WEI Wei , WANG Dan-Dan , LIU Ming , LIU Jing
2013, 22(2):1-4,52.
Abstract:With the rapid development of computer vision, analysis of the human movement has been widely noted in computer vision areas. This research on the human movement is about the whole human motion, including extracting joint points first, then trcking the feature points and calculating the 3D coordinates of the points and display. The paper introduces from current situation of the three aspects.
2013, 22(2):5-9.
Abstract:Web application security issues have become increasingly prominent, to improve the security of software source code and control the security risk during software development process becomes an urgent problem.This paper analyzes common web applications security vulnerabilities, including defect forms, causes preventive measures. This paper also puts forward some measures and methods in the prevention of security vulnerabilities during the software development life cycle. This paper also gives a method which can reduce security risk from two aspects-software development process management and technical measures. These means effectively imporove the security of web application we delivered.
2013, 22(2):10-14.
Abstract:Network covert channel is a transmission scheme which hides the confidential information to normal network channel. Network covert timing channel does not modify the network packets, therefore it is more difficult to detect and more dangerous. This paper presents a new network covert timing channel based on Web access model. Malicious users transfer the confidential information by regularly access the Web server in this channel. We implement the prototype of the covert channel, and analyze the channel performance.
2013, 22(2):15-18.
Abstract:After designing a simple infectious virus, we find the Active Defense Strategy of mainstream anti-virus software can’t intercept the infectious operations effectively. Under normal circumstances, the original PE files of the system cannot be modified. According to this characteristic, the following article develops a way to realize initiative recovery by monitoring illegal write operation of original PE file and design a system–PEPS. The simulation experiments show that the method is more effective on the defense of infectious viruses than mainstream anti-virus software.
2013, 22(2):19-25.
Abstract:With the development and popularization of computer and network technology, IDC, as a unit with lots of computers and networks centralized installation and operation, has become an independent industry with a complete business model. Because in the IDC, there were thousands of computers running in a sealed environment, cost of power consumption of IT equipments and cooling air conductions accounted for more than 50% of total operation cost of the IDC. Andthe huge power consumption limited scale of the IDC construction. So a green energy saving machine room has become an inevitable choice for today’s IDC. At present, most of reducing power consumption measures are taken to external facilities, but not to servers which are a major part of the power consumption. The paper proposed a complete IDC solution based on reducing the server power consumption, solar main power supply and optimizing distribution system. Thenthe article discussed its principle and proposed Irene technical standards and Irene room construction specifications. Finally the green performance was validated through testing results and commissioning situation.
2013, 22(2):26-29,60.
Abstract:In view of the small and medium-sized enterprises in building their own logistics information system are in the capital and the technical difficulties, task group using PaaS mode for small and medium-sized enterprise develop-ment of logistics information sharing platform. It describes the small and medium enterprise logistics information sharing platform of the operation mode, clear the system function. Platform structure contains multi-layer, using Force data model and two data isolation method building database, through the server cluster and database vertical slit realize system extension. Through to the system prototype trial found that user experience is good, the system of small and medium-sized enterprises can improve circulation of commodities management efficiency, and effectively reduce enterprise logistics information construction threshold.
ZHU Yan-Jun , KE Gang , LI Jian-Xin , YANG Huai-De
2013, 22(2):30-33.
Abstract:According to the characteristics of the retail industry and the requirement of the domestic retailers group company, we propose and implement a solution of targeted customer marketing and maintenance system for retail industry based on data mart. It has been proved that this is a good solution. The pluggable software development framework based on business components proposed in the paper has been widely used in other software projects. It cannot only economize on a lot of manpower and material resources, but also accelerate the pace of software development.
ZHAO Long , MIN Kun-Long , HAN Yu-Jie
2013, 22(2):34-37.
