Abstract:Thinking about small and medium enterprises cannot afford the fee of establishing parts library, developed parts library system taking cloud manufacturing mode. Describe the business mode of parts library in the mode of cloud manufacturing, determine functions of the system. The architecture Cloud manufacturing includes several layers, taking Force data mode and two ways of separating data to create database, through server assemble and data separate vertically to realize system extend. X3D was used to display parts and EAI to interact dynamic; Class, tags and ontology to organize parts. Developed a system named CMoPL, through using practically finding the system is easy to search parts and friendly interface. The system can help enterprises to advertise and sell parts; can reduce the difficulties of enterprise information.

    • City Gas Pipeline Remote Monitoring System Based on Negative Pressure Wave Method

      2012, 21(4):46-50,54.

      Abstract (1674) HTML (0) PDF 949.85 K (3231) Comment (0) Favorites

      Abstract:As we know the gas pipeline laying is very extensive in city, but for deep buried gas pipeline monitoring has low accuracy, positioning is not accurate and can not be realized fully remote monitoring and other issues. This paper uses negative pressure wave correction algorithm for pipeline leakage efficiently and accurately positioning. System using Daubechies wave wavelet base, using the modified Mallat fast wavelet algorithm for signal noise reduction, improve the system for detecting leakage sensitivity, increased leakage localization accuracy. On this basis, system integration of the wireless communication technology ( GSM ), PLC technology, bus technology, CLinux server and embedded WEB technology and GPS technology, to achieve a natural gas pipeline for remote monitoring, data analysis and processing function.

    • Image Processing System Based on the FrameBuffer

      2012, 21(4):51-54.

      Abstract (1783) HTML (0) PDF 498.74 K (3496) Comment (0) Favorites

      Abstract:FrameBuffer image processing technology can manipulate the LCD screen easily and flexibility, and it achieve the partial refresh flicker-free LCD screen. While it has brought great convenience on the upper application development. In view of this, this paper presents a FrameBuffer-based image processing system development process, and achieve a specific process module function on Mini2440 development board.

    • >研究开发
    • Flood Disaster Emergency Response Level Analysis Based on C4.5 Algorithm

      2012, 21(4):55-58.

      Abstract (1772) HTML (0) PDF 536.96 K (3023) Comment (0) Favorites

      Abstract:Launch the emergency response level effectively is a prerequisite for implementing emergency rescue scientifically and reasonablely when natural disasters occur. At present, emergency response grading standard is based on three emergency response indicators, which launches by Ministry of Civil Affairs. It provides the range of each response level’s indicators, however, this scheme lacks quantization scale for elastic adjustment, according to specific disaster. For the above problem, emergency response level classifier was trained in this paper base on C4.5 algorithm and historical cases. It also obtain a reasonable reduction ratio for the traditional emergency response level. Through experimental results of flood disaster show that this method provides valuable reference to reduction ratio.

    • A Kind of Mobile Robot Trajectory Tracking Control Methods Based on Iterative Learning

      2012, 21(4):59-63.

      Abstract (1875) HTML (0) PDF 615.75 K (3726) Comment (0) Favorites

      Abstract:The Robot iterative learning in some places has an important application. Compared with the traditional types of P or PD iterative learning ,this paper proposes a kind of iterative learning strategies which have a rapid convergence, and then we have a simulation based on the robot kinematics model given. The results show the effectiveness of the strategy.

    • Design and Implementation of SPI Controller for EEPROM Application

      2012, 21(4):64-67.

      Abstract (2342) HTML (0) PDF 755.86 K (4029) Comment (0) Favorites

      Abstract:Synchronous SPI serial bus provides interface standards between microprocessor and other peripherals. But many microprocessor or microcontroller have not SPI interface, resulting in data communications inconvenience, the solution to integrate SPI core into the chip. In view of this, basing of researching SPI bus protocol, the external EEPROM initializes PCI configuration registers, for example, the theory and the way of implementing an SPI controller accessing EEPROM with integrated in the chip are introduced, and the logical block diagram and implementation of each modules and circuit synthesis are presented. The results of modelsim simulation and FPGA verification are correct and meet the design intended purpose.

    • IPv6 Wireless Sensor Network Low Power Consumption Routing Algorithm

      2012, 21(4):68-72.

