AIPUB归智期刊联盟
JIANG Nan , WU Jun-Min , ZHU Xiao-Dong , LI Li-Feng , ZHANG Peng-Fei , HUANG Jing
2012, 21(9):1-6.
Abstract:With the era of multi-core processors, virtualization technology is widely used, and multi-core virtual machine is one of them. The current multi-core virtual machine monitors are generally used hardware virtualization technology through simulating a number of virtual serial ports to monitor for the purpose. This inventive, given based on shared memory multi-core system-level monitoring system virtualization solution, and gives a complete design and implementation.
2012, 21(9):7-9,31.
Abstract:As the important service show way of cloud computing, SaaS has been the rise completely innovative software application mode in the market. It uses the Internet to provide calculation service, and uses the SaaS service software for specific industries and areas, no matter from the technical or business will save a lot of human and financial resources cost, also more conducive to improving the utilization rate of social resources and sharing. To further enhance the safety of domestic food, comprehensive promotion food monitoring and food management software application, this paper puts forward the food security traceability system based on SaaS Model. The article combines the food industry business requirements and SaaS model of service features, and probes into the system in the process of implementing the difficulties SaaS technology, finally successfully reach maturity of the SaaS model 4 system, this system can not only ensure the safety of the domestic food distribution, but also effectively promote the SaaS model of business system platform in the cloud in the calculation of the application.
2012, 21(9):10-13,42.
Abstract:With the commercial demand and application background, this paper creates an analysis system of notebook computers’ comments, which aims at those unstructured and freestyle online comments. It can classify the text sentiment orientation and conclude products features. The system uses data mining and business intelligence methods to analyze huge amounts of feedback from online customers and help corporate executives to realize the market needs, make commercial decisions. Finally, the experimental results prove that this system can obtain a relatively accurate result.
QIAN Jian-Ping , XING Bin , WU Xiao-Ming , YANG Xin-Ting , WU Bao-Guo , WANG Yan-An
2012, 21(9):14-18.
Abstract:A digital orchard management system (DOMS) plays an important role in implement orchard precision management. With single fruit tree as minimum management unit and rich internet application (RIA) as framework, DOMS structure was established using WebGIS application service provided by ArcGIS Server. Data table and entity relationship was designed. The function of DOMS was implemented with ExtJS. An apple orchard in Shandong province was selected for applying DOMS. An orchard map was created by recording the coordinate location of fruit trees and environment monitoring equipments in the apple orchard. Integrating with the map, various entities such as orchard, fruit trees, and equipments and so on were managed with DOMS. The application result shows that DOMS can improve management efficiency, enhance analysis capacity and provide visualization management means. It is a new attempt that information technology is applied in orchard management.
2012, 21(9):19-26.
Abstract:The Mobile phone 3D animation automatic generation system implements the technology that automatically generates a 3D animation and sends the message with animation to the receiver according to the content of message. Color planning is an important segment of the system, consider of the topic of the message and the animation scene’s information, plan in color domain for the animation, and change the models’ color in the animation scene. In this paper, a Semantic Web technologies based approach is proposed. A knowledge base in the domain of color is built. In the process of the planning, firstly the color matching plans suitable for the topic of message after plot reasoning are built. Then, according to the information of animation scene, the plans are filtered. Finally, the color of each model in the scene is decided. Instead of the visual effects is invariable and tedious for automatic generated animation, color planning makes the animation more flexible and variable.
LIANG Long , CUI Ting , MENG Xian , LIU Yong-Xiang
2012, 21(9):27-31.
Abstract:With the developing of information technology, smart attendance system has been an essential facility for modern enterprise. In this paper, a low-power RFID system based on MSP430 and TRF7960 is designed. The reader can inquire passive tags which support ISO14443A protocol and has been planted with anti-collision algorithm. It has a read range of 8cm and can read 2 tags at the same time. Experimental results verify that the RFID reader is stable and reliable. Combined with the development of middle-ware and Web service application at the server, a complete solution of attendance system is achieved.
