QI Rong-Bo , DU Jing , YANG Ye
2013, 22(11):1-6,80.
Abstract:As an important property of the software system, software security has drawn more and more attention. Security evaluation in the early phase of the software development is important to software quality and cost control. Current expert-based review and inspection methods can be error-prone and subjective. In this paper, we have proposed a knowledge-based security evaluation approach which can detect vulnerabilities in the UML sequence diagrams. With common knowledge as the evaluation reference, we can reduce the subjectivity in the result. We also have developed a support tool which can automatically perform most of the work in the method and improve the efficiency.
SHI Nian-Yun , WANG Wen-Jia , MA Li
2013, 22(11):7-12.
Abstract:By accessing to a large number of relevant documents, this paper outlined the basic concepts of Big Data and UbiCloud, and proposed data mining architecture of Big Data based on UbiCloud. Then, this thesis demonstrated the feasibility of the architecture, discussed the operating mode of it and analyzed its performance, in theory. Moreover, it analyzed and summarized the key technology involved with data mining of Big Data based on UbiCloud.
2013, 22(11):13-18.
Abstract:The effect of different level of cloud computing applications on different IT decisions vary differently, and the mechanisms of IT decisions will change at the same time. This paper has analysis the impacts of three service modles of cloud computing on IT decisions and put forward a new IT decision-making mechanism framework. Then, this paper use an case about a oversea enterprise which using cloud computing successfully to analysis and test the decision-making mechanisms framework this paper has proposed before. This paper only add a new dimension of three service modles of cloud computing to the original framework, but also provide a regime framework for enterpeise applying cloud computing.
2013, 22(11):19-25,18.
Abstract:In problem of software logic errors, nowadays it emerges more and more. The paper presents the research for model checking methods of C language, that it is the most popular and general programming languages. The model checking based on Verds tools, using C language subset into Verds model algorithm, combined with the Verds tools and MAGIC tools. Introducing the counterexample guided abstraction refinement (CEGAR) method to solve the problem of state explosion.
SHANG Ming , LIN Mao , DONG Yu-Min , YANG Min , HE Yun
2013, 22(11):26-30.
Abstract:As an important style of modern enterprise research-based company should pay more attention to improve management efficiency because of its special profit model. Management information system is an important means to enhance the management efficiency, but the development objective and the application process of the management information system will affect its result in company. A lot of management information systems become formalistic after the end of system development. It needs to be researched starting from the development goal to the development process that how to make the management information system becoming effective tools. Based on the reality of the company the management information system is developed with agile method to satisfy the daily management needs and that achieved good results.
GAO Yuan , MA Lei , WANG Jian , LIU Qiang , LIU Wei
2013, 22(11):31-36.
Abstract:While crowdsourcing is developed as a business model, it has become a new method of information exchange under the development of mobile Internet and SNS, and promoted the method of information production and exchanging on Internet. During the processes of global huge disaster relief, mass of information released by normal people have been applied and played an important role. Using crowdsourcing in the disaster relief can improve the efficiency of disaster information's collection and rescue effect. Based on the analysis of current status of disaster relief and crowdsourcing model, this paper analyzed the whole lifecycle of disaster information: production, propagation and Consumption, and studied the feasibility and key issues of applying crowdsourcing in disaster information management and disaster relief. On this basis, the paper studied the crowdsourcing-compatible disaster & emergency management system, including its' content and architecture. It showed that involving crowdsourcing into DI management and disaster relief can be implemented if deep interaction is applied with SNS system, and also raised a number of issues that require further study.
2013, 22(11):37-41.
Abstract:The thesis commits to develop a type of software applicable for the rapid analyzing and prevention scheduling of static voltage stability in large-scale power system, by bring the application of current voltage stability analyzing method in real system into consideration, reviewing speed and precision requirements for real-time analysis,use the method of anchored on the combination of sensitivity restriction and local curve fitting to detect collapse point rapidly and precisely and the method of grounded on the optimizing of generated power distribution factor to raising system load margin, to researches and develops a set of software serving for online voltage stability rapid analyzing and prevention scheduling. The software is empowered to process an example analysis to the static stability of Hunan Grid, it can meet the speed and accuracy.
GUO Xin , GAO Jin-Xing , WU Xun
2013, 22(11):42-46.
