2012, 21(8):1-5.
Abstract:Based on the analysis and research of information needs about the distribution and electricity sectors,we achieve the real-time monitoring and decision analysis of smart meters and distribution network terminal equipment. By means of smart meters and other electronic terminal, the user and the network companies forming interactive network and real-time connection, it can reflect the energy flow with the flow of information to read power data in real-time, high-speed and two-way, and realize the power flow and energy consumption information in real time visualization.
2012, 21(8):6-9,26.
Abstract:Wireless Sensor Networks which spread widely, and with the expansion of WSNs make it difficult to store the collecting massive data. Considering large number of sensors which is large number and widespread, this paper designs layered distributed storage solution, Hbase, which is a project of Hadoop, is a distributed database, providing real-time read/write random-access large-scale data sets,high scalable and high available storing service. This paper will describe how to store the massive data by two layer storage architecture to store sensor data from different regions and meta data of those sensors. Experiments show that this system with high scalability, storage and query efficiency can solve the massive sensor data storage.
2012, 21(8):10-14.
Abstract:In this paper, a scheme of message signature and encryption based on Simple Object Access Protocol (SOAP) is designed for the intelligent decision-making system of real estate to solve communication security issues when interacting data with other heterogeneous systems. Referring to the national recommendations upon the information security area in the e-government implementing process and considering both efficiency and security of communication procedures between two endpoints, we screened and integrated various security methods, then implemented a security platform with C# and WSE3.0. The experiment shows its good safety, reliability, flexibility, manageability, and scalability.
ZHAO Rui-Ke , HU De-Min , ZHU Juan
2012, 21(8):15-18.
Abstract:Based on the Company’s detailed requirements, a suit of Product Packaging Design Data Management Systems answering for the actual apply conditions and operations has been developed. Based on product data base of the original PDM, combined with WEB technology, based on EXCEL VBA development of methods, constructs a product packaging design data management system. The system with a friendly interface, running stably, can complete the functions such as Packaging Box automatic design,compiling and querying of Packaging file, users management and so on.
XU Nan-Shan , CHEN Liang , LIU Shu-Mei
2012, 21(8):19-22.
Abstract:In the process of program production in TV station, the material flow mainly relies on simple file sharing. It is complicated and difficult to manage. To solve these problems,an FTP-based material flowing system has been proposed. According to the characteristics of working flow in TV station, special file organization and access management strategy are developed. In the automatic file packaging function, compatible interface has been provided to different file formats. Through the deployment, the feasibility and usability are verified.
YIN Li-Feng , WU Jian , MA Bin
2012, 21(8):23-26.
Abstract:Aiming at wireless network attacks such as DoS attacks,rouge STA, rouge AP,WarDriving attacks and bruteforce attacks, a Lightweight Intrusion Detection System for WLAN is implemented by combining the misuse detection and anomaly detection. In this system,the user can define attack rule set, authorization AP/STA list, illegal AP/STA list, and the sensitivity and the threshold value of detection can adjust according to the circumstance and user requirement. The test shows that this system has a better detecting effect than other WLAN intrusion detection in market.
DAI Qian-Kun , ZHONG Liang-Wei , QU Nian-Kai
2012, 21(8):27-31.
Abstract:An important section of an enterprise’s CIMS is to integrate manufacturing and management information of a workshop firmly, which demands the rapid information passing and resources sharing in different departments, and workshop management to improve the work rate and lower the cost. This paper mainly mentions a solution of product structure and material management system based on browser/server (B/S) and Microsoft .NET framework system, which resolves the problem of Product data management is complicated,data are not uniform among the various departments, as well as existing data are not re-use and other issues. Its structure, functions and key developing approaches are focused in this paper.
2012, 21(8):32-34,14.
Abstract:Shenzhen City “graphic in one” digital real estate system repair exploratory measurements using topographic maps and digital property mapping results, the use of centralized data management, the establishment of building spatial database, real estate and building 3D mapping database, the database,while creating Web-based building “integrated graphics” comprehensive real estate information inquiry system, to achieve “an attempt to control room” to achieve the ground-floor-room information integration management, trying to provide the public with the Real Estate Information powerful integrated query service, the public can be more convenient and intuitive understanding of the housing details.