      Abstract (2108) HTML (0) PDF 604.83 K (3380) Comment (0) Favorites

      Abstract:In order to meet the low power requirement of IPv6 wireless sensor network, this paper adopted the adaptation layer routing. Based on the LOAD Protocol, the paper proposed a simplified on-demand routing algorithm. The algorithm adopts simplified routing control messages, routing table and route request table. In addition, the algorithm simplifies the route discovery process and optimizes the route maintenance mechanism. The simulation results show that this algorithm can reduce the power consumption of the IPv6 wireless sensor network effectively.

    • Case-Based Reasoning in Oil Support Forecasting System

      2012, 21(4):73-76.

      Abstract (1566) HTML (0) PDF 496.29 K (3235) Comment (0) Favorites

      Abstract:Generally, the oil support demand is forecasted through the method of historical data regression analysis, these methods become not so effective when confront with the situations of sudden force action style which are short of the historical oil consumption data. In order to solve this problem, case-based reasoning techniques is introduced ,then the oil support demand cases property weights are calculated by the analytic hierarchy process; Aiming at a universal problem that missing of some case properties, a similarity calculating method called ''twice-calculating'' is proposed which base on the structure comparable degree and the similarity degree. Finally the theory and the method proposed above are simulated and verified by a case of oil support demand forecasting of a tank regiment's military action. The result shows that, without the historical data support, the Case-based Reasoning can still forecast the oil demand accurately.

    • File Format for Gong-Che Notation Musical Score Using MIDI1.0 Protocol

      2012, 21(4):77-81.

      Abstract (1695) HTML (0) PDF 500.00 K (3528) Comment (0) Favorites

      Abstract:This paper presents a file format for Gong-che Notation(GCN, a Chinese musical notation). It firstly describes basic knowledge of GCN, and indicates the differences and similarities between GCN and WMN(Western Music Notation), then we put forward the file format of SMIDI(Similar Musical Instrument Digital Interface) of CGCN(Code of GCN), and a software interface of SMIDI of CGCN. The file format is strong of compatibility, robustness and fault tolerance, it realizes GCN score and its digital musical information synchronous transmission, and effectively solves the ambiguous problem for translating from GCN score to WMN score, and makes the Chinese traditional music works to reuse and communication in digital era.

    • Extension and Implementation of XMPP on Streaming Media Interactive Platform

      2012, 21(4):82-87.

      Abstract (1759) HTML (0) PDF 766.24 K (4041) Comment (0) Favorites

      Abstract:With the rapid development of the Internet technology, based on the interactive video-audio streaming-media studio control platform will become the trend. XMPP protocol meets the requirement of the instant message communication. However, in the case of message filtering and visible to someone while invisible to others are not work well. In the paper, extended the XMPP protocol, the instant message filtering mechanism has been designed and implemented in the artificial or automatic way. The basic elements of the privacy list, the rules of the privacy lists, and the mechanism of visible to the group administer while invisible to others in the group have been designed and implemented. The experimental results have proved the validity and the feasibility of the design.

    • Vehicle-Mounted Locomotive Positioning Sensor in Coal Railway Transportation Signaling Centralized and Locking System

      2012, 21(4):88-91.

      Abstract (1772) HTML (0) PDF 521.58 K (3855) Comment (0) Favorites

      Abstract:To solve the problem of the poor reliability of monitoring locomotive position relying on laying on the track in letter coal mine transport information system. The paper proposes a coal mine transport information system which not relying on track sensors. The system adopts strapdown inertial navigation and designs the coal mine transport information system of motor vehicle's own set of precise positioning. Mainly introduces the algorithms of strapdown inertial navigation and the hardware scheme of vehicle positioning. The experimental test of this system proves a good result.

    • Path Planning of Mobile Robot in Dynamic Nondeterministic Environments

      2012, 21(4):92-98,45.

      Abstract (1669) HTML (0) PDF 871.62 K (5451) Comment (0) Favorites

      Abstract:This paper introduces a new path planning in dynamic nondeterministic environments. We combine POMDP and APF into the new path planning which takes full account of the uncertainty of the information in real world. Based on the APF's advantage of avoiding the expensive computation, it guides the setting of POMDP's rewards value to improve the efficiency of decision making. The result of the simulation shows that the proposed algorithm has higher search efficiency and can make the robot reach the target faster.

    • Attribute Reduction Based on Quantum-Behaved Particle Swarm Optimization with Multi- Swarm Algorithm

      2012, 21(4):99-104.

