• Volume 22,Issue 5,2013 Table of Contents
    Select All
    Display Type: |
    • Data Hiding and Anti-Forensic on Modern Computer System

      2013, 22(5):1-4,37. CSTR:

      Abstract (2445) HTML (0) PDF 1.19 M (6656) Comment (0) Favorites

      Abstract:This paper discusses some of the possible ways to hide data on modern computer systems. Using HPA and DCO, hidden partition and other technical analysis of the disk drive data hidden. Using the cluster distribution, Slack space and so on technical discusses some of the methods that can be used to hide data in NTFS and analysis techniques that can be used to detect and recover hidden data. The exploration of the different hiding technology can be used as computer anti-forensics means, to the great impacts of computer forensics.

    • Self-Cognitive Process Studies of Smart Distribution Grid

      2013, 22(5):5-8,69. CSTR:

      Abstract (2086) HTML (0) PDF 1.10 M (2575) Comment (0) Favorites

      Abstract:According to the challenges faced by the electric power system, and Smart distribution grid is an important aspect of smart grid development. The study of smart grid, the most important is how to make the grid intelligent. Through "Mechanism" and human intelligence system model of three ways of structuralism, functionalism and behaviorism are harmony and unity, complete "information→ knowledge→ intelligence" conversion process, and they unite to became full human cognitive processes, analytical and definition of Smart distribution grid information and its conversion and self-cognitive process. Through human intelligence system model, it can re-interpret the significance of the DFSM and its intelligent system for Smart distribution grid. The Smart distribution grid after a course of self-cognitive; it can be more convenient to carry out effective simulation and modeling of whole and part, gradually establish knowledge and strategy library of the Smart distribution grid in the long-term cognitive process cycles, as a basis for Smart distribution grid have intelligent, and ultimately makes the smart distribution grid with anthropomorphic features and management, coordination, control, optimization, maintain their own and the controlled object.

    • Health Degree Evaluation for the Entire Business Operation & Support System Based on the Analysis Hierarchy Process

      2013, 22(5):9-13. CSTR:

      Abstract (1550) HTML (0) PDF 718.89 K (4207) Comment (0) Favorites

      Abstract:The integration of tone, data and other new services has speeded Chinamobile's step to implement entire network business operation & support system (BOSS). However, the traditional evaluation system only focus on certain region and a few performance characteristics, and customer's feeling is ignored in quality evaluation. To deal with it, analytic hierarchy process (AHP) is proposed to do health degree evaluation for the China Mobile's entire network business operation & support system. Specific evaluation indexes are set up firstly for evaluating health degree of BOSS. Further, the factor set, evaluation set and the set of weights are created for comprehensive evaluation of the business operation quality. The experiment shows that AHP based method can provide hierarchal quantitative and qualitative analysis. Its strong operability and good performance predicts a good future for AHP to be widely used in quality evaluation for any BOSS.

    • The Application of Two-Dimensional Code to Enterprise

      2013, 22(5):14-17. CSTR:

      Abstract (1582) HTML (0) PDF 562.63 K (3386) Comment (0) Favorites

      Abstract:The Internet of Things concept in recent years to be able to get the favor of the capital markets, and closely related to the two-dimensional code applications have developed rapidly. Combined with the mobile Internet application ability, such as two-dimensional code when the Internet create economic myths again? Inbased on scientific and technological progress, technological innovation to promote the economic development process in the two-dimensional code, combined with the mobile Internet application conforms to the development trend of the times, and be able to pro-vide users with better consumer experience, can effectively help enterprises to enhance operational efficiencytraditional industries while promoting a new business model, this article has compiled a two-dimensional code, combined with the technical characteristics of the two-dimensional code, two-dimensional code in enterprise application prospects.

    • Tibetan Strokes of Computer Codes Sorting

      2013, 22(5):18-20. CSTR:

      Abstract (1381) HTML (0) PDF 853.36 K (3619) Comment (0) Favorites

      Abstract:Tibetan sort will be widely used in every aspect of Tibetan language text information processing, including word, dictionary sequence, system software and other application software. This paper attempts to describe Tibetan writing stroke sorting rules which make more correct, reasonable induction, the purpose is to find a sorting algorithm model that could realize automatically the Tibetan strokes character. And which break the framework in Tibetan character syllable sequence depends only on the syllable key radical structure sorting traditional of thinking.

    • Test Network of Future Internet Based on OpenFlow

      2013, 22(5):21-24,97. CSTR:

      Abstract (1684) HTML (0) PDF 1.47 M (4549) Comment (0) Favorites

      Abstract:OpenFlow, put forwarded to meet the requirement of Internet innovation research, is a new network test technology based on traffic classification. In this paper, we take OpenFlow as the research object to construct a virtual network test model in the mininet test platform by utilizing the Open vSwitch virtual machine. What's more, we also do some simple tests to facilitate the analysis and research on the futher Internet innovation technology.