Abstract:Considering the deficiency that the existing automobile accident self-rescue system requires to assemble the specific sensor, GPS and communication module, the author designed a vehicle collision or crash detection and accident self-rescue system based on the smart mobile phone groups. Taking the acceleration signals of physical moments from the smart mobile phones in the accidents car as the input samples and the assembly of acceleration data as the calculating thresholds, the system can not only improve the accuracy rating of the judgments about the accidents, but can also reduce the unusable distress signals due to the damages to individual vehicle-borne device or mobile phone in severe accidents. When the signals exceed the threshold value, the system can draw support from the functions of video, GPS positioning and 3G networking in the mobile phones automatically to call for help from the rescue centre. Meanwhile, a prototype system has been implemented on Android platform. The results of the experiments indicate that the system possesses the advantages of high accuracy of collision or crash recognition, low energy consumption and low cost.
2013, 22(2):38-41,9.
Abstract:To cater to the trend of enterprise business model converting from vertical integration to horizontal integration, the management platform based on partner-collaborative-design was designed to upgrade the original PDM system, and the Web Services-based system architecture was constructed to adapt for the change of the business model. The high-level architecture and service structure of the system were described in detail.
ZHAO Jian , WANG Zong-Yan , ZHANG Liang
2013, 22(2):42-47.
Abstract:To solve the problem of lower degree of information sharing, the slower responsing market ability and the more duplicate work in the process for crane design. The shortcomings of the existing network collaborative design were analyzed, a new network design model--cloud design had been raised. The information sharing mechanism, cloud computing, cloud infrastructure was researched thoroughly. Based on it, the crane cloud design platform was constructed. Because of the characteristic that the crane has a higher structure type degree, parametric variant design and cloud design were combined organically, developed Crane parameter collaborative design system based on Cloud Infrastructure, and took a girder design of casting crane car frame as an example to verify it.
LI Xiu-Mei , LÜ Zhen , JI Yu-Jia
2013, 22(2):48-52.
Abstract:Since the speech is nonstationary and time-varying, the time-frequency analysis is a useful tool to process the speech. However, the linear short-time Fourier transform (STFT) suffers from low resolution in the time-frequency domain, and the bilinear Wigner-Ville distribution (WVD) suffers from the cross terms when processing multi-component signals. Therefore, in this paper, the generalization of the STFT, that is, the local polynomial Fourier transform (LPFT) is employed to process the speech, and a speech analysis GUI system based on the LPFT is proposed. In the proposed GUI system, the analysis and comparisons for speech are realized in the time domain, the frequency domain, and the time-frequency domain. It is shown by the example that the LPFT is more suitable to process the speech. The proposed system is user-friendly, and is a good platform to process the speech.
HOU Tong-Ji , ZHANG Jian-Feng , TENG Shen-Ke
2013, 22(2):53-56,79.
Abstract:The ASSTDS system is a special graphical interactive CAD software for the aircraft structure static test design. The paper introduces the requesting analysis, function decomposing and object abstracting for the sofeware based on object-oriented technology and the object architecture in the software development. The main objects and their relationships are also described. ASSTDS is developed in the programming language VC++ on the Windows operation system.
RUAN Chun-Lei , YAO Ming-Hai , HUANG Lei
2013, 22(2):57-60.
Abstract:This paper improved the template matching algorithm through the study of the basic algorithm of template matching on computer vision. Based on OpenCV open-source platform, a smart meter detection system is designed by VC++6.0. The system utilizes the improved template matching algorithm and detects multiple information of the power meter in effect and calculates defects. It’s very helpful to improve the quality of the power meter and ensure the reliability of the power meter. The experiments show that the system detects fast and real-time.
2013, 22(2):61-63,25.
Abstract:The introduction of this paper is based on STM32 and μC/OS-II for ECG data detection system design and implementation. Using STM32F130ZET6 as the microprocessor, with TFT LCD screen Graphical display module and SD card data storage/read and write module and so on, and usingμC/GUI for managing graphical interface. The system implements the acquisition and processing of ECG signals, displaying in real-time on the LCD screen, control of touch screen, and storing the data in the SD card in order to transfer the date to PC and other functions.