      Abstract (1570) HTML (0) PDF 528.20 K (3121) Comment (0) Favorites

      Abstract:Requirements of modern industryial development rapidly and reliably achieve the fault diagnosis. Against particle swarm algorithm for the reduction and other issues so easy to fall into local optimum problem,this paper aims to present the MIQPSO Algorithm. The quantum particle swarm algorithm for clustering by the MIQPSO Algorithm, and through vaccination, to guide the direction of the particle evolution towards more optimized, improve the convergence rates and optimization searching ability of the quantum particle swarm. The use of UCI data sets, and by Hu algorithm, particle swarm optimization, quantum particle swarm optimization, multi-species quantum particle swarm algorithm for rough set attribute reduction verification, the results show that the algorithm based on the quantum particle swarm optimization has good reduction effect on the reduction.

    • Web Service Composition-Oriented Complex Context Ontology Model

      2012, 21(4):105-110.

      Abstract (1496) HTML (0) PDF 754.27 K (3197) Comment (0) Favorites

      Abstract:To solve the context describe of quality of Web service in ubiquitous network environment, service comp- osition-oriented complex context ontology model-OWL_S_QoS+ is proposed, which includes user context ontology and service context ontology. User context ontology describe user's environment, user's resource, user's requirements and user's group and so on, these information affects the running of Web service. Web service context ontology is defined Based on OWL_S, which added the running environment requirements of Web service in client and server and the QoS description method with uncertainty.

    • Adaptive Fault Tolerance of Workflow

      2012, 21(4):111-114,104.

      Abstract (1480) HTML (0) PDF 1.21 M (2810) Comment (0) Favorites

      Abstract:This paper designs a fault tolerance model, according to the type of fault, automatically selecting fault tolerance strategy in workflow subsystem. To unrecoverable exception, transaction compensation mechanism is used for exception handling. To recoverable exception, automatic recovery strategy is used for exception handling. Detailed description of the message queue, transaction compensation mechanism, automatic recovery mechanism which are used in the model are presented.

    • Tool for Editing and Visualization of OWL Ontologies

      2012, 21(4):115-119.

      Abstract (1640) HTML (0) PDF 880.68 K (5190) Comment (0) Favorites

      Abstract:With the extensive application of ontology in many fields, it is more and more important to build practical ontologies. However, available editing tool for Chinese ontologies is rare, so efficient ontology development tool which is designed for Chinese is needed. In this paper, we present a tool for editing and Visualization of Chinese ontologies on MVC mode, which reads and writes Chinese ontologies with the protégé-owl API, and implements ontology visualization with prefuse library. The experiments show that the design can edit and realize the visualization of chinese ontologies efficiently, which provides a more convenient platform for chinese ontology researchers.

    • CMMB System Failure Criterion

      2012, 21(4):120-124.

      Abstract (1444) HTML (0) PDF 553.55 K (2850) Comment (0) Favorites

      Abstract:This paper described the system structure of China Mobile Multimedia Broadcasting(CMMB) ,and the experiment testing system and the testing data of the CMMB are researched in detail. Then according to this research ,we have defined the failure criterion for the system of CMMB. Finally, with the combination of the DVB-H system's failure criterion, it is concluded that what is the subjective failure criterion and objective failure criterion in CMMB system.

    • Software Online Registration Solution Based on WCF

      2012, 21(4):125-129.

      Abstract (1505) HTML (0) PDF 493.93 K (3181) Comment (0) Favorites

      Abstract:Computer software online registration is to protect software copyright the main Technology. WCF technology has achieved a cross-platform communication for application software running on different platform provides a unified register online communications. At the same time,. Net encryption technology for the entire registration process to provide a security guarantee. The registration solution is safe, reliable and cost-controlled.

    • Modified DV-Hop Algorithm for Wireless Sensor Network

      2012, 21(4):130-134.

      Abstract (1559) HTML (0) PDF 527.35 K (2839) Comment (0) Favorites

      Abstract:This paper describes the basic principles of DV-Hop algorithm. As for the original DV-Hop algorithm, the number of hops between nodes is too large and some small part of nodes assembled can cause a analogue error, both of which make the positioning accuracy of unknown nodes not high. To overcome these shortcomings, a modified DV-Hop localization algorithm is proposed. The new algorithm modifies the number of hops between nodes by setting the threshold and use the estimate coordinates of beacon nodes and the deviations of actual position as a correction factor to correct positioning results of unknown nodes. It is the proposed algorithm that not only improves the estimation accuracy of jump distance but also reduces the positioning errors and removes the unknown nodes outside the region. The experimental results have shown that the positioning accuracy based on modified algorithm is much better than original one without adding additional hardware, and proved the correctness of the improved algorithm.

