CHEN Yun , JIA Gang-Yong , LI Xi , ZHANG Hai-Peng
Abstract:The dynamic voltage and frequency scaling (DVFS) is one of the most effective mechanism for power management. Firstly, we point out the most shortcomings of the current DVFS mechanisms after detailly analyzing;so we propose a task behavior based DVFS mechanism (TC-DVFS). TC-DVFS has three levels: First, gather the system call information of the task. Second, distinguish the critical system calls and characterize task behavior with them;Third, construct a feature database based on task behavior and guide DVFS according the database. Adding TC-DVFS into linux kernel, experimental results show TC-DVFS reduce 5% miss rate of the correct frequency scaling and 5% power of the system, and also improve 10% performance of the system.
FENG Shuai , SU Chang , CHEN Yi-Jiang
Abstract:Aim at the low coverage of current hand-coded knowledge base used in the metaphor recognition, a Chinese nominal metaphor recognition method based on exploiting the online encyclopedia resource is proposed. A noun is represented as a page in the encyclopedia. Capture the world knowledge from the page of encyclopedia, calculates the relatedness between the pages of the two nouns in the nominal reference by applying information retrieval methods. The relatedness determines the reference is metaphorical or not. The experimental results shows that the accuracy of metaphorical/normal references recognition can reach 81.06% by using BaiduBaike. It supports the validity, efficiency of this method.
Abstract:This paper introduces a method to detect operating system deadlock. The method consists of three stages: (1) finding the lock-holders by detecting whether the locks and unlocks are paired. (2) finding the lock-waiters by filtering the abnormal process. (3) the method will occur deadlock warning if there is a cycle in the waits-for graph. The results show that the method has only 1% influence to the performance, and does not need to modify Linux kernel and detected program source code.
Abstract:Post information network is made up of two parts which integrated network and financial computer network of post. The design of security mechanism to postal information network is one of the key question in construction of postal information. It relates to great benefit of post enterprise, affects construction result of total system directly. This paper starts out from every systematic application and security needs, it analyses and studies about related technology of security network, raises a security mechanism of postal information network in view of technology for Kerberos and RBAC. The solving schemas pays a special attention to combine with postal information network closely, having higher reference value.
BIAN Yi-Jie , MA Ling-Ling , MEI Jun
Abstract:This paper analyzes the characteristics of the gray literatures and discovers the existing problems of the quality control to the gray literatures in the university institutional repository. Based on the deficiency, this paper proposes an effective method for solving these problems. The essence of the method is to construct an evaluation index system and a users' credibility evaluation index system. And through the weights of the both indexes, we can obtain the evaluation weight for the gray literatures. Then giving different literatures with different access rights according to the evaluation weight with grouping criteria based on what we classify the literatures. By using this method can we construct quality control mechanism of gray literature for university institutional repository and root up the problems above-mentioned.
LI Xuan , WANG Wei , ZHANG Wen-Bo , FAN Guo-Chuang
Abstract:Cloud computing has emerged as a new paradigm for delivery of computing resources. It has brought great opportunities to performance testing. A four layer model for cloud-based performance testing is proposed. At the same time, an admission control and scheduling algorithm is also designed. All this can achieve the flexible management and dynamic dispatch of shared resources, which are pooled for load generation. The requirements of multi-tenancy can also be implemented. Based on the above mentioned proposition, an available tool, Bench4Q is migrated to the cloud.
HU Hao , ZHU Qi , SHANG Yi , LI Qian
Abstract:Cloud computing provids a large number of virtualized resources management approach, the resources in the cloud computing environment are highly virtualization, scalability and dynamic. This paper summarized cloud computing concept, serice models, advantage and application models. It analysis the difficulties, characteristics of information technology in enviromental protection, proposes a program about enviromental information cloud computing platform architecture, evaluates the application effects. Finally implement strategy is given.