ZHANG Hong , LONG Chun , GE Jin-Guo , LI Jun
2012, 21(9):32-37.
Abstract:Snort is one of a light wight, powerful NIDS. It can detect many different kinds of attack behaviors, and give real-time alerts. Because Snort does not support the detection of IPv6 address prefix spoofing, this paper supplies a solution to implement the intrusion detection preprocessor plug-in and provides the detection process. The experimental result proves that the preprocessor has a higher detection ratio to the spoof of IPv6 address prefix, and it is an effective plug-in on the intrusion detection system.
YANG Xin , LIN Ji-Ming , LIU Zheng-Hong
2012, 21(9):38-42.
Abstract:This paper mainly studies the target positioning system based on nanoLOC transceiver. An embedded positioning system consists of S3C6410A microprocessor of Samsung, nanoPAN 5375 wireless communication module and LCD. Linux operating system based on Linux 2.6.38 kernel is used as embedded software platform. The symmetrical double-sided two-way ranging algorithm is designed which has a high accuracy of positioning system. A lot of experiments show that the accuracy of positioning system is less than one meter, the system can achieves in indoor and outdoor as well as the high precision positioning in harsh environments, and be used in handheld mobile positioning equipment. The system has a great application and promotion value.
2012, 21(9):43-47.
Abstract:The EPC IS is the core of the Internet of Things and it’s responsible for the tasks of analyzing EPC datas and PML documents. Thus, this paper discusses a new EPC IS design scheme of Rights Management based on the traditional EPC IS while combined with eXtensible Access Control Markup Language (XACML). This new EPC IS design scheme of Rights Management aims to resolve the security issues of the EPC IS when it is accessed across companies. The architecture and role of the EPC IS with potential security problems come first. Then, XACML, which focus on analyzing how to realize rights management is talked. Finally, an EPC IS design schema of rights management solution of the cross-enterprise supply chain management system is put forward.
2012, 21(9):48-52.
Abstract:The design of a wheeled robot with automatically tracing process based on ARM for core device is introduced. This article proposes a multiple-point preview fuzzy PID control algorithm which is based on imitating artificial driving. By debugging, the wheeled robot can track the straight lines and the dotted lines. And the wheeled robot can automatic search for roads. The design of the controller and the main hardware circuit diagram are given. Experimental results show that the robot can meet performance requirements and provide programme for the design of the new kind of wheeled robot.
YE Xiao-Long , ZHOU Xue-Hai , CHEN Chao
2012, 21(9):53-57.
Abstract:In order to achieve high performance, traditional linux operating system run device drivers in kernel space. Unfortunately, this architecture inevitably decreases reliability and stability of the system. Based on commonly used equipment USB devices, this paper presents a new driver architecture which run device drivers as unprivileged user-level code, encapsulated into a process, this architecture also support features such as hotplug, driver management and so on. Experiments on several usb devices show it works well in user space without significant performance degradation.
LIN Chuan , HAO Wei-Dong , LIN Cheng-De
2012, 21(9):58-63.
Abstract:Aiming at the filed of robot grasping using binocular vision, a new method for dealing with the depth information is proposed in the multi-target scenarios. By setting a threshold in pixels and traversing the depth information image similar to clustering method can obtain the coordinates of the object and pass the coordinates to the robot arm to grasp the object accurately. In this paper, the principles of binocular vision, camera calibration, stereo recertification and stereo matching are described. Their difference between the original depth information and the depth information after optimization can be acquired by utilizing the optimization algorithm. The approach for grasping object for robot in multi-target scenarios is proved to be effective in the experiments. Research directions for future improvements are also presented.
WANG Kun-Ning , ZHANG Cui-Xiao
2012, 21(9):64-67.