    • Generic Topology Matching Method Based on Structured P2P Network

      2012, 21(4):135-138.

      Abstract (1607) HTML (0) PDF 541.32 K (3281) Comment (0) Favorites

      Abstract:Compared with the unstructured P2P networks, structured P2P networks have good expansibility and robustness. But structured P2P overlay network is directly based on logic network, not too much above the underlying physical network topology structure, which causes a serious topology mismatching between logical topology structure and physical topology structure. About the question,this paper proposed a protocol-independent topology matching method,by combining the existing beacons node, adaptive matching algorithm with IP distribution strategy to construct the initial topological structure, and by optimizing node switching to maintenance the network topology. Simulation experiments show that the algorithm improve the matching degree of the network topology, and meanwhile with lower traffic cost.

    • >实用案例
    • Domain Model in Data Exchange Management System

      2012, 21(4):139-142.

      Abstract (1503) HTML (0) PDF 465.40 K (3224) Comment (0) Favorites

      Abstract:Liao River Basin Water Environmental Management System is wide in geographic distribution. It has multi-level, provincial and municipal districts of data between nodes need to transmit and exchange. Liao River Basin Water Environmental Management Information System is involved in many departments. The multi-node need data transmission and exchange. In order to solve such a large system of complex exchange, design and implement the domain model. The overall structure of the model of domain and each element is discussed, and the key module-domain identification module, trust models and cross-domain communication is introduced emphatically.

    • Product Quality Management System

      2012, 21(4):143-146.

      Abstract (1623) HTML (0) PDF 686.13 K (3004) Comment (0) Favorites

      Abstract:In order to solve the existing problems of product quality management work and make the implementation of product quality management system more efficient, easier to manage, this paper introduces a set of corporate information technology scheme of product quality management. With the object oriented analysis and design method, the model was built for the system with UML concept and view and it especially described the development process of using use case diagram, class diagram and sequence diagram. Finally, the system was implemented based on B/S architecture.

    • Application of Proxy Patterns to Data Exchange Resource Scheduling

      2012, 21(4):147-151.

      Abstract (1571) HTML (0) PDF 393.38 K (3072) Comment (0) Favorites

      Abstract:In the design of data_exchange ETL, the problem of Resource Scheduling influence the whole system's efficiency directly. So it is very important to write an efficient, easy-to-maintenance, and scalability system. There are resources to block in the case of frequent idle threads in many other scheduling systems. Always deployment of resources will increase a great deal of trouble to programmers. Because of software coupling, small changes will affect many parts of system. The small change will affect a lot of parts. This article uses the proxy pattern, the factory pattern to be applied to resource scheduling which reduced the coupling of software. We established a strong maintainability and scalability, the implementation of efficient scheduling system.

    • Design of New Comprehensive Protection Controller for Mine Combined Switch

      2012, 21(4):152-155,119.

      Abstract (1497) HTML (0) PDF 883.83 K (3695) Comment (0) Favorites

      Abstract:According to the present problems of bad performance of anti-interference and difficult maintenance exited in our mine combined switch, a design scheme of new comprehensive protection controller of dual-circuits mine combined switch based on PLC is proposed in this paper. This comprehensive protection controller uses the Germany Siemens s7-200 PLC as central control unit, though the hardware design and software programming can achieve protections of short circuit, overload, broken phase, over voltage, earth leakage interlock. Meanwhile, human-machine interface uses WeinviewMT6070iH all Chinese LCD touch screen to display, concise intuitively and easy operation. The result of the experiment shows that the controller of all kinds of protective functions can work accurately and quickly, ensures the whole equipment work safety, stability and anti-interference ability.

    • >应用技术
    • Improved Algorithm Based on LSB Image Information Hiding

      2012, 21(4):156-160.

      Abstract (1816) HTML (0) PDF 577.05 K (6286) Comment (0) Favorites

      Abstract:The LSB is the traditional information hiding methods, At first, this paper Presented and analyzed its principle. Then elaborated the principles of image scrambling technology . On his basis, we proposed a new image information hiding algorithm, the experiment and analysis results show that the algorithm is simple, having a good visual masking , high information hiding capacity and good security.

    • Application of FUZZY and AHP Integrated to Risk Assessment of Software Development Projects

      2012, 21(4):161-164.