MA Ying-Tao , ZHANG Xiao-Ping , MA Yue , LIAN Dong-Ben , SUN Yong
2013, 22(2):64-67.
Abstract:Simulation has become an important means to evaluating the feasibility and value of programs made by emergency command and rescue department. At present, there has no detailed study for the simulation exercise programs deduction system. This paper focuses on the program reasoning process in the emergency simulation exercise program, and designed a program based on Delta3D simulation engine deduction system. This paper also discussed the system architecture, the logical structure of the key modules and key technologies in detail. Using this system can be extended and build a variety deduction system of simulation exercises, effectively improve the ability of quantitative analysis for the program and rescue efficiency of the commanding officers and rescue personnel.
2013, 22(2):68-71.
Abstract:This paper introduces a distributed log service System treating logs as data streams built with Node.js. and provides a solution to the problem that with the service number increases, the operation based on files gives rise to disadvantages that files I/O have performance bottleneck and have to be checked at multiple places. Logs are considered as a sort of data stream rather than files. Write a new log service system named octoLogStreamlet which collects the streams to a central storage with Node.js. Combining Node.js’ non-blocking I/O model and outstanding performance of NoSQL database, the system meets the requirements to cope with distributed data streams. The system is suitable for computer clusters needing centralized storage of logs, which provides great convenience for processing and utilizing logs.
ZHOU Xia , HE Jian-Zhong , CHEN Fu
2013, 22(2):72-75.
Abstract:In allusion to the current situation that there is not yet mathematic model of describing the submerged arc welding system accurately, the mathematical model is established on the basis of mechanism modeling. Welding wire voltage drop son model, molten drop voltage son model and electric arc voltage drop son moder are established, which are regarded as the theoretical basis of the theoretical basis of the submerged arc welding system to control electric arc. And the corresponding variable speed wire control scheme is proposed according to the established model. By the control system simulation, it proves that the control scheme can maintain the stability between the wire feeding speed change and welding electric arc in the submerged arc welding process.
FENG Yu-Qian , ZHENG Qi-Long , LU Shi-Xian , CHEN Si-Ling
2013, 22(2):76-79.
Abstract:This article describes the framework of the software pipelining scheduling for BWDSP100 multi-cluster architecture which is based on compile basic facilities IMPACT. The framewokr can fully exploit the hardware resources of Multi-cluster architecture and get better performance improvement in the application of the DSP features.
LIU Wei-Xiang , ZHOU Jian-Ning , ZHANG Jie
2013, 22(2):80-83.
Abstract:In the process of management information system applications, a small number of non-compliance staff without authorization to modify the stored procedure decompile the business logic in stored procedures or crack the database cryptographic checksum algorithm illegal to conduct business. This paper presents an oracle database stored procedure decompile and abnormal detection methods to solve these problems, it given the system design principles and implementation of a database stored procedure security application monitoring platform and gives a concrete realization of the key technologies.
2013, 22(2):84-87,47.
Abstract:This paper introduces a hybrid learning algorithm for Radial Basis Function neural network(RBFNN) based on subtractive clustering, K-means clustering and particle swarm optimization algorithm(PSO). The algorithm can be used to determine the number of hidden layer nodes and initial clustering centers of K-means by using subtractive clustering; Then the initial particle swarm of PSO can be formed by K-means clustering algorithm.The basic PSO algorithm are optimized and developed to improving convergence and stability of the algorithm, and finally the improved PSO algorithm is used to train all the parameters of RBFNN. The simulation for IRIS data set classification problem is executed, the experiment results show that the improved hybrid algorithm has higher accuracy and better stability than several other popular methods.
WANG Hai-Shuai , JI Zhen-Yan , WANG Sen
2013, 22(2):88-91,137.