Abstract:The traditional Web services discovery technology mostly used keyword-based service matching mechanism, due to lack semantic Web services description, it affect the recall rate, precision rate and intelligent search of Web services.In this paper, we research on semantic-based Web service matching Algorithm. By improving the classical matching algorithm for Web services, study the concept of Semantic Web services single matching algorithm, and get the optimal order of concept of Multi-concept semantic Web service matching, then combining with the input and output parameters. Finally, get the results of semantic Web service matching.
CHAO Yu-Zhong , ZHANG Chun-Ming , ZHANG Lei
2012, 21(9):68-73.
Abstract:Visibility analysis is widely applied to military and project fields, of which viewshed computing is the important factor. This article discusses the common algorithms for viewshed computing, analyses the advantages and disadvantages of them, and puts forward a improved Xdraw algorithm based on the old one to reduce obviously the frequency of access to database aiming at a large scale DEM database. Then the continuous research direction is shown through analysis of this algorithm from correctness and efficiency in practice.
LIU Wei , MA Yue , LIAN Dong-Ben
2012, 21(9):74-78.
Abstract:Along with RIA technology introduced in developing WebGIS,more and more events are used. Traditional way of event use has low efficiency and great mistakes,so it can’t meet practical needs.According to researching the mechanism of event process and the experience of WebGIS development,a new idea that all events should be managed totally was brought forward, and a framework of event manager was designed. Through the application in the LiaoHe River water environmental management system, it turns out that applying event manager simplifies the procedure of WebGIS development,avoids mistakable events, obtains satisfactory results. Also the framework of event manager is a good way to solve event management in traditional GIS and application program.
2012, 21(9):79-82.
Abstract:Micro-mouse is an autonomous mobile robot(AMR) with self-maze search, the short sprint after the search, sensing and controller. In this paper, the maze search algorithm is designed and implemented based on the central method. The method and maze search process was optimized. Experimental results proved that the optimized algorithm improves on the efficient of the original method, and it has a better local effect. Finally, compared with other algorithms, we found that the central method is a very efficient maze search algorithm
MA Si-Si , HE Jian-Zhong , WANG Wen-Hua
2012, 21(9):83-86.
Abstract:It is about high pressure saturated air generator of saturated room. It researched the mathematical modeling of control system about the saturated room. Using of the mathematical formula of thermodynamics and heat transfer deduced the transfer function of pressure--flow and temperature control process. According to the analysis of model are given control plan, make matlab simulation diagram. The result of simulation proves good control effect of this control strategy which based on the model.
FENG Yu-Qian , ZHENG Qi-Long , LU Shi-Xian , CHEN Si-Ling , FU He-Ping
2012, 21(9):87-91.
Abstract:DSP low-level features is very different from traditional C language features because of specific instruction set in DSP domain which is difficult to be generated by the complier or couldn’t be generated by the complier. The basic framework of the IMPACT is expanded to support embedded assemble.
HU Gang , LIU Shi-Gang , WU Qing-Liang , WANG Gang
2012, 21(9):92-96,52.
Abstract:The SIFT(Scale Invariant Feature Transform) algorithm is now regarded as the best local feature extraction and matching algorithm. However, in the traditional SIFT algorithm, the Euclidean distance which could not change the high-dimensional feature vector into a low-dimensional geometry structure is used to measure the SSD(Sum of Square Differences) between two image features to match and results into mismatching. To overcome the shortcoming, an SIFT matching algorithm based on diffusion distance is proposed in this paper which replaces the Euclidean distance with the diffusion one. At the same time, RANSAC(Random Sample Consensus) is presented to exclude the mismatching points. Experimental results show that the proposed algorithm has more efficiency to deal with image deformation, illumination change and image noise than the traditional one.
SUN Xue-Qin , CHENG Shao-Yin , JANG Fan
2012, 21(9):97-102.
Abstract:Aiming to MAC layer, Adapter layer, Network layer and Router protocol of 6LoWPAN protocol stack, this paper studies the conformance testing method of 6LoWPAN protocol stack, introduces the TTCN-3 testing standard into the conformance testing of wireless sensor network, and designs a 6LoWPAN protocol conformance testing instrument, which uses both TTCN-3 as protocol testing description language and protocol conformance testing model defined in ISO9646 as method.