Abstract:Based on the original software system of Qrobot, an independent lottery service program is developed in this paper. Under the standard Windows operating system environment, an independent and convenient interactive user interface is provided in form of object linking and embedding control extension. By interacting with Qrobot by means of touch and voice-activated technology, Qrobot is informed the variety of lottery which is needed to query. The winning numbers and other related information, which are extracted from the specified site by utilizing web information extraction technology, can be read out by Qrobot by way of cloud speech recognition and displayed on the interface. Furthermore, this software operating system has good expansibility, network function can be added to Qrobot based on the same idea.
2013, 22(11):47-50,57.
Abstract:A system of student satisfaction based on agile and continuous integration is designed according to the principles of agile development. It provides perfect student satisfaction research data collection mechanisms and mobile analysis tools, including a variety of data analysis modes, including statistical analysis, crossing analysis, comparative analysis, model analysis. Agile development of information system has good mobility, scalability, sustainability and maintainability, not only to meet the collection and analysis of survey data quickly and easily, but also able to respond the characteristics of changing student satisfaction survey dimensions, complex and volatile models and the gathered objects of the investigationthe.The web systemis a very valuable student research network-assisted platform.
2013, 22(11):51-57.
Abstract:Model checking is a formal method to verify the system satisfies an expected property or not. Trere are two significant advantages of it, one is that it is fully automatic and the other is that if the system doesn't satisfy the checked property, it will generate an counterexamples which can help to fix errors in the system. The main purpose of this paper is to generate this counterexamples efficiently and intuitively. In order to generate the counterexamples efficiently and graphically display the operating processes of the system running alongside the concrete counterexamples, a system CCGS has been developed. Experimental results have shown that CCGS delivers an expected performance, and can help to improve the correctness and safety of the checked systems.
2013, 22(11):58-61.
Abstract:Transmission line intelligent video surveillance system is embedded video device, communication channel, the background storage server three components, embedded video device at the scene after the shooting video and images, directly on-site by chroma extraction, wavelet-based Canny edge detection tracking, vector machine classification, image recognition and pattern recognition methods, automatic identification of risk factors generated by overhead transmission line of the body and the surrounding environment, such as wire sag change, invasion of large-scale machinery construction, Bird's Nest, Gone with the Wind hanging like and then generate alarm information back to the server, saving communication costs. After three years of actual operating experience indicate that this system for the transmission line against external damage play a huge role, with broad application scenario.
2013, 22(11):62-69.
Abstract:Based on the research of Web vulnerability database and the situation of vulnerability database construction at home and aboard, the paper designed and implemented a vulnerability database focused on Web vulnerabilities. In consideration of both the features of Web vulnerability and the differences with traditional vulnerability, the paper designed the Web vulnerability database description model, enriched the ways of Web vulnerability collection, redefined the Web vulnerability scoring attributes and added the Web vulnerability reproduce function. The Web vulnerability database guarantees the comprehensive collection of Web vulnerability information and the standard release of Web vulnerability information, helps analyze the Web vulnerability information and data better, and provides a powerful technical support to Web security.
2013, 22(11):70-73,36.
Abstract:Virtual electronic experiment system is designed based on LabVIEW, including foundation and comprehensive experiment of analog circuit and digital circuit, mainly uses analog circuit experiment simulation based on LabVIEW and Multisim Co-Simulation, make full use of digital control of LabVIEW and analog simulation of Multisim. Meanwhile, the digital circuit experiments are projected by LabVIEW, bringing about opening, scalability, sharing resources of virtual instrument development platform, and also illustrates the design process of system modules by examples. Virtual electronic experiment system based on LabVIEW and Multisim not only can effectively alleviate the shortage of laboratory equipment conditions, and save the input of laboratory, but also provide new ideas of deepen the teaching reform.
2013, 22(11):74-80.
Abstract:According to the commercial Banks located in the disaster center of the description, the disaster recover system disaster not only has basic functionality, but also is a bridge connecting production core system and auxiliary system. Therefore, construction of the disaster recover system has very important practical significance. Given disaster recover system construction is a wide range and specialized system engineering, this paper general principles and ideas for the construction of the disaster recover system are studied, discussed all kinds of disaster available technology, and carries on the analysis comparison, proposed the system architecture,it has the reference value the commercial bank disaster recover system construction.