2012, 21(8):35-38.
Abstract:School bus accidents happened frequently, so it’s very important to ensure the school bus running safety. The Internet of Things technology is a new technology developing in the world, it’s applicated maturely in vehicle safety management. This article provided a new thought of solving the problem of school bus safety, mainly introduced from the technical angle to increase school bus safety management level through the RFID, GPS and GIS technology. The author designed the function structure of school bus safety management system,divided the bus-platform,managementplatform and regulator-platform,listed main functions of each subsystem. These make construct school bus safety management system feasible.
SU Wei-Jia , TANG Yu , YANG Jing
2012, 21(8):39-42.
Abstract:This paper introduced a new data collection system based on android platform,and achieved USB communication between Android and LPC2142. It describes the development process of the android USB application, and on the basis implements USB communication between Android system and AMR platform. It is the latest application development based on revenue of mobile terminal Android. The front-end uses LPC2142 A/D interface to collect data and sent it to back-end through USB data wire. The back-end use the USB interface which is based on Android 3.1 platform to receive data and show the wave on the Android Tablet PC. So this design has wide application prospect.
SUN Shou-Qun , CHEN Xing , LIU Gang
2012, 21(8):43-47,62.
Abstract:The solutions of quality management system were proposed based on the integration of ERP/BPM system, according to the defects of traditional ERP in manufacturing quality management. Quality management information system model was constructed based on ERP and BPM integration under researching ERP quality management module and BPM process management. Combining with the implementation project in enterprise, methods and steps of ERP and BPM integration were elaborated detailedly, and verified that the system had feasibility and advantages.
2012, 21(8):48-51.
Abstract:As the WSN nodes are limited in energy, and energy supplement is very complex, so how to use energy of the wireless node efficiently is the primary challenge faced by the WSN. In order to solve the problem proposed above, by analyzing the characteristics of WSN and its energy loss model, we propose a cross-layer energy-efficient scheduling algorithm. Simulation results are computed and the results are shown. The algorithm can save energy consumption efficiently and reduce data transmission delay. At the same time, the algorithm is able to prolong the lifetime of WSN.
2012, 21(8):52-56.
Abstract:The decompilation decode binary instructions and data into high level source code against compilation. It plays an important part in finding malware and discovering software vulnerability. But the recognition of template library functions is very difficult in decompilation of object-oriented language. This paper analyzes the existing algorithm of library function recognition and aims at the key problem of feature conflicts to introduce an improved algorithm based on feature-recognition. This algorithm can store much more library function informations to avoid feature conflicts and has been verified in some experiments about C++ STL recognition.
SHEN Zhen-Jing , ZHENG Pai , LI Jia-Ji
2012, 21(8):57-62.
Abstract:Traditional Genetic Algorithm for solving Job Shop Scheduling Problems has some shortcomings such as slow convergence and easy to bring immature convergence. On the basis of Virus Evolutionary Genetic Algorithm (VEGA) and Genetic Algorithm with Catastrophe factor, an improved Virus Evolutionary Genetic Algorithm with Catastrophe factor (IVEGA-C) was proposed. IVEGA-C adds virus infection operation and catastrophe operation to the basic structure of traditional Genetic Algorithm. Virus infection operation passes the evolutionary information between the populations in the same generation and an improved extinction operation was used as the strategy of catastrophe. The improved algorithm speeded up the convergence rate of the Genetic algorithm, avoided the premature phenomena and to fall into local optimal scheduling solution. The simulation results verify that IVEGA-C on solving the Job Shop Scheduling Problems is better than traditional Genetic Algorithm and VEGA. At last we give an example of using this algorithm to solve scheduling problems in our real-world.
YANG Hui-Tao , SHI Xiu-Hua , LIU Fei-Fei , ZHOU Yang
2012, 21(8):63-68,38.