Abstract:Public transportation is not only a significant symbol of the urban modernization,but also an optimal approach of solving urban crowded traffic problem. The bus line search algorithm is the key technical query system. This paper summarizes the algorithm of public transportation optimum route choice of foreign and urban cities, and analyses the realization conditions and influence factors for effective running. The paper introduces the shortest path problem and Dijkstra algorithm and analyzes the drawbacks of its application in bus line query. Then the optimal travel route choice algorithm of mathematical model based on the smallest transfer is proposed, and the implementation of the algorithm is given. Based on the data of the public transportation company Yinchuan, a bus information query system design and development is completed.
2013, 22(2):92-95.
Abstract:In order to solve the complexity of the integrated management of information engineering surveillance, considering the control of the surveillance process about the quality, investment, and the progress. Resources as decision variables, optimize the overall duration as the goal, the establishment of the information engineering surveillance process multi-objective optimization model. Information engineering surveillance control to optimize the objective function of the multi-objective decision making problems the model constructed the objective function of the multi-objective decision that is the control of information engineering surveillance, combining with a multi-objective discrete particle swarm evolutionary(DPSO) algorithm, According to the characteristics of the specific problem, we define and design new particles evolution equation, and solve multi-objective optimization Control Objectives of information engineering surveillance.
SONG Guang-Tao , MA Yue , LIAN Dong-Ben , SUN Yong
2013, 22(2):96-99.
Abstract:Researching some path finding algorithms used in the game, as well as some of the features of game path finding, and giving the routing algorithm based on the optimal path storage. Storing part of the optimal path through the optimal matrix to reduce the large number of repeated path computation, and improve the efficiency of path computation in the game. For the role movement in game scenes changing the state of path points to pass lead to the optimal path of the optimal path matrix invalid. Path update algorithm is given to update the optimal path of the optimal path matrix. As map path points become larger and larger, map paths are divided; then paths are stored for each sub-block using the optimal path matrix.
ZHANG Bo-Lun , WANG Ning , MA Hui-Min
2013, 22(2):100-103,124.
Abstract:In the study of the basic theory of the finite state machine and the application of the game development, combined with the actual needs of the emergency simulation training system, solve the system role of state controlling problem with a finite state machine controller components in Delta3D engines. This paper first introduces the basic theory of the finite state machine and the characteristics of the Delta3D engine architecture, designs a finite state machine example and describes in detail the finite state machine controller components of the overall structure,the basic functions and specific implementing way.
HUANG Lei , YAO Ming-Hai , RUAN Chun-Lei
2013, 22(2):104-107,95.
Abstract:The research on tracking moving objects commonly uses color histogram as the main statistical characteristic which has a good result but is also vulnerable to illumination changes. The fuzzy color histogram in tracking can solve the above problems. Since fuzzy clustering has some inherent disadvantages, RSA-FCM algorithm was proposed to track moving objects, which used random sampling strategy in fuzzy clustering. Meanwhile, the proposed tracking method based on the adaptive fuzzy clustering model improved tracking accuracy. The experimental comparisons show that this algorithm behaves better than traditional method both on tracking accuracy and real-time performance.
2013, 22(2):108-111.
Abstract:This article focused on the realization of the parallelization of Naive Bayes. When it comes to large-scal data or multi-attributes, the traditional singal node algorithm has a low efficiency,or even is unable to host large-scale computing. All of these make the traditional algorithm cannot fit the need to deal with massive data. Therefore, based on the basic theory of Naive Bayes and the framework of MapReduce, this paper proposed a parallelization method of Naive Bayes, which is efficient and cheap.At the end, it is proved by experiments that this method can effectively improve the efficiency of the algorithm so as to meet the need of peoople to deal with massive data.
2013, 22(2):112-115.
Abstract:In view of SNS, the way to achieve friends recommended by measures the consistency of user’s static information or the number of common friends. But it ignores dynamic information and the change process of it. For this problem, this paper based on interest sets, the duration of interest and the interest sequence to structure a character model. Compares the similarity to achieve character similarity judgment. The results show that it is a good model to get friends.
LI Qiang , ZHANG Xu-Fan , WANG Jia , LIANG Hao-Cong
2013, 22(2):116-120,205.