2013, 22(11):81-85.
Abstract:In order to meet the needs of service and the extension of residential property business management, the paper mainly realizes a residential property management system which based on B/S model and adopting LINQ to SQL technology. The system provides an information platform for the efficient management of property and reduces the work of the property managers. In this paper, the system architecture, development pattern and the core functions of the system is briefly introduced. It is proved by implementation that this kind of programming pattern is not only simple and quickly, but also reduces the difficulty of programming and raises programming efficiency.
2013, 22(11):86-89.
Abstract:In this paper, an IOT data acquisition and control system based on ZigBee was introduced. The IOT system hardware node is configured which uses STM32 as microcontroller and SN260 as ZigBee network processor to collect the remote environment data acquisition and to realize control functions. And describes in detail the working principle and system design of the Internet of things system.
ZHANG Yu , YANG Jian , ZHAO Xiu-Jin
2013, 22(11):90-94.
Abstract:Valves are widely applied in many enterprises, its working condition is directly related to system security and economic effectiveness. Because the industrial characteristics of scattered field of the valve installation is not easy to wiring, using wireless transmission valve state parameter monitor broad prospects. This design of micro control unit adopts Si1000 is a RF chip integrated microprocessor and wireless transceiver module, and has advantage of low power consumption and long distance transmission, compared with most existing transceiver module working in 2.45GHz. In this paper it introduced a Si1000 based wireless status monitor hardware design of the valve, and develop the initialization of the MCU program monitors from standing between master station and communication program. The measured show that micro controller for Si1000 status monitor from the station, can meet the needs of the long-distance wireless communication with master station.
2013, 22(11):95-98,89.
Abstract:In order to solve the problem of data omissions and low efficiency caused by artificial operation in the process of traditional chemical equipment inspection, on the basis of the analysis of business process, a chemical equipment inspection system is designed and implemented by using the RFID as the main data acquisition technology. This system uses four layer architecture of J2EE which implements the separation of business logic and data. The chemical equipment inspection and maintenance management can be completed efficiently and conveniently by using this system.
GUO Shao-Yang , QIU Di-Shan , ZHANG Bin
2013, 22(11):99-104.
Abstract:The problem of service scheduling is proposed after the design of structure and function of Satellite Information Application Chain(SIAC). After introducing some basic conceptions about the service scheduling problem of SIAC, the QoS parameters of SIAC and the calculus algorithms are discussed, which can be used as criterions for performance evaluation and service selection of SIAC. After that, the mathematical model of service scheduling problem of SIAC is established, and service scheduling algorithms based on GA are presented. The experimental results indicates the proposed QoS parameters are effective for the evaluation of SIAC and the QoS-based method used for SIAC service scheduling is feasible.
GONG Qing-Ge , SHEN Xiao-Fei , WANG Wen-Jun
2013, 22(11):105-109.
Abstract:By analyzing the basic theory of CA and improving the algorithm of occupant psychology, we simplify the complex algorithm of Euclid space distance, which reflect the occupant psychology of crowds and improve the quality efficiency of the rejection of dangers and the appealing of the exits. This paper mainly studies the effect of the density of crowds, the width of the exits, the occupant psychology of the crowds. The results show that the evacuation time grows linearly with the amount of the crowds, and decreases in negative exponent with the width of the exits. Follow the crowds blindly will cause congestion because the low efficiency of evacuation.
2013, 22(11):110-114,94.
Abstract:Nonlinear dimensionality reduction method is more sensitive to the noise in the high-dimensional data, resulting in relatively poor final results of classification. In order to make up for its shortcomings, this paper proposes a method in the premise of using the maximum likelihood estimation method to estimate the intrinsic dimension of the sample data, which combines the isomapetric mapping with the principal component analysis. On the one hand, the method enables the original data to maintain its geometry in the high dimensional space, on the other hand, the method can eliminate the influence of noise on the dimensionality reduction results, eventually making the low-dimensional data as much as possible to maintain inherent characteristics of the original sample data sets. Experimental demonstrations show that the results of combination method is better than separate isometric mapping and separate principal component analysis.
KE Xuan , SHI Ying , LIU Shi-Zhu
2013, 22(11):115-118.