Abstract:The underwater gliding vehicle is a kind of new autonomous underwater robot, which is based on the principle of gliding without plugin propulsion system, and relies on the built-in actuators to adjust the center of gravity and net buoyancy to control its motion. By the net buoyancy forced on the lifting wing, it gets a forward power when there is an attack angle. The underwater vehicle moves on forward along the jagged path in the setted depth. This paper analyses the gliding underwater vehicle motion, builds the gliding motion mathematical model, and calculates the relationship between the movement parameters and the variables. It also uses MATLAB/SIMULINK to make the underwater vehicle movement model and runs the simulation.
2012, 21(8):69-72,31.
Abstract:This paper illuminates the intrusion detection system monitoring process and puts forward that in intrusion detection methods of analysis by the iterative AdaBoost framework, in each iteration, the algorithm produces a belt of the weight values classifier, the iterative end into multiple classifier. Finally, the classifier are weighted joint to get a higher rate of classifier, and hence overcome classification algorithm USES a single produced to meet the requirements of the recognition system defect, so as to improve the system to attack rate,reduce false alarm rate of purpose, in KDD99 were selected as the experimental data. The simulation experiments show that the method is accurate in early warning detection.
2012, 21(8):73-75.
Abstract:For now the positioning algorithm is usually two-dimensional form. Based on the TDOA /AOA algorithm which is on the basis of extended Kalman filter, we derive the three-dimensional form of the algorithm. In this article, three quantities including azimuth, pitch angle, TDOA constructes a model that in line with the extended Kalman filter. Thus the three coordinate components can be obtained, and ultimately get the location of the mobile base station estimates. We simulated the tracking trajectory of the algorithm, and deduced the parameters Cramer-Rao Low Bound (CRLB).
2012, 21(8):76-79,84.
Abstract:To improve the efficiency of particle swarm optimization, a quantum particle swarm optimization algorithm is proposed on the basis of analyzing the search process of particle swarm optimization algorithm. In the proposed algorithm, particles are endoded by qubits described on the Bloch sphere, each particle occupy three locations of the search space, and each location represents a optimization solution. By employing the search method of general PSO to adjust the two parameters of qubit, the qubits rotation are performed on the Bloch sphere, which can simultaneously update three loations occupied by a qubit and quickly approach the global optimal solution. The experimental results of standard test function extreme optimization and fuzzy controller parameters optimization show that the proposed algorithm is superior to other similar algorithm in optimization ability and optimization efficiency.
CHEN Zhong-Hua , KANG Li-Qian , WANG Yang
2012, 21(8):80-84.
Abstract:The PI controller directly affects the speed regulating performance of the speed DC drive current double closed-loop system, the paper makes use of MATLAB to built two speed DC drive current double closed-loop control system simulation models respectively, one of them consists of conventional PI controller and the other one consists of fuzzy PI controller, and the line of the simulation. Simulation results show that the fuzzy PI controller is superior to the conventional PI controller in dynamic stability performance and speed tracking power, and the fuzzy PI controller has strong robustness to external disturbance.
2012, 21(8):85-88,104.
Abstract:A novel method that combines neural net with predictive control is proposed in this paper. Firstly, the neural net is employed to construct the nonlinear systems, the original nonlinear systems are wrapped by the linear timevarying systems described using the polyhedron which is formatted by the maximum or minimum values of the transition function in the neural net. Then,the multiple parametric programming based on combination of the on-line and off-line is utilized to obtain the explicit model predictive control systems. Finally,an example is presented to illustrate the effectiveness of our method. The results show that the developed method can describe the nonlinear system effectively, and improve the control performance.
2012, 21(8):89-93.
Abstract:Web extensions for security consistency have a comprehensive impact. It defines the effect of security model capacity in the Web Attacker, Network Attacker and Gadget Attacker. Web extension model proposed the concept of a Web browser, server, protocol type, properties and methods. Finally, it studied using the extended model intruder server redirects the request to cross-origin resource sharing security mechanisms, and the same-origin site refer validation security mechanism, analysis of the vulnerability of the two mechanisms, and proposes ignore redirect request and suppress all outgoing refer solutions.