Abstract:Wireless sensor network(WSN) is the front line of technique. To reduce the energy consumption and extend the network’s survival time is the key research problem in WSN. It is proposed that multi-sensor information fusion is an effective way to reduce the communication data and save the energy consumption. This paper introduces three information fusion algorithms in WSN, and summarizes the improving methods.
2013, 22(2):121-124.
Abstract:In order to reduce the cost of training, improve the training efficiency, the paper suggests to develop the simulation operaion software of submarine launcher control system. Operators can operate with the software instead of real the control console, so as to facilitate the operator to quickly familiar with the work flow of system, control method of operation. Based on the basic function of simulation operation software, the paper put forward to comprehensive use of VC, FLASH and 3DSMAX, to develop the simulation software. The configuration of the software is built by modular design. The function of each modular is analyzed. The software flow diagram is summed up at last.
2013, 22(2):125-128.
Abstract:Strong designated verifier signature scheme enables the designated receiver to identify the source of a received message and prevent a third party from identifying the source of the message, which is well suitable for E-commerce and E-government applications. Based on decisional bilinear Diffie-Hellman assumption and gap bilinear Diffie-Hellman assumption, using bilinear pairing, a new strong designated verifier signature scheme is proposed. The security of the scheme is proved under standard model. The analytical results show that the new proposed protocol has unforgeability, non-transferability, privacy of the signer’s identity and non-delegatability for signature verification. This scheme is based on bilinear pairing, which means that it needs no certificate and has a simple key management. On the other hand, it is efficient in communications and computation, and implementation is simple, so that it could be implemented in mobile devices with low power and small processor.
WU Chen-Huang , GUO Rui-Jing , CHEN Zhi-Xiong
2013, 22(2):129-132,145.
Abstract:Aiming at the construction problems of the efficient certificate-based signature scheme, based on the computational Diffie-Hellman assumption, an efficient short Certificate-Base signature scheme is proposed with provable security under the random oracle model. Moreover, compared with the available provable security certificate-based signature schemes, this scheme is optimal about the efficiency and the length of signature.
2013, 22(2):133-137.
Abstract:Group purchase is a shopping mode that customers buying goods which been selling at a discount in a limited period of time and specific website. Nowadays, facing the large number of application of commodity. Group purchase website as a Platform, which has to intervene a lot of manpower for product review. Also may excessively dependent on the former experience. This paper intends to use the decision tree algorithm to analyse the sales volume of the group purchase goods. Generate readable decision tree to make a strategic decision and select the high quality goods.
2013, 22(2):138-141.
Abstract:In order to improve the differential evolution algorithm for optimum speed and overcome the heuristic algorithm common premature convergence problem is proposed based on a Tent mapping (Tent) of adaptive chaotic embedded differential evolution algorithm (CLSDE). Tent mapping algorithm using of the generation of chaotic sequence to replace basic DE algorithm to select the operation of the random, and make full use of the chaotic motions of the randomness, ergodicity and regularity, so it can smooth out the problem of local precocious and rapid speed up its global convergence speed. Through the and chaos PSO algorithm and the ordinary DE comparison algorithm, the simulation results show that the new algorithm in the solution precision, stability and convergence borrows and good performance.
2013, 22(2):142-145.
Abstract:This paper researches the feature description and automatic signature generation algorithm of polymorphic worms. It proposes a new signature generation approach for polymorphic worms-MS-PADS (multiple separated string position-aware distribution signature), which integrate the advantage of PADS and Polygraph. It solved the problem of PADS signature width determination under strong background noise conditions. This method could generate high quality signatures of polymorphic worms with low false-positive rate and high detection precision rate.
FU Xing-Wu , ZHANG Jun , WANG Yang
2013, 22(2):146-150.
Abstract:The paper describes the conceptions,classification and key_points of the char drive procedures.The most important is that the summary and analysis the details of SPI bus device driver. At the same time, this paper uses the mini2440 ARM9 development board as the realization platform.And the program listed in the paper has been tested successfully.
2013, 22(2):151-154.