LIU Xiao-Long , WANG Lei , KUANG Ya-Ping , HUANG Cheng-Zhen
Abstract:With the rapid development of mobile Internet technology and smart handheld devices in recent years, IPTV facing the demand of multi-screen integration. Scalable video coding technology can be a good solution to the differences in network speed and resolution of device. In this paper, we design and implement an HD real-time system of IPTV based on H264/SVC standard. The finalized H264/SVC standards are able to achieve scalable coding in the temporal, spatial, or fidelity domain. This paper presents a detailed introduction of TS encapsulation, AVC decoding and the encapsulation of SVC. By encoding the video in real-time, users with different bandwidth and device resolution concurrent viewing program in real-time. In the end of the paper, the experiments proved the effectiveness and stability of the system.
ZENG Yi-Hui , LIU Gao , LUO Xiang-Yuan , WANG Dao-Long
Abstract:The paper introduces composition and principle of ground current online monitoring system of high voltage cable metal sheath from hardware structure and software design. The system integrated application of a variety of techniques to achieve Large current sampling and Temperature sampling, GPRS data transfer, SQL server data storage, Web data display and threshold alarm function. The system has been successfully developed, it provides a new, efficient, stable, low-cost method for cable metal sheath ground current monitoring, the system has good prospects of application.
Abstract:In view of the need for the development of business processes designed to handle each configuration page, configuration page is not intuitive and very cumbersome and so on. In this paper, the open source JBPM workflow based on the secondary development, using eclipse SWT and GEF (Graphical Editing Framework) technology to develop process designer, it provides a flow chart of the visual design features, through drag-and-drop and edit the relevant properties to complete the design of flow chart. Using of JWS (Java web start) technology transform the eclipse plugins into RCP applications running from the eclipse environment.
Abstract:In order to satisfy the real-time transmission of video required by intelligent safeguard systems and smart home, this paper implements an embedded real-time video transmission platform based on TMS320DM365 processor. This system utilizes the TB-2054BD camera to capture the video, and then send to the co-processor of DM365 to compress the data, the compressed stream will be encapsulated into RTP packets and finally send to the PC client to display after decoded. It has proved that the system has a good performance on real-time video transmission.
ZHOU Li-Jun , XING Hong-Hong , ZHANG Jie
Abstract:Based on the problem of heterogeneous information among different systems in the field of Ordance Support, and in view of the characteristic of metadata, the thesis raises a solution to resource sharing of Web Service on the basis of metadata. In this thesis, we designed a transitional information format which names SXML, as a bridge of information exchange. JDBC and JDOM are respectively applied to the design of Wrapper and Parser, and the exchange of heterogeneous information was realized finally.
Abstract:The Web Information Extraction and Knowledge Presentation System is proposed to extract information from data intensive web pages. It downloads dynamic web pages, based on a knowledge database, changes them to XML documents after preprocessing, finds repeated patterns from them, by using a PAT-array based Pattern Discovery Algorithm, recognizes their data display structure models, automatically based on the repeated patterns and an ontology-based keyword library, and then extracts the data and stores them in the knowledge database with the object-relational mapping technology of XML. Through these steps, web data is extracted automatically, and the knowledge database is also expanded automatically. Experiments on the traffic information auto-extraction and mixed traffic travel schemes auto-creation system showed that the system has high precision and is adaptive to web pages in different domains with different structures.
Abstract:Utilizing the latest embedded technology, we built an ARM-Linux embedded development platform and a portable γ ray spectrometer which can undertake multitasking and has powerful real-time performance,low power consumption. Firstly, a multi-channel pulse amplitude analyzer was designed, and then both the A/D transition driver module and multi-channel pulse amplitude analyzer interface drivers were developped. Finally using QT/E lib, a software that can analyse and process spectrum data was also developped. Base on the above development, localization of time and space was also integrated in the spectrometer with GPS module.