YANG Cheng-Qun , CHEN Shu-Ping , TAN Hong-Hua
2012, 21(8):94-98.
Abstract:OSGi is a service-oriented framework based on components, it is very useful to configurate dynamic reorganizable real-time system that the service components can remotely be installed, uninstalled and updated at run-time. But it is challenging the relation attributes are unknown until the services reach. On the basis of execution time service and admission control, this article proposed a dynamic hierarchical scheduling strategy (DHSS) which computs and assigns dynamically the rights of components and constituts a scheduling list. DHSS limited the running time of components by time slice circular scheduling and met the requirement of some especial real-time application by super-component which won’t be interrupted. Finally experimental results and practical application analysis proves the feasibility of the DHSS on the SOA.
2012, 21(8):99-104.
Abstract:For a class of second-order multi-agent systems with a fixed and undirected communication topology and uniform delays systems, linear consensus protocols with time-delayed communications are adopted, the stability conditions are analysised. As the order of system is very high, the stability analysis of the characteristic equation becomes intractable. This paper proposes a new analysis approach via decomposing the characteristic equation of system into a set of factors and using the CTCR method, derives the communication delay of each eigenvalue, and obtains the accurate upper bound of delay of the system. We also explore the stability region generated through the protocol. The results show that in a case of a spanning tree, when time delay is less than the decision value, the stability of the system can be achieved. Finally, numerical simulation shows the effectiveness of the results.
JIANG Ke , HAO Wei-Dong , KAN Dan-Qin , LIN Chuan
2012, 21(8):105-109,217.
Abstract:DT grid is a powerful algorithm use for analyze discrete points in the mathematics. So that, DT grid is use for solve the problem of the geology but now it is use for solve the problem of fingerprint too. In this paper, we make some improve based on the traditional DT grid. Although this algorithm is not better than the traditional DT grid at the accuracy of the distinguish, but it uses less time because it uses the feature of fingerprint is not easy to change. If it use in the big database, the superiority of this algorithm is very obvious.
JIA Mo , YE Hai-Jian , CUI Li-Meng
2012, 21(8):110-113,122.
Abstract:Detection of solder paste by image processing is a new approach in the solder paste inspection. image quality is one of the keys to ensure the accuracy of image detection. The image acquisition is a vital role for the protection of image quality. It’s also a critical step in a series of processing steps to eventually obtain images useful information. This paper focuses on three main parameters of focal length, exposure and gain affecting the quality of solder paste image acquisition. The experimental demonstration of the reasonable range of the three main parameters of the focus, exposure and gain. As well as the functional relationship between shutter speed and gain. Providing a basis for the adjustment of solder paste image acquisition paramenters, but also laid the foundation for the follow-up study for parameters adjustment automatically of the paste image acquisition.
DENG Kai-Ying , DENG Jing-Wei , LI Ying-Xing
2012, 21(8):114-117.
Abstract:In this paper, we use master equation and continuum theory approach to investigate a number of problems in complex networks. The paper improves some extending to BA scale-free network model's algorithm. This paper provided a kind of scale-free networks model attractive factor by random, which analyzed degree distribution as well as the range of significant influence to degree distribution. The results of computer simulation were in concordance with the theoretical analysis. It is a scale-free networks. The new model could reflect some important characters of actual networks well and has application value.
2012, 21(8):118-122.
Abstract:Thinking about the situation of small and medium enterprises(SMEs) with the character of small scale, low ability to take risk, short of talent, this paper introduces thought and technology into SME cooperation. Technologies related Web2.0 and current situation of SMEs are presented and the applying mode in enterprises collaboration is put forward. It researched technology for self-organization and standard for evaluation, and Witkey mode for mission outsourcing, and SNS for collaborating between enterprises. Web2.0 will do a lot to solve the problems faced SMEs.
FENG Jin-Mei , LU Zhi-Mao , CHEN Chun-Kai
2012, 21(8):123-126,135.