      Abstract (1715) HTML (0) PDF 516.23 K (3576) Comment (0) Favorites

      Abstract:It summarizes several common risks in the software development projects, on this basis, through the integration of AHP and Fuzzy to design evaluation index system of risks in software development projects, and the use of Delphi method, so that more experts on the various indicators of empowerment to derive the weight of each indicator, then got the fuzzy evaluation matrix through fuzzy mapping from U to V. Finally, according to FUZZY theory and fuzzy matrix synthesis operations carried out two risk assessments on software development projects, in order to build a risk assessment process and model of software development projects under the integrated approach. The conclusion references a practical value of the managers in software development projects.

    • Forecast of Oilfield Indexes Based on Fuzzy Neural Networks and Particle Swarm Optimization

      2012, 21(4):165-168.

      Abstract (1597) HTML (0) PDF 650.47 K (3218) Comment (0) Favorites

      Abstract:Aiming at the forecast of oilfield development indexes, a fuzzy neural networks model is proposed that includes input layer, fuzzification layer, rules layer, and output layer. The Gauss function is applied in fuzzification layer, and each node in rules layer corresponds to a fuzzy logic rule. The adjustable parameters of proposed model include the fuzzy set parameters and the weight value of output layer. For determining these parameters, an improved quantum particle swarm optimization is presented. With forecast of moisture content as an example, the experimental results show that this method is effective and feasible.

    • Application of Zero-Copy Technology to Network Analysis System

      2012, 21(4):169-173.

      Abstract (2101) HTML (0) PDF 600.54 K (4162) Comment (0) Favorites

      Abstract:Aiming at the performance of packet capture, this paper realizes a new protocol family dedicated to packet capture called PF_ZEROCOPY. Based on Zero-Copy and memory sharing, PF_ZEROCOPY transfers the packet from network card to the memory that user program can access directly by DMA, so that bypasses network protocols, and reduces the times of data copy. By using the descriptor ring of DMA buffer, network card and user program can work without collision to access the shared memory. PF_ZEROCOPY is easy to use and transplant by packaged into protocol family. Experimental results indicate that the throughput of PF_ZEROCOPY for random size messages is above 900Mb/s, and PF_ZEROCOPY surpasses libpcap's in performance.

    • Continued Improved Software Configuration Management Based on UCM

      2012, 21(4):174-178.

      Abstract (1587) HTML (0) PDF 499.70 K (2918) Comment (0) Favorites

      Abstract:This article describes the characteristics of software improved continually and configuration management needs, and then set out to change based on the UCM(Unified Change Management) configuration management principles and methods, and finally given the the realization of UCM for Software improved continually Configuration Management.

    • Spherical Simplex UDUT UKF Algorithm for Projectile's Attitude Determination

      2012, 21(4):179-183.

      Abstract (2040) HTML (0) PDF 542.62 K (3616) Comment (0) Favorites

      Abstract:Considering the performance of short-time working, inertial flight and high impulse of launch for projectile, a spherical simplex UDUT unscented Kalman filter (SS-UDUTUKF) is proposed to estimate the state of attitude determination system. According to the special motional rule of projectile, only use three low-cost MEMS accelerometers as inertial measurement unit to measure the specific force, and construct the linear state equation and nonlinear measurement equation of system. Use the UDUT UKF to estimate the state of nonlinear system, which effectively enhances the stability of filter and restrains the divergence of filter. The SS-UDUTUKF algorithm has good numerical stability, avoids losing the non-negative definiteness and symmetry of estimation covariance and effectively restrains the divergence of filter resultingly from rounding error of calculation. The experimental results in a three-axis flight test rotary table show that the proposed algorithm obtains the good precision of estimation and satisfies the request of real-time response of projectile's attitude determination.

    • Application of AHP and Entropy to the Case Based Reasoning of Flood Disasters

      2012, 21(4):184-188.

      Abstract (1592) HTML (0) PDF 550.83 K (3595) Comment (0) Favorites

      Abstract:The key factor that affects the case retrieval matching in Case-based reasoning is the distribution and determination of characteristic attribute weights. In this paper, AHP and Entropy was applied in the Case-based reasoning on flood disaster to estimate the need for disaster relief food rations. AHP was used to analyze and determine the variety of factors which lead to construct a reasonable hierarchy, and get the priority of attribute weights through combining the information of subjective judgments. On this basis, using the entropy technology to modify the priority, and ensure the objectivity of characteristic attribute weights to make the preferred cases fit the reality better. Experimental results show that this method can be applied to the case-based reasoning of floods disaster, and through this method, the best case for the target case can be selected from a number of historical cases. In this way, the scientific estimation of the needs for disaster relief rations can be guaranteed.