LI Xiang-Yu , WANG Kai-Jun , GUO Gong-De
2012, 21(9):103-107.
Abstract:Each clustering algorithm has its suitable treatment of specific distribution data set. The SCGG method based on the Grid-Connected Graph is proposed to select suitable clustering algorithm for unknown distribution data set. The SCGG method analyses the potential structure of the data set. If the data set has ring clustering structure, the method select a single hierarchiral clustering algorithm, otherwise it selects the k-means. Experiment results show that SCGG is very efficient and successful.
YU Xiao , WU Jian-Zhang , WANG Wei
2012, 21(9):108-112,63.
Abstract:Using web service composition technology, business demand can be meet quickly and flexibly, formal description and verification of web services and their composition are very important research issues. A colored Petri net(CPN) based model is proposed to formally define and descript Web services and Web services composition, four structures of composition are mainly descript: sequence, choice, concurrent and loop, an example of web services composition modeled by Colored Petri net is proposed, the accuracy of the model is simply analyzed. The result shows that the demand of accuracy of the model is satisfied.
2012, 21(9):113-118.
Abstract:This paper describes the knowledge of memory management and cache of iOS development in detail, and introduces methods of debugging memory problems using tools which is provided by Apple IDE Xcode, for the memory problems when UITableView contains large amounts of network pictures, with the goal of memory optimization and best user experience. It proposed network of asynchronous-download pictures and the local cache solution. Finally, test results show that the memory allocation is safe and stable, the app runs more smoothly, and have a better user experience.
SUN Li-Bin , DENG Rong , CHENG Hong-Zhong
2012, 21(9):119-123.
Abstract:Task DAG is a mean of depicting dependency among tasks of a program. Apart from dependency between tasks, amount of computation and traffic between tasks are also reflected on DAG. All these information together provides a basis for scheduling. There are much research on scheduling base on DAG both domestic and abroad, but research on constructing task DAG based on analysis of correlation among serial program is rare. This paper focuses on analysis of data dependency and control dependency and discuss respectively on sequential, branch and loop structure, propose an algorithm for constructing task DAG of serial programs.
2012, 21(9):124-127,78.
Abstract:In the condition of the B/S mode, the authentication server is difficult implemented by a client. This paper puts forward to use.NET Remoting program to verify the authenticity of Web site and reaches storage safety of authentification message by useing neural network weight and also realizes mutual authentication between the client and the server, every time the authentication produce different session keys so on. Safety analysis shows that the proposed scheme can effectively prevent fishing websites against common attack, increase the system security. The scheme is achieved by using ASP.NET, It proved to be feasible.
GENG Jian-Ping , ZHU Jian-Fei , JI Yuan-Fa , SUN Xi-Yan
2012, 21(9):128-132.
Abstract:According to the characteristics of GLONASS satellite signal and the principles of PR code acquisition, the acquisition of GLONASS signal using parallel code phase acquisition algorithm based on FFT are simulated in MATLAB, on the basis of simulation platform established in MATLAB, the FPGA implementation of GLONASS PR code signal acquisition system based on the parallel code phase acquisition is designed; Meanwhile, the Sinc data interpolation filter is used to implement the precise data interpolation to satisfy the demand for FFT transformation by interpolating the inputted 62000 points to 4096 points which is transferred to FFT-IFFT module, and in order to reuse the FFT core, the method of accelerating the read speed of the C/A code and the method of using the state value of the FSM and the exponent of the data to intercept the data bits are used. At last the whole acquisition module are verified by the simulation of Xilinx’s ISE calling ModelSim software. The simulation results show that the system can acquire the GLONASS signal. It is concluded that the designed system can satisfy the requested function and performance of receiver system, and can be used in the real-time GLONASS receiver system.
WU Jian-An , WU Xue-Lian , SUN Bing-Yu
2012, 21(9):133-136,26.