Abstract:The minimum distance classification algorithm and the nearest neighbor classification algorithm are the simplest, most rapid and most effective classification methods, and they are more sensitive to the noise. But to the training samples in few or the training samples that are far from the cluster center, the classification results is poor. To solve this problem, this paper proposes a classification model based on the mean update (MU), by expanding the training sample and updating the mean center to improve the classification results of the test data; and on this basis, it proposes the MU-based minimum distance (MU-MD) classification model, and uses the MU's classification results to recalculate the mean of all test samples, then all test samples are re-divided by using the minimum distance method, so as to determine the final category attribution. This can partially correct misclassification in the MU category process and further improve the classification results.
2012, 21(8):127-130.
Abstract:A novel algorithm is presented on the base of quantum behaved particle swarm optimization,which is aimed at resolving the problem of slow convergence rate in optimizing higher dimensional sophisticated functions and being trapped into local minima easily.Chaos algorithm is incorporated to traverse the whole solution space. First ,rate of cluster focus distance changing was introduced in this new algorithm and the weight was formulated as a function of this factor which provides the algorithm with effective dynamic adaptability. Secondly, a method of effective judgment of early stagnation is embedded in the algorithm. Once the early maturity is retrieved, the algorithm mutates particles to jump out of the local optimum particle according to the structure mutation so as to reduce invalid iteration. Experiments on high-dimension test functions indicate that the improved algorithm is superior to classical PSO algorithm and quantum-behaved PSO algorithm.
JIANG Xue-Feng , XU Xiao-Bo , WU Fang , DONG Hui-Liang
2012, 21(8):131-135.
Abstract:With the development of the information technology, the security of information system becomes more and more important in enterprise management. In this paper, a new backup platform based on asynchronous data cloud is proposed to connect application system with logical data cloud and physical data cloud and they can back up the system data stably and efficiently. And in order to optimize the backup resources, different strategies were applied to different objects in the platform. Implement in backup system of China Tobacco Zhejiang Industrial CO.LTD shows that the platform is suit to regional and large enterprise which has great deal of data.
SUN Ke-Hui , YE Zheng-Wei , HE Shao-Bo , ZHANG Zhi-Qiang
2012, 21(8):136-139.
Abstract:In order to solve the problem that air conditioning remote controllers are not compatible, in this paper, an intelligent air conditioning remote controller is designed based on Atmega 16. In the remote controller,the method of measuring pulse width is employed to learn infrared signals, and the RLE compression algorithm is applied for data storage. Infrared carrier is generated through PWM mode based on the internal timer of SCM. The remote controller successfully achieves the learning and reproduction functions,which could be controlled via PC. The running test results show that the system is flexible and stable. It provides a new scheme for designing an intelligent remote controller.
2012, 21(8):140-143,228.
Abstract:A blood glucose monitoring system is designed for diabetics with the convenience of measurement,long-term storage of blood sugar level data and getting diagnosis in time. Tele-consultation and tele-monitoring are implemented via this system, which consists of blood glucose meters based on Android mobile phone. The blood glucose meter based on MSP430 is connected to the mobile phone through the Bluetooth,which not only has the measurement function, but use the SMS to send data and receive experts diagnosis; the Smart phone can easily send/receive short messages and the storage, the management and the maintenance, etc. According to the test, the results show that this system fulfills the predetermined design aims.
2012, 21(8):144-147,151.
Abstract:For the Web report printing in information management system, a method based on data export is designed. The reports with strict requirements for the reporting style are generated through replacing the data in a Word template. Then they can be downloaded and printed. For less demanding style statements, data are exported and assigned to range by using two-dimensional array to directly generate Excel reports. It is studied how to reduce the difficulty of programming, improve versatility and improve the code efficiency of program execution. At the same time, the implementation of the Web report printing method is introduced in details. In practice, the method has been used successfully in information management system for a trade association.
2012, 21(8):148-151.