Abstract:XML document data encoding scheme is foundation of XML document query processing. A good document encoding mode can improve the efficiency of XML document query. In order to resolve the inefficiency for XML data query and support dynamic updates, etc, this paper has proposed an improved method to encode XML document nodes. On the basis of the binary traversal, it introduces the trigeminal linked list storage structure of binary tree for encoding. It takes natural number as the serial number of the node encoding, so the encoding length is shorter. Besides, node parent pointer is used for encoding, which will facilitate to determinate the relationship between element nodes. Due to trigeminal linked list storage of nodes, the operation of the document update is more convenient.
2013, 22(2):155-157.
Abstract:It’s a common feature in Management Information System that to export report to an Excel file. By analyzing the general structure of report, this paper shows an approach to export complicated report to an Excel file through Java Excel API based on a dynamic template.
2013, 22(2):158-160,213.
Abstract:The current safety management of transport logistics distribution mainly relies on the GPS technology, lacking of overall safety management technique. This article puts forward a logistics network monitoring technology. This method realizes the networking sensor systems, video surveillance systems, personal video communication command system, driver and passenger terminal, communication system and the comprehensive application of technology. Through the actual project application proves that the technology in the realization of security transportation safety, improve transport efficiency, management of transport performance, processing emergency function ability.
2013, 22(2):161-164,185.
Abstract:In this paper, the non-independent model is construted to study the scattering characteristic of the adjacent tree, which is particularly well adapted to the two tree trunks’ characteristic because of the complexity of the scatter. And in the dence forest, the characteristic of the adjacent trees is more important. The finite-length multi-layer dielectric cylinder was used to model the trunk,and the electromagnetic scattering model for two adjacent trunks was analyzed. This paper presented the excitation source, the ABC, the modeling and simulation’s process, then it provided the amplitude’s change according to the different distance between the two adjacent trunks and the RCS fluctuation because of the different incident angle. At last, the comparison between the two trunks and the single trunk was gived.
YU Cheng-Sen , ZHU Hua-Jun , YE Lin
2013, 22(2):165-168.
Abstract:The fiber optic gyroscope is an inertial instrument, which is used widely, but there are still many problems in the application of the FOG. The disadvantages of the fiber optic gyroscopes such as such as temperature effect, non-linearity of scale factory and disturbance. This paper analyses the principle and the signal output of the fiber-optic gyroscope. It establishes the compensate model of nonlinearity error and linearity error, uses signal processing algorithm and signal filtering algorithm to compensate variety of error. The signal processing algorithm is proved to be effective through actual experiments.
WANG Yu-Hong , LIAN Dong-Ben , SUN Yong , SU Mo
2013, 22(2):169-172.
Abstract:There are many modules in the Emergency Rescue Simulated Training System, and information exchange between them is complex. This paper studies a set of message mechanism suitable for the simulation training system, which includes how the message is composed of message body and message type, how the message is created by message factory, message manager how to manipulate the message interacting with components, roles, and other parts. Finally, give an example for the analysis of the request synchronous message processing during the system and illustrate the relevance of messages with the system and the role it played in the system.
HE Zhen-Fen , LIU Zhi , XU Chao-Jie , FENG Xiao-Fei
2013, 22(2):173-177,229.
Abstract:This paper takes 2D character barcode as the research object, makes the recognition problems of 2D character barcode. Because of 2D barcode image having the image blurring problems, This paper enhances image with piecewise linear grey level transformation,and uses improved 2D OTSU method to compute the interval boundary points according to the gray level distribution. The ButterWorth band stop filter is made to deal with the stripe nose appeared in the 2D barcode image. At last use the round-degree method to locate 2D barcode region. Experiments show that, this approach has a good performance on solving the image blurring and noise problems, and it could locate the 2D barcode region quickly and effectively.
2013, 22(2):178-181.