Abstract:Natural disaster emergency plans describe the domain knowledge of natural disaster emergency and it is the basis of high-efficient emergency response. However, most of the current emergency plans exist in the form of unstructured text, which hinders decision makers from obtaining emergency knowledge quickly and accurately. For the above problem, based on the analysis of disaster emergency plans and organization coordination processes, this paper proposes an ontology-based knowledge representation method for natural disaster emergency plans. Finally, many efforts are made for the actualization of the emergency plan digital management system of natural disaster. The result shows that this method provides valuable reference to the formal representation of emergency plan.
2012, 21(9):137-140.
Abstract:Real time character is the common request of a pipeline SCADA system, as the own BIOS clock of the Cross-platform devices are not same and the transit delay of the network, time accuracy cannot be guaranteed which influent the product data transit in time and valid. This paper introduces a method of using the GPS clock source, NTP protocols and CIP protocols to achieve the initiative synchronizing system for Cross-platform SCADA system, which can ensure time accuracy and consistency with all the network devices, servers, clients and programmable logic controllers. Practice proved this method is valid.
DU Yi-Hua , QIAO Hong-Chao , CONG Pei-Min
2012, 21(9):141-143,102.
Abstract:The Chinese Academy of Sciences (CAS) has recently launched an articles-soliciting campaign to seek advise and suggestions worldwide on the future development of CAS. In order to ensure that the campaign proceeds in an efficient, fair and smooth way, the CAS Computer Network Information Center designs a JAVA+Oracle -based reviewing system to evaluate and select well-written articles. The system possesses a range of functions such as online article submission, experts and public review and evaluation, exhibition of award-winning articles, netizen online comments. The paper begins with a brief introduction of the campaign and then elaborates on the article reviewing system, including its design ideas and framework, function constitution, score-given methods by experts, and cheat-preventing methods, hoping to shed light on other articles-soliciting activities of various kinds.
2012, 21(9):144-147.
Abstract:Using the servo motor control of the numerical control system as the example, based on the ARM microprocessor chip, this paper designs and implements a soft PLC. On this PLC, with the fuzzy control and PID control algorithm, completes parameter setting by MATLAB simulation. The paper designs a motor control system based on PID fuzzy algorithm. This system cannot only be used in numerical control system, but also be used in other industries motor control.
LI Wen-Jiang , HAN Yang , WU Wei
2012, 21(9):148-151,132.
Abstract:Now domestic coal mine synthetical-exploit underground Automaticmonitoring system commonly has many problems such as the relatively independent operation of subsystem, poor real-time communication and stability. Therefore, the paper based on the Synthetical-exploit underground working face process in order to realize the main production equipment’s on-line monitoring and control, environmental parameters’ acquisition and monitoring and fault processing. Through the establishing Siemens S7-300 PLC main control station and the intelligence passive station, design a set of application of synthetical-exploit underground automatic monitoring ystem. The actual test show that the system is provided with good stability, high reliability for coal mine safety and efficiency of the production with the role which cannot be replaced.
2012, 21(9):152-155.
Abstract:For product image retrieval, the method of retrieval based on color feature and shape feature is proposed. To obtain color featrue, Non-interval quantitative measure is used to extract color histogram, and setting a value number is to find the primary color. Implementing the algorithm of two-demensional function moment that is weighted to get the shape feature. As these two features are combined in retrieval, the results of math in product image achieve a highly level.
Li Wei , Gao Jin-Tao , Gao Teng
2012, 21(9):156-161,140.
Abstract:With the development of information retrieval technology and database theory, how to achieve information retrieval technology in relational databases to obtain useful information, and the normal user can also be performed in relation database query with keywords, as recent research hot spot. Relation Database query system based on keyword, with which the user don’t need to know the database schema and structured query language, just inputting a few keywords. The article based on a prototype relational database-ER diagram, grouping entity according to different meaning. Following the keywords belonging to relation table, we can ensure the set of query entity, and dividing the range of query, to improve the efficiency of query. This paper presents a new algorithm to improve system precision. Finally, through experiments on the E-RKS system verifies verification.