Abstract:A software system for ordering services is developed based on Android mobile cloud computing. The system consists of a client-end application running on Android mobile devices and a set of server-end service applications. The system components include database server, WEB server, wireless network and Android front-end. The Android end accesses the WEB and database services via a WiFi connection. The content of this paper covers the overall system structure design and detailed description of the analysis, design and implementation of the database and ordering services application.
MA Liang , LI Yun-Tao , YANG Xue-Feng
2012, 21(8):152-155.
Abstract:Based on current test system theory and the virtual instrument technology research in this paper, establishing a detecting system as the PXI core based on the comprehensive testing system for LabVIEW8.5. Based on LabVIEW for the software platform in this system, with graphical program language designed for electronic equipment system detecting modules and the source program flowchart. This detecting system can reduce maintenance cycle effectively, reduce maintenance costs and improve reliability, system maintenance level of electronic equipment to achieve digital, modularization and intelligent .
ZU Jun , HAO Run-Ke , YANG Guang
2012, 21(8):156-159.
Abstract:The primary aim of this paper is a design based on carrier communication UWB Technology ( UWB ), and the fireman's position for the design of positioning system, which overcomes the traditional shortcomings of positioning system, and improves the fire location accuracy more, and can play a good role in indoor. UWB positioning technology has the advantages of low power consumption, high speed,multipath effect, high safety, and especially it can provide very high precision in positioning and has great development potential in radio positioning technology.
SHI Ting-Ting , HAO Fu-Fei , TAN Ning-Sheng , DONG Peng , FAN Xie-Yu
2012, 21(8):160-165.
Abstract:By analyzing crime spatial data and related criminal theories, we discuss some of classical or new technology and model of crime spatial analysis such as crime hot spot, four-color warning, and string of case analysis.Realize the case of business data visualization by using the address matching technology, and also combines the mapping cutting block and map classification display technology (Tile Cache) with Ajax technology and the powerful WebGIS platform.According to these researches,crime spatial analysis system based on B/S (Brower/Server) model was designed and established.It has been found that the system is an effective and practical tool for the public security department to control social order and fight against crime.
2012, 21(8):166-169,221.
Abstract:Considering the symmetric valve controlled asymmetrical cylinder electro-hydraulic servo system of nonlinear and in order to improve the control precision of the system, a novel feedback linearization control strategy is put forward based on the analysis of the inherent property of the system.The feedback linearization stability of the system is analyzed, and adaptive compensation control for uncertain parameters is introduced by using the neural networks. Finally reasonable parameters are chosen for the simulation.Experimental results show that the neural network technique based feedback linearization valve control system not only has good stability, high control accuracy, also the system tracking performance is superior, which is applicable to real time control situation.
2012, 21(8):170-173,232.
Abstract:A fuzzy multi-Attribute decision making method based on entropy is presented to deal with the optimal decision problem of vendor selection in the Supply Chain. For the fuzzy multi-attribute decision making problem, attribute set is identified, weight of each attribute is calculated in the use of information entropy, and the optimal solution is determined by using the fuzzy number sorting method to sort the fuzzy utility values of the programs. An example is applied for the rating sort of 5 vendors to select the most appropriate one. The method is proved to be effective in vendor selection.
HAO Lei , GUAN Hua , DUAN Chen-Xu
2012, 21(8):174-177.
Abstract:A blocking algorithm of digital color image encryption based on improved Logistic chaos sequence(NCA) is presented in this paper, the sub-block of R,G,B components are scrambled respectively. The new algorithm gets rid of restrictions on iterations of NCA. We use the significant figures of iteration value to be the matrix to replace the pixel value. The simulation results used by Matlab 7.0 show that the new algorithm has good advantages such as a larger key space, sensitive to initial conditions and better real-time characteristic, so it can protect the images security over the internet.
2012, 21(8):178-182.
Abstract:The stable walking pattern plays an important role in the control of biped robot.This research proposes a three-dimensional linear inverted pendulum model of walking robot. Through the three-dimensional inverted pendulum, the location of center of mass and speed of the robot can be calculated, combined with the robot's inverse kinematics, the angle of each joint of robot can be obtained. Then, these angles can be used to drive the movement of each joint of robot. At last, the complete trajectory of robot can be obtained.