Abstract:Network storage provided for user is the useful function for many application.The paper discuss the solution of Spring MVC. Users can create sub directory freely, upload files and manage directories as well as files on line. The system effectively solves the problem of the Chinese characters coding conversion about directory name and file name, as well as it solves the URI matching problem caused by the slash in current path. The application is used for information save at student personal space and group space in network teaching system,it provide the basics for group collaborative learning.
2013, 22(2):182-185.
Abstract:Aiming at flying line for digital printing, with the combination of image processing, this paper presents a technology based on Hough transform to build a automatic detection system of flying line for digital printing. Through extraction of characteristic linear information in fabric image based on Hough transform, flying line for digital printing can be detected by the cross-correlation coefficient. Finally, through comparing with manual inspection, the technology can fairly well detect flying line for digital printing.
DONG Hua , FAN Feng-Ying , CHU Xiao-Jun , HU Shuang-Xiong
2013, 22(2):186-189,239.
Abstract:The model and simulation of the airborne radar BIT(built-in-test) fault information display is well realized based on VC++. The fuzzy subordination method is introduced in the model of the radar fault generation. Which is attached to the relevancy of the radar generated the practical fault. Display the fault on the platform, it is based on the difference of the operation and threshold of the radar high and low priority faults. Software design the page information of the radar fault, the model has been applied in the radar simulator and approved effective.
2013, 22(2):190-193.
Abstract:IP network is widely applied in internet nowadays, Further be applied in a variety of telecommunications service bearing. but the design principles of the traditional IP network is to provide the service of best effort, and can’t meet the high reliability requirements of real-time business such as IP telephone and video conference. This paper will introduce the IP FRR of BFD rapid detection mechanism, which is presented to repair failure rapidly, reduce the packet dropout. And also the detection technology of BFD and the principle of IP FRR will be introduced in detail. At last, the result of experimentation is provided.
CHEN Bing-Huang , SHAO Ming , LIN Qiu-Guo
2013, 22(2):194-197.
Abstract:To XUnit, as a representative of the software to be automatic test framework has tended to mature. Based on embedded system application characteristics, this paper proposed a test automation framework based on the CUnit, and introduced the relevant implementation technology. The CUnit unit test framework was secondary developed, was made suitable for use in SPT6608A sunplus single chip microcomputer. In practice, the framework is proved effective, it can achieve to SPT6608A software modules of test automation.
2013, 22(2):198-201.
Abstract:Most image compressed sensing algorithms improve the reconstruction quality by utilizing the correlation of parent-child wavelet coefficients. However, few people study the compressed sensing based on the fraternal relationship of the high-frequency coefficients. In this paper, a Bayesian-based image compressed sensing algorithm using joint reconstruction of high-frequency wavelet coefficients is proposed. Firstly, the high-frequency coefficients of the horizontal, vertical and diagonal directions in the same scale are sampled separately when executing compressed sensing. Then, a hierarchical Bayesian model is presented and the correlation is used when reconstruction is performed. Experimental results show that our proposed algorithm has higher image reconstruction quality than the existed MCS.
2013, 22(2):202-205.
Abstract:The paper presents a multi-thread temperature-humidity monitoring system.The system uses SHT11 as the sensor and P89C52X2BN as the hypogenous machine, and realizes host computer software by multithread programming using MFC Socket. It excels at multipoint supervising, real time operation and accurate reflection of circumstances. Due to all the strengths mentioned above, it have been put into practical use.
LIU Shuai-Feng , LIAN Dong-Ben , SUN Yong
2013, 22(2):206-209.
Abstract:The AAR (After Action Review) archive technology is a tool to assist users in implementing qualitative analysis by providing quantitative information to them. This paper first introduces the principle of AAR theory, and then from the point of view of simulation exercises, simulation exercise system AAR filing system design, focusing on data collection, data analysis, drill playback of three core functions of the AAR system. Finally, the technical characteristics and scalability of the simulation exercise AAR archive is introduced.
2013, 22(2):210-213.
Abstract:Enterprise Service Bus is a kind of software bus based on SOA architecture. It can achieve application integration. We improved the ESB-across router by analyzing the defects of the existing ESB routing. It implements the dynamic message routing based on rules and routing strategies, and can across the ESB to interact. The actual operation of the system shows that the design has good effect.