2012, 21(9):162-165.
Abstract:In order to deal with the safety problem of privacy in CPU card and Radio Frequency Identification (RFID) process, this paper proposes an encryption algorithm that combines the Elliptic Curve Crypto-system (ECC) with the Advanced Encryption Standard (AES). This method firstly uses the high efficiency secret-key to encrypt important information, and then use the AES to encrypt the communication information between CPU card and the reader and writer. Thus the important information will be encrypted double in the process of communication, even though attackers get the Radio Frequency CPU card or intercept the communication information, they can’t obtain useful information as quickly as they need. The experimental results show that the method improves the safety of the CPU card and against the attacks during the communication. The proposed mixed encryption algorithm plays an important role in the safety problem of privacy.
CHEN Zhou-Guo , PU Shi , ZHU Shi-Xiong
2012, 21(9):166-170.
Abstract:In recent years, to deal with cyber threats, in academic community the traceback is proposed and developed, and a variety of traceback technology is researched. However, the majority of these research focuses on the specific traceability technology and algorithms, and traceback technical framework is lessly done. This articles from two aspects of collaboration domain and non-collaboration domain analysis the traceback technology, to track traceability system proposed non-cooperative domain, design a general traceback technical framework for Internet, which involve various traceback techniques or methods and play all kinds of technology advantages, realize traceback in the global Internet space, improve network security initiative and effectiveness.
2012, 21(9):171-174,165.
Abstract:Three-Dimensional Panorama is one method of the most important Scene representation about virtual reality and computer vision, the most simple panorama generation method directly uses the panoramic camera tools to shoot panoramic, but the cost is higher, so limited the universal use. This paper puts forward a kind of low cost method based on image mosaicing technique, a series of image sequences is processed. The method is used in virtual campus system of NanYang Institute of Technology, realized the virtual campus imaging roaming, greatly reduced the cost.
2012, 21(9):175-178.
Abstract:Region growing algorithm is widely used in segmentation of special objects, but the slowly growing speed limits its application in certain area. In this issue, a new method is proposed to improve efficiency of Region growing. This method is based on a mechanism that a certain level zone is described by a single similar point. Only a region with many interior holes can be obtained with this method. Combined with Chain-code edge tracking algorithm, these interior holes can be filled completely and finally get regional compensation. With these two methods, an efficiency application system is established to analyze cells of chain-like algae.
2012, 21(9):179-181.
Abstract:Prison is responsible for the social harmony and preventing and reducing crime. It’s self-evident to realize the importance of strengthening the intelligent and informationbased management of prison. Considering the development of the prison using modern management, this paper designs a prisoner location information system based on zigbee technology and makes CC2530/2431 from TI as a core. It states system network topological structure and structure schematic drawing and basic working principles, gives out the hardware circuit and mobile terminal software flow chart, designs prevent removing loop circuit for the mobile terminal emphatically. The system can realize personnel location, low power alarm and anti-demolition etc. Function.
LI Wen-Jie , SUN Chang-Ping , LI Hui-Guang
2012, 21(9):182-186.
Abstract:For detecting the edge of noise image, a new multiscale edge detection algorithm based on variogram function and directional wavelet is proposed. First, the criterions for the 45 degree and 135 degree directional edge in a image are proposed based on our previous research results and variogram function theory, respectively. Then, based on the direction of edges, an appropriate rotating parameter of directional wavelet is determined. The directional wavelet transform with different scales at different direction is implemented for different subregion. Thus, not only the accurate edge location is obtained, but also false edge points produced by noise and uneven gray scale in image are removed as much as possible. The results of simulation on the image contaminated badly by Gaussian noise indicate the performance of the proposed algorithm outperform the ones of the exist edge detection approaches with respect to maintaining edge and denoising.
2012, 21(9):187-191.