Abstract:Currently,prestack reverse-time migration is the most accurate imaging method for seismic data in seismic prospecting domain. It extrapolating the wave field with the two-way acoustic wave equation, and it can image complex geological structure accurately. The cross-correlation imaging condition is used for the imaging of source wavefield and receiver wavefield at the same time in the paper. For computationally intensive problems of RTM,we introduce the graphics processing unit (GPU) into RTM algorithm, and exploit the multicore advantages of GPU. In this paper,we use the parallel acceleration algorithm base on the CUDA architecture to replace the serial computation on the traditional CPU and accelerate the process of the wavefield extrapolation and cross-correlation imaging in reverse time migration. The test on complex modeling show that we can achieve imaging result for complex medium with high efficiency and precision by pre-stack reverse time migration algorithm base on GPU acceleration. Under the premise of ensuring the calculation accuracy of the RTM, comparing with the traditional CPU calculation,GPU parallel acceleration algorithm can improve the computational efficiency greatly.
WANG Yang , YAN Xiao-Jing , WANG Meng-Yao , CHEN Fu-Long , ZHAO Chuan-Xin
2013, 22(11):119-122.
Abstract:In order to solve the propagation problem in the public opinion's spread process in the dynamic and uncertain Web community, we proposal a model which combines the gray theory differential equation model with the extended BP neural network model based on the analysis of gray theory system. Firstly, according to the network structure and propagation characteristics, the differential equation model of gray theory is established. Then, the model was mapped to the extended BP neural network. Finally, through training the neural network, the network model owns an ability of propagating prediction. Simulation results show that the combined model has a higher accuracy ratio than the single GM model in the propagation prediction of the Web community of public opinion's spread.
LIU Wei , MENG Zhao-Hui , XUE Dong-Wei
2013, 22(11):123-128.
Abstract:To solve the problem that single feature can't describe the nonlinear moving targets accurately under complex environment, this paper propopsed a adaptive method which is based on multiple features and particle filter.It first extracted contour direction distribution and color distribution from the target area.And then with help of particle filter theory, it integrated these features to track nonlinear moving targets from the video. In the end, CUDA can provide powerful parallel computing capacity so that this proposed method can be accelerated and meet the need of real-time monitoring. The experiment results of this paper indicates that the proposed method has strong robustness and high accurateness for non-linear and non-Gaussian moving targets. Moreover, it can cope with the situations of targets occlusion or temporarily disappering, focal length transformation and background changing.
LI Yuan-Xin , XIAO Ru-Liang , CHEN Hong-Tao , ZHAO Ting , LI Hong-En
2013, 22(11):129-134,158.
Abstract:In collaborative filtering algorithm, similarity calculation method is undoubtedly the key of the entire recommender system, and determines the recommended quality of recommender system. In order to improve the precision of similarity calculation, a new similarity calculation method based on time decay is proposed. In this method, the similarity between the objective item and common-scored items is taken into account when calculating users similarity, and the influence of time information is taken into account when calculating users and items similarity. Experimental results shows that this method can effectively avoid the lack of the traditional similarity calculation method, and make the recommender system gain better recommendation result.
ZHANG Zhi-Qiang , SONG Hai-Sheng
2013, 22(11):135-142.
Abstract:A simplified strategy and a segmentation algorithm to modify LOD for large-scale 3D riding scenes are presented. The simplified strategy based on the nodes of least square roughness is applied to simplify the complex meshes of scenes. The decreased accuracy of the error model and the variation of roughness values are solved by modifying Lindstrom algorithm and adding rules of simplification. Then the simplified model is segmented by the multi-channel cutting algorithm. The scene data resulted from the segmentation is judged by an evaluation system based on the error factors. Finally, the comparison with the traditional algorithm proves that the simplified strategy and the segmentation algorithm proposed by the paper are more effective to reduce the complexity of the large-scale 3D scene rendering and accelerate the real-time display of scenes.
2013, 22(11):143-147.
Abstract:In Efros's classic image quilting algorithm for texture synthesis and transfer, edge information of a target image is not used in the search of blocks to match. We present an improved algorithm where a new edge item in terms of gradients is added to the original error formula for ensuring a better matching block, and a preprocessing strategy named luminance remapping is introduced in the transfer process. The experiments show that the transfer results of our algorithm are better than the traditional one, especially in the part of edges.