    • Speaker Recognition Based on Time-Frequency Distribution and MFCC

      2012, 21(4):189-192,178.

      Abstract (2034) HTML (0) PDF 851.49 K (4030) Comment (0) Favorites

      Abstract:Because MFCC can't reflect the dynamic characteristics of speech signal and their own non-stationary, a feature extraction method by combining time-frequency distribution with MFCC is proposed. First get time-frequency distribution of speech signal, and convert time-frequency domain into frequency domain, then extract MFCC+MFCC as characteristic parameters. Finally speaker recognition uses the support vector machine. The simulation experiment compares recognition performance when MFCC and MFCC+MFCC are respectively as characteristic parameters by speech signal and all kinds of time-frequency distribution. Results show that the speaker recognition performance using MFCC+MFCC based on the CWD time-frequency distribution can be improved to 95.7%.

    • Predictive Application of Gear Heat Treatment Based on HJPSO-BP Algorithm

      2012, 21(4):193-197.

      Abstract (1710) HTML (0) PDF 543.88 K (2945) Comment (0) Favorites

      Abstract:The neural network model based on Hooke-Jeeves Particle Swarm Optimization(HJPSO) is proposed in this paper for overcoming some shortcomings of BP neural network that is slow at the convergence rate and easy to trap in local minimum.This improved model has utilized prediction of gear heat treatment.The experimental data shows the effect of the improved BP neural model is much better than standard BP neural network in term of the predicting ability and stability.

    • Task Model in Data Exchange System Based on Meta Data

      2012, 21(4):198-201.

      Abstract (2007) HTML (0) PDF 564.73 K (3361) Comment (0) Favorites

      Abstract:ETL containing three parts of extracting ,transforming, loading is one core of building the Data Warehouse. For the sake of heterogeneous data source integration, this paper puts forwards a model of the data exchange system based on ETL Meta. Further, a task designing model and a task designing model are raised in in this paper. Last, the article recommends a main algorithm and the designing model in the data exchange system.

    • Information Fusion Method Based on Proof Theory and Fuzzy Set

      2012, 21(4):202-206.

      Abstract (1660) HTML (0) PDF 496.67 K (3962) Comment (0) Favorites

      Abstract:Focused on the problem that it is difficult to set up the basic probability assignment function in the evidence theory and the calculation of degree of mutual support is absolute, an information fusion method based on evidence theory and fuzzy set(FSB-DS) is proposed. The fuzzy support range and the fuzzy support probability is obtained from the correlation function., Then by using the membership function, the reliability of information provide by each sensor is gained. and then transform support and credibility into basic probability assignment function, and finally the DS evidence combination. The simulation results shows that the fusion results have higer precision and reliability compared with other methods.

    • Knowledge Representation Based on OWL for Emergency Response in the Field of Natural Disasters

      2012, 21(4):207-211.

      Abstract (1460) HTML (0) PDF 527.66 K (3405) Comment (0) Favorites

      Abstract:This paper uses ontology, OWL(Ontology Web Language) and related technologies on semantic web, and through using first-order predicate logic and production knowledge representation to specifically describe emergency response in the earthquake. The research provides a reference to achieve that knowledge representation and sharing for emergency response in the field of natural disasters.

    • Application of Hybrid PSO to Least Mean Square Error Regulator

      2012, 21(4):212-215.

      Abstract (1894) HTML (0) PDF 561.69 K (2902) Comment (0) Favorites

      Abstract:The least mean square error regulator is adopted to improve performance of the dead beat control system as one method in common use, while selection of the regulator parameter is very important. This paper designs the particle swarm optimization algorithm based on simulated annealing to optimizing parameter in the course of defining the least mean square error regulator, which is used in simulating the concrete system. The results show that Hybrid PSO can get better optimization effect than SA or PSO single used, compared with the method of determining parameters in the relevant literature,while the overshoot and settling time of the system are improved obviously, which validates the effectiveness of the algorithm put forward.

    • >经验交流
    • Analysis and Improvement of Kerberos Identity Authentication Protocol

      2012, 21(4):216-219.