2012, 21(8):183-187.
Abstract:How to make relational database has the semantic character, and how to describe the semantic of object, are important problem during the application of semantic web. In this paper, a model of Ontology-Object-Relational mapping rules and algorithms was also presented. Based on ORM, the mapping and transformation between ontology, object and relational database was realized. A system for experiments had been developed, and the experiment for the transformation between relational database and ontology instances was conduct, the result show that the mapping model, the mapping rules and the algorithms are right and feasible.
LI Yuan-Ling , LIU Qiang , LIU Li , CHEN Hua
2012, 21(8):188-193.
Abstract:JPA, as a persistence solution for Java, can directly map objects to relational databases. In this paper, we present the structure of Java component vulnerability database, the methods to acquire Java component data and vulnerability information, and methods to achieve the component database using JPA, especially procedures storing the component data based on hierarchical structure for the component data.
2012, 21(8):194-196,239.
Abstract:K-means algorithm has been limited by the main questions which are the problems to determine the number of clusters, initial cluster center points of selection and to avoid isolating the problem. To solve these problems the algorithm has been improved in this paper and the paper has applied the improved algorithm and dynamic recurrent fuzzy neural network to the beer fermentation systems. Because of complex neural network structure, the particle swarm optimization algorithm can be used to optimize connected network structure of the connection weights between layers and the network topology. This PSO does not easily trapped local minima and has better generalization ability. At the same time, in practical application the principle of improved PSO algorithm is simple and has less parameter so that it’s easier to realize.
ZHU Qiang , LI Zheng , ZHANG Xing , TANG Wan
2012, 21(8):197-200.
Abstract:The paper discusses the structure of the network based on LOBS-HC (labeled optical burst switching with home circuits), a newly proposed optical switching technology that can provide bandwidth guarantee and increase the utilization of wavelength bandwidth. Based on Visual C++, we design and implement a LOBS-HC based network simulation platform with some core processes, such as traffic flow generation and convergence, burst assembly, and logical HC link establishment and release. Finally, the performance of the LOBS-HC based network is evaluated in terms of throughput, delay, wavelength utilization etc. The simulation results show that LOBS-HC-based network achieves higher bandwidth utilization than the network based on OCS (optical circuit switching) with the same bandwidth guarantee.
2012, 21(8):201-205.
Abstract:Most abandoned object detection algorithms proposed are either computationally intensive or weak in tracking abandoned object with occlusion. For this, an abandoned objects detection method under static cameras is presented based on dual backgrounds, which are updated with different strategies and frequencies. The background model is driven by accumulative average values instead of complex filters and hence it is simple and of lower computational cost. Besides, the algorithm is able to track abandoned objects under occlusion. Experimental results under the benchmark datasets on PET 2006 show that the proposed method has a good performance.
LIU Shu-Jun , WANG Bing-Tong , LI Li
2012, 21(8):206-209,177.
Abstract:With the gradual development of Web services technology, more and more web services has been published on the Internet. However, a single web service just provides limited functionality, and cannot meet the needs of user or business practice. Therefore, Web service composition is becoming increasingly important. This paper introduces web services composition and knowledge of WS-BPEL, by using the latest business process execution language WS-BPEL to describe business process, by using business process, a loan approval application case is designed and realized in J2EE integrated development environment, by using the web service executive engine Active BPEL to deploy, the web services are combined effectively.
2012, 21(8):210-213.
Abstract:In this paper, Wuyi University Library provides loan for 1 year of data preprocessing, statistical analysis, two aspects associated with association mining to start work, according to the results of the analysis, from the collection of layout, book purchases, library staff, manpower, working time arrangements give relevant recommendations, recommended books to help make the library work.
WANG Xing-Fu , QIN Qi-Xian , CHENG Yong-Yuan , HOU Cheng-Long
2012, 21(8):214-217.