Abstract:Multi-Scale Retinex algorithm is one of the effective traditional algorithms on illumination compensation to face image of poor quality. but the phenomenon such as the white and color distortion, low contrast, which might be produced during process of the retinex algorithm to face images. In order to improve the face recognition rate under complex light conditions, this paper proposes a new and multi-scale retinex with color restoration for light compensation of color images. On the basis of studying of MSRCR theory, bettering the original algorithm, and using the fast Fourier algorithm, so its speed is faster than that of the traditional method. Experiment proved the contrast, brightness, hidden details of images are enhanced by using the improved algorithm. This paper describes the principle and implementation method of the algorithm and at the same time compares it with histogram equalization, Gamma transform methods through experiments. Results of experiments show that good effects can be produced while using the algorithm for light compensation of color images.
ZHANG Jia-Shan , WANG Zhi-Hong , CHEN Ying-Xian , LIN Xiao-Qun
2012, 21(9):192-194,191.
Abstract:Premature convergence usually appears in basic genetic algorithm. So, new crossover and mutation operators are designed. Greedy strategy is introduced in construction of genetic operator. Diversity of population becomes Rich because of introduction of new operators. New algorithm improves the ability of global search. The simulation indicates that the improved genetic algorithm can jump out of local optimum in a short time, and continue seeking the optimum.
LIU Duan-Yang , ZHANG Rui-Qiang
2012, 21(9):195-197,186.
Abstract:In the research domain of time series similarity, there have been many approach that are developed to represent time series in the order of reducing the dimensionality. As one of the classic time domain-frequency domain transformation method, the discrete cosine transform has been widely used in the field of graphics and image processing. In this paper, we used this method to represent time series, and implenmet querying operation etc. on the transformed data. Our experiments indicate that this method obviously improve the performance compared with previous method.
WANG Hui , LI Guo-Jia , PAN Jun-Hui , GAO Xing
2012, 21(9):198-201,170.
Abstract:An effective method of peak depth correction based on the Hausdorff distance is put forward in this paper. The automatic identification of logging curve peak made up the blank of automated processing of logging curve peak depth correction. In this method, the reasonable peak is selected by using the extremum and variable sequence analysis method, and the position of similar curve segment is selected according to the bidirectional Hausdorff distance, then the best matching peak is defined through computing the unidirectional Hausdorff distance. Finally, the peak depth correction of logging curves is computed. The experimental results demonstrate that the method of peak depth correction has better speed and high accuracy, and it provides reliable and accurate data for petroleum reservoir development.
2012, 21(9):202-205.
Abstract:The influence of the noise is more powerful in line drawing’s internal than outline. As to this character, This paper presents a constraint-based approach to correct the line drawings with noises. Establishing the corresponding basic constraint equation from the implicit affiliation of three-dimensional plane and the parallel or vertical relationship between lines. Then, starting the iteration for the optimal location of the junctions unless meets the threshold. The approach has been demonstrated by experiments.
2012, 21(9):206-209.
Abstract:Graph Cut algorithm applies to medical image segmentation has the excellence of high precision and high accuracy. But object and background seeds must be selected by intervention in all image. Region growth is good at segmenting small region object, but seeds must be selected first and the result is not accurate when low contrast. According to the strong relativity between medical CT image sequence, GCRGIS algorithm is proposed for the segmentation of medical image. Take the contour of the first image as the edge of the second image and then segmented by region growth after erode the edge. The result shows that this algorithm is high speed and high quality. It just needs to deal with the first image by intervention and to deal with next image automatic.
YU Jin-Xia , XU Jing-Min , TANG Yong-Li , ZHAO Qian
2012, 21(9):210-213,223.
Abstract:In order to solve the problem that object tracking only based on color information always fails under the conditions of cluttered backgrounds, a tracking algorithm combining the color and structural information was proposed. Weighted color histogram based on HSV was used to describe the color model of the target, a structural model was developed by using target gray level image. The two features were fused in the frame of particle filter, the link is the calculation of the particle weight. Meanwhile, the weighs of fusing for color and structural were adjusted adaptively. The experimental results show that the proposed algorithm has more stability and higher accuracy.