Abstract:With the development of society, security of military barracks is facing many new problems, the traditional means for identity authentication has security hidden danger. Biometric technology provides technical support for solving the camp security problems, and iris recognition technology has the highest security, fulfil the army needs for safety. The basic principle of iris and iris recognition system is analysed, the current development of iris recognition technology is also summarized, pointing out the technical difficulties in the field of iris recognition and it's future developing direction, finally the application scheme of an iris recognition system in the army barracks are given.
KE Xiang , CHEN Xiao-Ping , JIN Guo-Qiang , WANG Feng , GUO Qun
Abstract:For the requirements in practical application of indoor service robot, a real-time object recognition system is proposed which integrates 3D point cloud segmentation and local feature matching. First, it does fast and effective object detection based on 3D point cloud. Then, the areas of objects in color image are located using the result of object detection, and objects are identified using the approach based on SURF feature matching. The experiments show that the system could well meet the real-time and reliability requirements of indoor service robot's object detection and recognition.
ZHOU Ye , PAN Luo-Ping , TAN Zhi-Feng
Abstract:For the needs of various applications with condition monitoring data of hydraulic machinery, the paper describes an open modular data analysis and application platform, and provides the design, functions and application principles for the platform. Which are difficult to implement just like modules standardizing and data sharing with modules, it gives solutions with Dynamic Link Library and memory mapping. By using open form framework and API function, we can make it possible for collaborative development and decrement of system functions coupling. The platform can provide a basis and framework for apply different data mining technologies of hydraulic machinery.
WANG Zhi-Yong , MIN Xu , XU Bao-Guo
Abstract:With the development of science and technology, smart home is coming to our life, in order to create a good and comfortable home environment, this paper proposes a smart home design program. The research based on the microcontroller with Cortex-M3 Kernel use NRF24AP2 as wireless receiver module, LabVIEW as development platform. This program Remote monitoring users' home by GPRS technology and its anti-fall detection for elderly people at home alone provide more security for the old people, It has a Stable performance in practical use.
2013, 22(10):100-102,99. CSTR:
Abstract:According to vehicle theft in the residential parking area and the disadvantage of the modern automobile anti-theft alarm products which is short distance and low reliability,a new guard against theft and alarm system for vehicle is developed in this paper. The vehicle in the residential parking area to be monitored in real time by using multi-sensor technology, then the alarm information is sent to the car owners and parking management office according to the short-range wireless communications network and GSM SMS platform, it achieve a short-range wireless data transmission and remote alarm.
ZHANG Zheng-Wen , XUE Bin , HUI Jian-Zhong
Abstract:With the continuous economic and social development, real time meteorological service has become more and more important in people's daily life. Accurate and efficient delivery of the weather information can assist in daily decision-making. At present, most of the real time meteorological service is established in the Internet based on Ajax, Flex and other techniques. Some foreign expert has carried out using mobile networks and voice recognition technology to provide more convenient services. This paper introduces a real time meteorological service implementation based on the mobile network for mobile end-user. Considering the constraints of the service mechanism of the meteorological department, this implementation is aimed to obtain the real time weather information of local weather station automatically by using the location function of mobile devices through request information. As a technical realization different from Internet, the work described in this paper can be used in other business areas.
Abstract:Be aimed at the characteristics of subjectivity and uncertainty of trust in the Web service, a trust modeling method based on the cloud theory was proposed. The calculation methods of direct trust cloud, recommendation trust cloud, comprehensive trust cloud and the update algorithm of trust based on the weight of time was also presented. Meanwhile, this model use the information of the service capacity that resources could achieve to quantify the trust of service, which enhances the objectivity of model. It can evaluate the real level of trust and increase the interaction success rate of entity. The experiment and analysis results show that the cloud-based trust model proposed performs well in network.