KUANG Ya-Ping , WANG Lei , LIU Xiao-Long , HUANG Cheng-Zhen
2013, 22(11):148-153.
Abstract:Green cloud computing aims at reducing the cost of cloud services in the premise of guaranteeing the quality of service(QoS). To solve this problem, we make a trade-off between migration performance and energy consumption. The basic idea of this paper is to concentrate workloads into a minimum set of nodes and close the idle ones to save energy. At the same time, we consider the performance of Virtual Machine migration to guarantee the QoS. The experiment result shows that this strategy can reduce the number of open node and give consideration to migration energy consumption and migration delay. So it guarantees the QoS in the premise of saving energy.
2013, 22(11):154-158.
Abstract:A shadow fading caused by obstructions in the surroundings of transmitting has an important effect on wireless sensor networks. It makes an object to be probabilistic sensed by more than one node. An optimal geographical density control algorithm in wireless sensor network based on probabilistic was proposed. By choosing the optimal nodes, this algorithm reduced overlapping area that satisfies covered quality as much as possible to minimize working number. The simulation results show that this algorithm can minimize the total number of nodes.
2013, 22(11):159-164.
Abstract:Aiming at improving multiple tags reading efficiency in RFID, it analyses the binary search anti-collision algorithm, and puts forward an improved binary tree half search algorithm. By constructing a Huffman tree, using a custom code, using the stack operation to determine the collision bit, with a half search method to reduce duplication of path, ultimately determines the shortest path length. Data analysis and experimental results show that, the binary tree half search anti-collision algorithm can significantly reduce the search depth, and improve the work efficiency of RFID tag reading.
NIE Peng-Yu , PAN Wei-Hua , XU Yun
2013, 22(11):165-170,142.
Abstract:Nowadays, with the rapid development of the next generation sequencing technologies, metagenomics have become a new hotspot,However research in metagenomics faces the issue of binning --- identification and taxonomic characterization of the NGS short reads. To solve this problem, this paper first analyzes the next generation sequencing technology characteristics, statistical characteristics of metagenomic sequence, then proposes a new clustering method for DNA sequence binning. Test results show that this method has a very good clustering accuracy. In the same time, we developed an software for metagenomic binning based on this algorithm MetaBinning.
2013, 22(11):171-175.
Abstract:Abstract: Nowadays, the energy state has not been introduced completely into the routing evaluation system in most routing algorithm of Ad Hoc networks. In order to solve this problem, the AntNet algorithm in this paper is improved appropriately to memory and evaluates the changes of the energy state in entire path. Data structures, rules of selecting next node and rules of updating data structures are described in detail in this paper. By Simulation study and analysis, the lifetime and throughput of the Ad Hoc networks can be increased by the improved AntNet algorithm by using the route in which the average energy of each node is higher and more stable.
YANG Cai-Fang , ZHUANG Yuan-Chang , MO Xiao-Dong , WU Xin-Ming
2013, 22(11):176-178,212.
Abstract:According to the low degree of welding automation on complex curve, the paper designs the numerical control system of automatic welding. The system uses PCL6045B motion control chip, the most control 4 axes, and the system can weld the complex curve line, improve the welding efficiency and welding precision. The system has built-in soft PLC, and the soft PLC can perform automatic control on welding machine, fixture and other peripheral mechanism. Feedback from its application on welding machine indicates that the system works reliably.
ZHAO Jian , FENG Quan , YANG Mei , HE Kang , LIU Juan
2013, 22(11):179-182.
Abstract:In order to protect privacy of fingerprint when remote authentication is carried out by using equipment with limited computing resource, a scheme which performs the minutiae matching based on bitonic sorting network is adopted. The protocol achieves high efficiency on computation and communication by computing private two-party set intersection problem with garbled circuit. The processing of the garbled gates is pipelined to avoid the need to store the entire circuit and to improve the running time. The proposed scheme is capable of implementing remote authentication on mobile phone or embedded equipment with less memory.
2013, 22(11):183-186.