2012, 21(9):214-216.
Abstract:With the rapid increase of information, retrieval technology is becoming more and more important. At present, many retrieval techniques are based on index retrieval techniques. This paper studies the search and index technology of lucene and recalculated the similarity of Lucene result and query in the Vector Space Model to improve the sort location of long query search result through the improved index information and the improved method based on content.
2012, 21(9):217-219,231.
Abstract:In this paper, we proposed an adaptive image watermarking by embedding a color watermarking image into a host color image. We divide the R, G, B channel carries on 8*8 blocks separately and makes DCT for the host color image, then insert the value of each component’ energy to three channels. The experimental results show that this algorithm has the good invisibility and robustness.
WANG Xing-Fu , CHENG Yong-Yuan , QIN Qi-Xian
2012, 21(9):220-223.
Abstract:Fuzzy C Means algorithm is popular soft clustering algorithm. It has been applied in many engineering fields. Density weighted FCM is its variant, which can solve FCM’s problem: sensitive to outlier and noise data. However, performances of both algorithms are heavily depend on proper initial cluster centers. This paper proposes a novice algorithm: Improved density weighted FCM based on nearest neighbor pair and its density, simulation results show initial center produced by the algorithm are very close to final cluster center. Thus IDWFCM can convergent very quickly and improve the performance.
SUN Zhong-Yi , JIN Tong-Biao , YIN Jin-Yong
2012, 21(9):224-227.
Abstract:In order to explore and demonstrate the advantage of TIPC in communication between processes, the TIPC was briefly introduced first, then the communication performance of TCP and TIPC was measured in full-scale. In the same time, detailed analysis was applied to the measurement data. The result got here could instruct the message package size choosing in parallel program. what’s more, the data got also indicate that the TIPC could get higher bandwidth than TCP. In this way Parallel program can be optimized and efficiency improved with communication in TIPC way.
FENG Shuang , JIANG Niang-Ping
2012, 21(9):228-231.
Abstract:This paper describes the short-range wireless data transmission, achieved by The STM32F10XXX hardware development platform composed of the Cortex-M3 processor and a special wireless transmission chip nRF24L01. At the same time, a brief description of the STM32F microcontrollers and nRF24L01 configuration, given their circuit and the program of nRF24L01. Finally, through the actual test data, it can be used in the field of wireless intelligent home control system and others.
LI Xiao-Zhi , SHEN Ji-Quan , YANG Geng-Fan
2012, 21(9):232-235.
Abstract:The random selection strategy is the basic selection method for ant colony optimization(ACO) algorithm, but it tends toward resulting in the slow convergence and premature convergence. For the above-mentioned problems, this paper proposes a new method called ant colony optimization algorithm with LionKing competition parameter(ACO-). The algorithm profits from the laws of species competition(lion) and MAX-MIN Ant System(MMAS), improved the convergence speed and utilization quality. Meanwhile, in order to avoid stagnation of the search, the range of possible pheromone trails on each solution component is limited to a maximum-minimum interval. In the end, an example of Traveling Salesman Problem(TSP) is given in the paper, which is simulated by using MMAS and ACO-. The simulation resules show that the kind of advanced ant colony algorithm improves the nature of random search, so the algorithm can converge more rapidly to the optimization answer.
2012, 21(9):236-239.
Abstract:In order to have a little affect on primary users’ transition, the second users have to be switched to another channel by the time the primary users come, therefore, the function of sensing should be attached to cognitive code in cognitive wireless network. The slow-start in TCP of cognitive code, however, is caused by the sensing and switching delay, which slow down transit-rate sharply. In this paper, TCP-CWN was proposed to get rid of the frequently slow-start. The algorithm was simulated in NS2, the experimental result illustrated that the TCP-CWN has better performance improvement than TCP when comes to transition in terms of reducing the influence of spectrum handoff in cognitive wireless network.