ZHAO E , YANG Bo-Wen , YANG Guan-Zhong
2013, 22(10):114-118,168. CSTR:
Abstract:The traditional feature model has some problems, for example, the inaccurate software product line variability requirement's expression, lack of feature description methods. Based on the FODA(Feature-Oriented Domain Analysis) methods, this paper described the feature model's hierarchy decomposition, the dependency relationship between the features and the variability expression methods, put forward a feature model and a feature description method which are suitable for software product line. The feature model can help the product designers and developers understand product requirements correctly, and lay the foundation for the later automated production of software product line.
YIN Xiao-Hui , DONG Yan-Fei , PENG Shi-Chong
Abstract:The target allocation is one of the core content of the collaborative tactical decision of multiple-plane air combat, belonging to the allocation of resources as well as the optimal assignment problem, in line with the minimum cost flow algorithm for solving field. Based on combat situation assessment and comprehensive threat assessment model, a minimum cost flow target assignment model is established. The model is based on the threat assessment results, with the minimum cost flow algorithm processing, finding out the shortest path from the starting point to the end point of a network flow graph, after repeating iteration, until finding the minimum cost flow, multiple-air-combat target is achieved to reasonable allocation. Finally, an example is presented to verify the feasibility of the model.
Abstract:Godson-T cache coherence protocol is used in Godson-T many-core architecture. In Godson-T, there is a close tight coupling relationship between cache coherence protocol and memory consistency model. In our research of Godson-T, we found that its cache coherence is relaxed unlike other cache coherence protocols. We choose Murphi as modeling language and verification tool. Thus, when we modeling Godson-T, core, cache and memory must be take into account as a whole. Some invariants and properties has been verified with Murphi.
2013, 22(10):129-131,154. CSTR:
Abstract:The study is on version storages issues of the version management in the product collaborative design. Based on the analysis of the current version incremental storage and complete storage technologies, this study poses a new version storage model of product collaborative design which will combine inverse incremental storage with complete storage. The storage structure of version is defined as a two-way version of the list according to their parent-child relationship, when the design process produces a new version, it will be stored in the list structure of version by the way of repeated iteration and insertion, in order to achieve the fast storage, save the storage space and improve the security of the version storage in the product collaborative design process.
Abstract:RFID plays the core role in the internet of thing, tag-collision is a key issue and must be addressed for radio frequency identification. Aim at the problem of tag-collision in RFID system, this paper analyzed ALOHA algorithm and it's enhanced algorithm in detail. An new ALOHA algorithm based on Fibonacci Number was proposed, and the strategy of changing the frame length was established. The simulation indicated that the proposed algorithm can improve the throughput and load of RFID system.
2013, 22(10):136-138,187. CSTR:
Abstract:This thesis analyzes the traditional ID3 decision tree classification algorithm and performance by using data mining, using the theory of differential knowledge in higher mathematics, improves and optimizes the operation speed and the test attribute selection bias problem in ID3 algorithm, and further gives the pseudo-code of the improved algorithm.
DUAN Pei-Yong , WANG Yu-Hong , LI Hui
Abstract:While WinCC is able to configure interface and archive data as a powerful HMI system, it is inadequate for complex data processing such as data query, computing and statistics. In this paper, the WinCC archiving database is connected with Access database and EXCEL based on VB, then an exe file is generated and can be directly called by WinCC, in which case experimenters can select data storage method and path according to their preferences and accomplish conditional query and complex processing for data.
ZHUANG Jian-Dong , ZENG Yong-Jin
Abstract:For show realism and real-time simulation of ocean wave, this article is based on Pierson-Moskowitz model, uses waves of wavelength and wave velocities to establish a wave-height of the initial state value. By FBM (Fractal Brown Motion) calculation in diamond grid each grid point waves on the surface of the wave height, draw each point;With diamond-shaped grid simulation for wave shape, describing the waves of wave height as multiple sine wave superposition approximation over time and space to the motion of the waves;Illumination model for wave added dark bump effect, increase the realism of the waves;A wave in a real-world image as the source texture, posted on each grid, improving the fidelity of the simulation and run faster, achieve the purpose of simulation in real time. Using Java and JOGL programmable analog, we realistically generated waves under different wind speed in different types of scenes. Experiments show that the mentioned in the article is right way, technically feasible.