      Abstract (1986) HTML (0) PDF 470.49 K (4538) Comment (0) Favorites

      Abstract:This paper discusses Kerberos protocol and its security in detail, proposes an improved authentication model according to its limitations as well. This model aims at solving the problems such as password guess attack , replay attack and key storage management by using lightweight ticket and hybrid cryptosystem and USBKey two-factor authentication, which is safe and easy to realize.

    • Non-Complete Topological Analysis in Image-Based 3D Building Reconstruction

      2012, 21(4):220-222,151.

      Abstract (1632) HTML (0) PDF 683.94 K (2723) Comment (0) Favorites

      Abstract:3D reconstruction from single view is a very difficult problem in computer vision and computer graphics. Much different from method using presently, we proposed a feasible and efficient method of 3D building reconstruction method by using non-complete topological analysis in this paper, which rapidly achieves the process of recognizing architectures based one or two images. Firstly, the outline of visible parts of architectures is extracted from image and is analyzed to get the incomplete topology of architectures. Next, the resulted topology will be divided into different primitive geometries, and these geometries are used to match models in databases finally. Experiments show that our method VS SSDA has better effectiveness.

    • Two-Tank Level System Decoupling Control Based on THJS-3 Experiment Device

      2012, 21(4):223-225,124.

      Abstract (1608) HTML (0) PDF 832.35 K (3527) Comment (0) Favorites

      Abstract:Description of the three tank liquid-level control system components and the MCGS software. The system is based on the THJS-3 advanced process control device, the application of the diagonal recursive neural network PID decoupling control algorithm and MCGS software in control interface configuration and operation. The results declare that the decoupling control system has good steady state performance and dynamic performance.The decoupling control in MCGS software has strong application prospect.

    • Software for Detection Guiding Based on Embedded System

      2012, 21(4):226-228.

      Abstract (1939) HTML (0) PDF 478.33 K (3120) Comment (0) Favorites

      Abstract:The paper proposes a kind of detection guiding technique for solving some problems which possible can lead to the device's abnormal starting in case that some blocks of operating system files have been damaged, EEPROM hardware goes wrong temporarily and software runes out etc. Thus the technique improved embedded system safety performance and reliable. This paper has certain reference value for related fields of research and development personnel.

    • Data Transit Method in Rail Communication System Based on WLAN

      2012, 21(4):229-233.

      Abstract (1656) HTML (0) PDF 588.64 K (3233) Comment (0) Favorites

      Abstract:Metro wireless communication systems is an important part of the integrated rail traffic control system. The existing metro wireless communication systems is based on WLAN technology, due to the train nodes must be frequently switch between ground wireless access points. Wireless link is needed to establish new connections frequently, so network routing has also to be frequent changed, which will affect the real-time transmission of data. Which will make the video incoherent and the appearance of mosaic. This paper describes a technology using raw socket to encapsulate the date which sending to the STA (Station, mobile station) in the AP (Access Point, mobile access point)side, this package contains the destination STA MAC address and destination server IP address. By using this technology we realize the data transfer in the condition of train STA frequent switching between ground wireless access points. Thus reducing the switching time.

    • Improved Algorithm for Minimizing Pattern Tree Queries of XML

      2012, 21(4):234-237.

      Abstract (1602) HTML (0) PDF 571.13 K (2834) Comment (0) Favorites

      Abstract:At present, Minimization of Pattern Tree Queries, becomes the key factor that affects query processing performance of XML data. An improved algorithm is proposed with structural index of XML, based on analyzing the existing methods of Minimization of Pattern Tree Queries. It's effective to solve that grammar level optimization can't effectively remove redundant nodes of the defect in the common sense, so as to improve the efficiency of the inquiry. Experimental results show the effectiveness and accuracy of the proposed minimization algorithm.

    • Using Genetic Algorithms to Improve the Initial Weights of SOM Network in the Musical Instrument Classification

      2012, 21(4):238-240.

      Abstract (1442) HTML (0) PDF 408.40 K (3254) Comment (0) Favorites

      Abstract:For the problem of excessive training and easy to fall into local minimum in SOM network in the classification caused by the randomness of its initial weight, using genetic algorithm to improve network initial weights in instrument classification is proposed. Simulation experiments extract 12-order MFCC coefficients of 10 different kinds of musical instruments. Then use the genetic algorithm to calculate the fitness value of each order in each instrument, and use the fitness value as the network initial weights. Simulation results show that: the way of using genetic algorithms to improve the initial weights of SOM network in the musical instrument classification is effective and the classification accuracy can reach 83.51%.