Abstract:To ensure the security and anti-disturbing of hiding image information under the conditions of visibility, An image hiding technology based on chaos systems was presented. Firstly, with the Arnold transform and the sequences generated by the chaos system, a hiding image was encrypted; then using Logistic chaos system and image sharing technique to hide the pre-encrypted image. The effect of hiding is also analyzed by using the method of accessing. Simulation results show that the algorithm has good safety and hidden effect.
2013, 22(11):187-189,203.
Abstract:The multi-core processor is widely used in embedded systems because of its potential advantage in power consumption and data processing capability. The debugging difficulty of parallel programming will directly affect the release time of products. The complexity of the debugging will rise in index rate with the increase of cores. To resolve the common abnormal issues in multi-core platform, this thesis introduces a type of debugging method of the multi-core embedded system to trace simple executive programs by means of analyzing of the working mechanism of MIPS architecture, which makes the debugging of multi-core platform more convenient.
2013, 22(11):190-194.
Abstract:We propose a MAC protocol based on node residual energy and the number of channel conflict(EC-SMAC) according to WSN's characteristic that energy is constrained and competition window is fixed when backoff. The proposed protocol improves competition backoff mechanism of SMAC, it dynamically adjusts competition window according to node residual energy and the number of channel conflict, thus reducing conflict between transmission nodes and balancing network load and extending lifetime of network. Simulation results show that our proposed protocol extends 7% lifetime of network under the premise of ensuring network throughput and stable delay.
2013, 22(11):195-199.
Abstract:As being more and more widely used for data exchange and integration, the XML data quality issues cause more concern. In order to overcome the problems caused by data quality, Entity Resolution(ER) is critical. To overcome the drawbacks of current methods's deficiency and perform entity resolution efficiently and effectively on massive XML data set, under the basis of Entity Resolution, an XML data duplicate detection based on hadoop platform algorithm is presented in this paper. The method uses entities to describe their atrributes. By the comparing of the attributes,we can find all the objects that have the same attributes quickly. Meanwhile, taking the advantage of the Hadoop platform which can process massive data parallel. From the experiments, the method has excellent performance in scalability, flexibility and efficiency.
2013, 22(11):200-203.
Abstract:Describes the Oracle RAC's basic concepts, classifications and structure system and the basic principles. Combined with the demand for business solutions based on Oracle RAC. Implementation of the basic Oracle RAC database shared storage, file storage, and network settings, planning and deployment. Achieved automatic failover without user intervention, which greatly enhance the availability of the database. Have a certain significance to Enterprise database application and Construction.
WANG Jian-Fei , MA De , HUANG Kai-Jie , CHEN Liang , HUANG Kai , GE Hai-Tong
2013, 22(11):204-208,217.
Abstract:A coprocessor specially applied for encryption and decryption flow control was designed. According to the specific application requirement, a kind of reduced 8-bit width instruction set was designed with 32-bit data width design compliant to SoC system. The coprocessor adopted 3 stage pipeline design with data bypass design to prevent data hazards. Joint test with secure IPs showed that the coprocessor could control the encryption and decryption flow flexibly. Experiments on SM1 encryption proved that the coprocessor could provide better performance than the main processor and release main processor resources. The Design Compiler synthesis result showed the coprocessor occupied only a small area.
LI Jian-Xun , LI Wei-Qian , GUO Lian-Li , DENG Zhao-Hui , LIU Si
2013, 22(11):209-212.
Abstract:In view of the shortage of existing complex network analysis software on describing R& D team, a complex network model and its description method is built based-on JGraph component, which possessing attribute, diverse relationship and mutual operations. Taking information organization, node classification, establish relationship and network exibition as the core procedure, a R& D team's complex network modeling scheme is provided. Then by adopting J2EE technology, a demo system is realized with integrating JGraph and JFreeChart component, which providing a visual thinking of combining complex network theory and enterprise actual situation, and lay a well foundation for model-mapping, index analysis and dynamic evolution.
2013, 22(11):213-217.
Abstract:Analyzing the process and the information isolated problems of the information technology application in complicated product manufacturing, and the urgent requirement for the enterprise information integrated plan. Combining with the enterprise practice, it promotes the overall idea for the information integrated plan and implement based on merging information technology and industrialization for the complicated product manufacturing, and the major statement is focused on the key technical contents and examples of the data management plan, the BOM based business information data related model, the system integrated data related definition and the standardization "data from source" management.