Abstract:So far, there have been many different algorithm of eight queens problem. A similar sieve algorithm is presented in this paper: Using a algorithm similar to the sieve method in number theory: place the first queen in the first grid of the first row, and mark out the row, the column, the downward diagonal and the upward diagonal through the first queen;then place the second queen on the most left grid of the unmarked grid of the second row, and mark out the row, the column, the downward diagonal and the upward diagonal through the second queen;like this, queens are added, one by one. if all the queens can be placed on the board, a layout or a solution received. Traversing all grids of all row, we would get all solutions of N-queens problem. Based on the simple idea, we can develop a N-queens program easily. The experimental results show that the efficiency of the sieve program is much higher than the classic backtracking program.
Abstract:With the rise of YouTube, Flickr, Last.fm and other social networks, tagging systems play an increasingly important role in our everyday life. Analyzing user's tagging behavior of different resources is very important in providing high quality services. In this paper, major community structure detection algorithms are implemented in clustering analysis in tagging system. By comparing their performances on different datasets, a personalized recommendation algorithm for tagging system is designed. Experimental results indicate that the proposed algorithm performs well in detecting different user interests and thus enhances the quality of the recommendation system..
Abstract:Preventing an attacker to take advantage of Web application security vulnerabilities, some traditional practices have been used by Web developers is not suitable for the new generation of Java-based development platform quickly. By understanding the new concepts and technology, and combined with OWASP recommendations for conventional risk, this paper explore some common practices which should be followed by Web developers, when using Jboss Seam to build Web applications.
JIANG Jin-Wei , WU Rui-Ming , LIU Yun-Feng
Abstract:Internal defects are the main factor which affect the quality of welded structures. In order to analyze the internal defects of the weld, image data with high sensitivity and sharp edges is needed to acquire. Detection method of noised color image edge based on morphology is proposed according to the characteristics of the welded defects and specialty of sound image. This paper achieves the effective segmentation of the defect information through filter process of original image, distinguishes the characteristics of defects by mathematical statistical method based on characteristics of defects. Finally, experiment proves that this method have a relatively good result for correct identification of the defects.
Abstract:This paper introduced the background knowledge of Artificial Neural Network and a way to use BP network to recognize printed characters was proposed, which was implemented with C language. After a lot of experiments, the experimental results show that the character recognizer has good validity and correctness. Besides, the printed characters can be recognized successful within the reasonable range of error.
TIAN Yang , YANG Jiao-Ping , ZHANG Li-Feng
Abstract:The mathematical model of Enterprise transfer alliance vehicle routing problem based on fuzzy demand is established, and the problem based on fuzzy demand is transformed into a clear demand through the structured element theory. In order to solve this model, the chaos particle swarm optimization algorithm is proposed, this algorithm adds two chaotic transform in classical particle swarm algorithm, it has a good performance by combining particles swarm optimization with the chaotic partial searching.
TANG Chang-Cheng , YANG Feng , DAI Dong , SUN Ming-Ming , ZHOU Xue-Hai
Abstract:HBase, a NoSql database under Apache Hadoop, is an open source data storage system based on column family. Researches and applications based on HBase is more and more popular. But the size of memory buffer become a key factor to influence system performance as HBase will buffer data in memory before store them on file system. In this paper, we provide a new method based on copied log named Remote Log Process to make HBase perform better on write operation with different buffer size while keeping data durable and available. Experiments result indicates RLP can get a steady performance with different buffer size under the condition to guarantee durable and available of input data, while perform much better than pristine systems if the buffer isn't larger then default value.