    • Application of Python to the Scanner Driver Automation Build

      2012, 21(4):241-243,206.

      Abstract (1983) HTML (0) PDF 760.77 K (3862) Comment (0) Favorites

      Abstract:As the complexity of the scanner driver, it is cumbersome to build and package the scanner driver.The paper takes a practical scanner driver as the example to describe the solution of automation build by using Python. This solution can promote the degree of automation greatly,at the same time it can ensure the speed and quality of scanner driver release.

    • The Study of High-speed Denoising Algorithm for Motion Images in Films

      2012, 21(4):244-246.

      Abstract (1486) HTML (0) PDF 453.02 K (3009) Comment (0) Favorites

      Abstract:The object of the study is the motion images in the old films. After digitization, the motion images with dynamic noise and linear scratches were retrieved and repaired in high-speed. Based on the traditional block matching technology, the algorithm has been improved. Which means to achieve the fast and accurate treatment effect, the average displacement algorithm has been chosen to infer the object’s pixel displacement, amend the position of retrieve center. The experiment results show that the approach has improved the processing speed, basically realized real-time processing,without reducing the noise repair quality.

    • Visualization Design of Mathematical Experiment for Task Assignments Problem Based on Internet

      2012, 21(4):247-249.

      Abstract (1548) HTML (0) PDF 423.98 K (2959) Comment (0) Favorites

      Abstract:Visualizing design of mathematical experiment for task assignments problem is studied in this paper. For task assignments problem with as well as without constraints, the study completed the design of algorithm by making use of Microsoft visual J++6.0 as experimental development platform. Java language and applet embeded in Web page are employed to realize the development of visualization. The software can display the optimal task assignments and the satisfaction rate according to the user's input. The developed system can provide a study platform with functions of visualization and interaction for user to study the task assignments problem.

    • Key-Nodes Mining Algorithm Based on Communities

      2012, 21(4):250-253,197.

      Abstract (2101) HTML (0) PDF 866.20 K (4020) Comment (0) Favorites

      Abstract:When mining the key-nodes from large-scale networks, the traditional methods are poor efficiency. To address this defect, a new algorithm, which based on communities, is presented for mining the key-nodes. First, it improved the community detection algorithms, and then put forward an algorithm based on degree centrality of the node for mining the key-nodes. The experimental results show that when applying the new algorithm to mine the key-nodes from communities, not only the influence degree of mining is guaranteed, but also the efficiency is improved significantly.

    • >专论·综述
    • Layout Comparison and Optimal Design of the Standard Keyboard

      2012, 21(4):254-258,87.

      Abstract (1912) HTML (0) PDF 1.02 M (5645) Comment (0) Favorites

      Abstract:As one of the basic human interface devices, the keyboard has a versatile application in many fields. To standard keyboard, the commonly used Qwerty keyboard layout is not designed for improving work efficiency. The keyboard entry is a complicated human engineering problem, which varies with the factors such as typists' habits, usability divergence of fingers and different text information. By decomposing the keyboard entry process, assuming parameters about fingers and analyzing text information, the paper defines the Distance Matrix and the Text Matrix to build a more objective model for the layout comparison and optimal design of the standard keyboard. Comparison of the existent keyboard layouts is made and a new efficient layout for inputting Pinyin-based Chinese is established.

    • >Survey
    • Overview of the Interoperability of Linux and Windows

      2012, 21(4):259-263.

      Abstract (1615) HTML (0) PDF 343.95 K (5862) Comment (0) Favorites

      Abstract:Aiming at the problems of interoperability between Linux and Windows in desktop domain, network domain and embedded domain, solutions are systematically illustrated in this paper. In desktop domain, the two operating systems can mutually run programs, can mutually deal with data files, and can mutually access file systems. In network domain, the two systems can support the shared operations of resources and services between them under the network environment by adopting the same network protocols. In embedded domain, by adopting the technologies such as virtualization and code refactoring, the two systems can mutually support the cross development of application softwares in local system, mutually support the transplanting of application softwares to local system.

    • Protection Technology for Software Under the Windows Platform

      2012, 21(4):264-267.

      Abstract (1448) HTML (0) PDF 424.07 K (3649) Comment (0) Favorites

      Abstract:To improve the ability of protection technology for software include two aspect: enhance the peotection for sensity file and process itself. This paper presents three scheme for file protect in common use, as well as the technology for peocess protect, and then analyses their advantages and disadvantages.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063