BAI Sha-Chu-La , LIAN Dong-Ben , LI Wen-Bo
2013, 22(2):214-217.
Abstract:ESB system is a software bus which based on SOA architecture to achieve application integration. Listener is an important component in ESB system, whose research and design have an important impact on the performance and availability of the ESB.The main task of listener is monitoring the service-dissemination messages and service request/ response messages, in addition,it provides access-controling and Message-authentication. This paper raises an more efficient concurrent monitoring technology and a safety way of the message-adaptering technology. These technologies have solved the problem of the efficiency of the concurrent monitoring of multi-protocol messages; and have made a deep study in secure authentication modules of the ESB internal message and have raised a high security design.
2013, 22(2):218-220,168.
Abstract:There are mainly three methods in Image Retrieval Based on Content, i.e., retrieval technics based on shape, texture and colour features. Different images and uses require selection of retrieval methods through different featuers. Therefore, in this paper, we first analyze the features of the image itself, trying to find its most obvious features, and then, according to the analysis results, apply suitable Retrieval Method Based on Feature to retrieving this image to make the Image Retrieval Technic more intelligent and thus to get better effects. This paper puts forward calculation methods of Colour Histogram, Shape and Dierction Energy Histogram and Cumulative Run-Length Histogram, then briefly describes the Intelligent Selection Method Based on Image Feature, and states that the final result of the test is satisfying.
WANG Fei , CAI Yong , HE Zhi-Jun
2013, 22(2):221-225.
Abstract:The RESTful Web Service is a lightweight framework which includes some important ideas such as addressability of resources, statelessness, connectedness, and uniform interface and has good interaction and elasticity by its loose coupling and other distributed components. Since there is no need to introduce the complex SOAP, it is easier to use, easier to combine than RPC-style services and has gained wide spread acceptance across the web. In this paper, it is researched how to use Restlet framework to build RESTful Web Services in a Chinese medicine information system.
LIAN Wen-Sheng , SUO Qiang-Qiang , CUI Xiang-Yang
2013, 22(2):226-229.
Abstract:Based on the Qt/Embedded, this paper designs a kind of embedded digital megger GUI. It uses touch screen instead of original mechanical switch, establishes database storage and finally realizes some functions which current digital megger lacks, such as the storage and printing of history datathe history printing.
WANG Qi , DENG Hui-Heng , MA Lu
2013, 22(2):230-232,225.
Abstract:With the unceasing development of computer simulation technology, Marine environmental simulation becomes more widely used, but it is still a tough and critical issue which work against us to build a vivid environment. The paper detailed analysis of ocean model and bow wave special effect simulation, shows how to build a Virtual Marine environmental by Visual Studio 2003.net and Vega Prime, the introduction of Particle system during the development process makes it more realistic and immersive.
HAN Ying , WANG Mao-Fa , CHEN Xin-Fang , PAN Zhi-An , ZHANG Yan-Xia
2013, 22(2):233-235.
Abstract:Word query in Chinese Dictionary is essential part in Chinese information processing system. It has a great impact on system efficiency. The Chinese word segmentation has been studied since the late 1980s. In order to improve the existing word query efficiency, for short word of no more than 4 Chinese characters, a new hash algorithm is proposed, named Zipper-style hash indexing based on the value of each characters in Chinese word. The hash value is calculated according to machine code of each character, the weight of the left character is big than the right. The weight is equal to the maximum value of all Chinese characters minus the minimum value. The speed of word query is improved with this kind of Zipper-style Chinese word value hash indexing.
2013, 22(2):236-239.
Abstract:35KV dry type transformers due to overload, short circuit causes such as elevated temperature, the use of TMS320F2812 digital signal processing chip design of a smart temperature control system, the hardware circuit is simple, easy, and can be remotely monitored. Successfully test the functionality of the system to achieve the protection of transformers and intelligent control.