LI Yong-Cheng , ZENG Yong-Hu , CHEN Lei , LIU Guo-Zhu , LING Qing
Abstract:In modern agriculture acquisition systems for the enviremental factors(temperature, humidity and so on), traditional wired communications are subject to the constraints of environment, costs, and data transmission distances, etc. In this thesis, we establish a wireless sensor networks to realize real-time temperature and humidity data acquisition and monitoring from different areas in a greenhouse with wireless sensor nodes;Simultaneously, we control the mechanical and electrical equipment by the control node in the wireless sensor networks to turn on or turn off the equipment (such as skylight, wet curtain, sunshade, fan, etc), according to the optimal growth conditions which are required by the crops in the greenhouses.Therefore, design a wireless adaptive system for the enviremental factors is one of the effective ways to solve the problems which occurred in the wired communications.
2013, 22(10):188-192,217. CSTR:
Abstract:Calculate the response of the excitation plate on the effect of dual-exciters. Get the conclusion of the relationship between cutting uniformity and initial phase difference/centrifugal force/frequency. The result shows that initial phase difference has no effect on the uniformity, but can improve the uniformity by control centrifugal force and frequency of exciters..
CHEN Jian-Ming , WANG Hong-Yan , JIN Chuan-Yang
Abstract:This paper conducted in-depth analysis and research of the problem of the lack of armored vehicle computer system usability evaluation index system.This paper firstly studied the basic principles of building the usability evaluation index system of armored vehicle computer system, then analyzed the main contents of usability evaluation, finally it brought forwards the usability evaluation index system of armored vehicle computer system from the effectiveness, efficiency and satisfaction aspects. The research shows that usability evaluation can not only find usability problems of armored vehicle computer system to provide basis for designer, but also improve system to give reference for the seller..
WU Miao , WU Jing , LIU Qian , LIU Hao
Abstract:In order to establish a scientific drug information service evaluation system, we carried out a systematic survey of the pharmacy and patient information in Fourth Affiliated Hospital of Xinjiang Medical University by the questionnaire. To analyze and evaluate the pharmaceutical drug information service elements, we used SPSS Statistics and Excel software to process the data collected. Then we analyzed the reliability and validity of the questionnaire by the Cronbach's alpha coefficient and factor analysis method etc. We were trying to propose the elements of the hospital drug information service. Result: The process and methods of this study provide important reference for others in the drug information and the other information analysis.
2013, 22(10):203-205,197. CSTR:
Abstract:Carrousel oxidation ditch has been widely used in sewage disposal system, however the result of sewage disposal was affected by water quality and environmental factors, so it is difficult to build a precise prediction model. The existing method of machine learning algorithm usually gets a poor result in prediction. In order to precisely predict the result, this essay uses the multi-kernel wavelet support vector machine when build a model. The outcome of this experiment demonstrates that the new method improve the degree of definition in forecasting, and it is suitable for actually online prediction.
2013, 22(10):210-212,107. CSTR:
Abstract:Based on the embedded GPS navigation system is under linux, audio, video playback, multimedia entertainment software. Using GPS technology, electronic mapping technology, touch screen controls and LCD display technology, based on the ARM9 of S3C2410 development of platform and embedded Linux system using Qt/Embedded graphical user interface development is completed, the system has a good operation interface. Electronic map, using the A * algorithm to achieve the shortest path, reduce system development costs, to solve the GPS location and function of the shortest path. The design principle is clear, easy to implement and has certain actual application value.
XIANG Jie , QIU Ze-Jing , PENG Xu-Dong
Abstract:The problems in the electric energy management system, such as real-time communication and networking, can be effectively solved through embedded communication manager. In this paper, the framework of the electric energy management system instituted by embedded communication manager was analyzed, and the scheme of the communication manager based on MPC860T processor and Nucleus PLUS operating system platform was proposed. Moreover, the principles of hardware system and software design were specially introduced. Finally, the electric energy management system based on communication manager was proven applicable through testing.