Abstract:The neural network is a kind of the commonly used method of data mining, principal component analysis method is a kind of method that analyzes internal relationship between the many variables of the multivariate analysis of statistical. Combined the principal component analysis pretreatment method with neural network, you can analyze the relationship between the original variables, reduce dimensions of the original data and reduce the scale of data. This paper does research on the neural network algorithm and the principal component analysis correlative theory. Based on this, combined with a large number of meteorological data and disease data of Beijing, we proposed an improved method of the data mining which based on principal component analysis and neural network algorithm preprocessing. Through the contrast experiment test, the combinations of the algorithm have a large degree increase in the convergence rate and forecast accuracy property.
2012, 21(8):218-221.
Abstract:Most of the existing data mining algorithms are processing in the centralized systems; however, at present large database is usually distributed. Compared with the frequent itemsets lost and high communication traffic in distributed database conventional and improved algorithm FDM, an improved distributed data mining algorithm LTDM based on association roles is proposed. LTDM algorithm introduces the mapping indicated array mechanism to keep the integrity of frequent itemsets and decrease the communication traffic. The experimental results prove the efficiency of the proposed algorithm.
WANG Bi-Qing , ZHONG Zhi-Shui , MENG Wei-Dong , YUAN Xiao-Yong , WANG Fu-Cheng
2012, 21(8):222-224.
Abstract:A routing model for chord based on double identifier is proposed to address the problem that the routing table in Chord only covers half of the identifier space. The model assigns each node or key not only a clockwise identifier according to Chord but also a anticlockwise identifier in addition. So each node or key has double identifiers. Thus each node maintains two routing tables:clockwise routing table and anticlockwise routing table. Performance analysis and simulation experiments show that improved Chord routing model reduces the average lookup path length and gets higher efficiency.
YU Wei-Yong , JIAN Xian-Zhong , YAN Jun , XI Li-Feng , CAO Yi , GU Yu-Jie
2012, 21(8):225-228.
Abstract:In order to solve the cost, power consumption, sound quality, the problem of development cycle and reliability that the engineers concerned. We proposed a design of wireless audio transmission embedded system based on TI's new chip CC8520. The design employed the "2.4GHz" technology and set up the expected fuction quickly using the configurator unnecessarily of software development. Furthermore, the mian chip CC8520 of the design that integrated micro-controller do not use any other micro-controller or DSP. The article gives the overall structure of the whole system and then introduces the method of setting "PuthPath Wireless" Configurator. The result of experiment shows that the design is effective in improving sound quality and reducing power consumption that can continued work 22 hours. Further, the distance of the design can reach 130 meters. The design reduces the development cycle and provides a new idea for the design of wireless transmission production.
SU Wei-Jia , RUAN Bin-Xin , LI Xin
2012, 21(8):229-232.
Abstract:The introduction of this paper is based on MinGui and SD card FAT32 file system for data acquisition and display terminal design and implementation. Using SEP4020 as the microprocessor, with AD data acquisition module, TFT LCD screen Graphical display module and SD card data storage / read and write module ect, and using μC / OS-II embedded operating system for managing switching and communication between tasks. The system implements the acquisition of analog and digital signals, displaying in real-time on the terminal display, operatoring control of touch screen, and storing the data on the SD card for the PC for further data analysis and other functions.
2012, 21(8):233-235.
Abstract:The traditional electrode-lead heart monitoring systems are wired, and contact with skin, high power consumption. This paper form the non-contact, light, low-power, to conduct a suit based on MSP430-RF wireless heart monitoring system development. This paper designs the hardware functional circuit, and completes the PC preparation process. The system can measure the pulse waveform to the body in real-time, and calculate the number of heartbeats per minute, with a graphical interface displayed. The system has been achieved and can be run.
OU Feng , ZOU Min , LI Xiao-Zhen
2012, 21(8):236-239.
Abstract:This paper describes the popular Java technology framework from the perspective of architecture, elaborates on the major component of java technology architecture, introduces the popular Java communities with various techniques, and analyses the development trend of Java technology.