    • Key Management System for WIA-PA Network

      2013, 22(5):25-28,175. CSTR:

      Abstract (1592) HTML (0) PDF 1.35 M (3049) Comment (0) Favorites

      Abstract:WIA-PA is a wireless network system for industrial measurement, monitoring and control based on IEEE 802.15.4. As a new kind of wireless network system, its security is extremely important. In order to ensure the security of WIA-PA network, we have designed WIA-PA network key management system, established a centralized key management mode, thus ensure WIA-PA network security communication services. Through the test of security key management, the safety of the key management system is verified.

    • Internet Technology Expert Search System

      2013, 22(5):29-33. CSTR:

      Abstract (2561) HTML (0) PDF 786.30 K (3046) Comment (0) Favorites

      Abstract:This paper proposes and designs a technology experts searching system which can automatically collect, analysis and access information of technology expert. It describes the system's structure, main function and key technology. Based on the classification algorithm of feature vector, this paper addresses to design a kind of method suitable for large-scale information extraction, it can effectively extract and mining academic social networks from the information resources on the Internet. It provides a new train of thought for science and technology expert information extraction research.

    • Online Passenger Ticketing System

      2013, 22(5):34-37. CSTR:

      Abstract (1544) HTML (0) PDF 749.03 K (2944) Comment (0) Favorites

      Abstract:Analysis of the current passenger ticketing system, design of a kind of online passenger ticketing system. Using XML as intermediate bridge solved the problem of the data exchange between heterogeneous databases, is developed on the platform of J2EE, based on B/S structure technology, and the introduction of the DTU equipment, not only facilitate the expansion of passenger ticketing system, but also improves the system's safety.

    • Embedded Anti-Theft System for Vehicles Based on GPS and GPRS

      2013, 22(5):38-41. CSTR:

      Abstract (1509) HTML (0) PDF 717.60 K (2634) Comment (0) Favorites

      Abstract:In view of the current problems existing in the vehicle-mounted anti-theft devices and the market application prospect, a new embedded vehicle-mounted anti-theft system is presented. Firstly, the hardware platform is set up by a S3C2410X as a microprocessor core, a GPRS module and a GPS module. And then, the software designs of the system, the GPS and the GPRS are introduced in detail. As the experiments show, the system is stable, reliable and efficient in communication. The researches can be referred in further studies on the embedded anti-theft system.

    • South China Sea Geological Information Database System for Project Management

      2013, 22(5):42-44,17. CSTR:

      Abstract (1812) HTML (0) PDF 1.06 M (2501) Comment (0) Favorites

      Abstract:South China Sea geological information database system is established based on data and practice in South China sea. The system is designed for sharing, fusion and analysis geological data to supply a simple method for offshore engineer. ADO, DAO, OLE and other computer technology are used to make data resources quickly import and export. The soil properties such as effective unit weight, shear strength, unit of surface friction, unit tip resistance changed with the depth are described. These can be found through the layer number, depth, and the nature of the soil and so on. The summary function can draw curve, compare the soil parameters in same or different project. It could be used to guide design and construction.

    • Chinese Culture English Article Management System

      2013, 22(5):45-48. CSTR:

      Abstract (1882) HTML (0) PDF 869.49 K (3164) Comment (0) Favorites

      Abstract:To overcome deficiencies of using Chinese, imperfect functions and incomplete contents of existing Chinese culture article management systems, following the structured development method of information systems, a Chinese culture English article management system was developed through system analysis, system design and system implement, which provides a convenient internet platform for foreigners to study and communicate Chinese culture.

    • Information Platform Model for Food Security Based on Internet of Things and Service Architecture

      2013, 22(5):49-53,180. CSTR:

      Abstract (1805) HTML (0) PDF 1.61 M (3118) Comment (0) Favorites

      Abstract:According to the tracking and tracing requirements of food supply chain management and quality and safety, using Internet of Things technologies, referring to the EPC standards, a food security information system platform model that based on Internet of Things and service oriented architecture has been put forward. The design describes E-R model, network architecture, technology framework and functional modules of achieving food tracking management by RFID technologies on the basis of Internet. Detailed electronic trace information about food could be inquired through Web Service or intelligent mobile phones or other devices.

    • Wireless Sensor Network Based on the Number of Network Computer Room Temperature and Humidity Bidirectional Monitoring System

      2013, 22(5):54-57. CSTR:

      Abstract (1508) HTML (0) PDF 748.57 K (3030) Comment (0) Favorites

      Abstract:Along with the new campus building, campus continues to expand, network application is continuously increasing, the emergence of a number of network computer room. On the basis of network computer room temperature and humidity requirements, in order to prevent computer equipment due to environmental factors such as temperature and humidity failure occurs, the application design of wireless sensor network monitoring system of temperature and humidity. Hardware design of the networking mode, temperature and humidity collection node, data receive node. Softwares are designed for node control program, transducer, transceiver, communication channel initialization procedures, to achieve parameter transmitting, receiving, processing. And the field test, the test results and room temperature and humidity.

    • Research and Exploration of the Tobacco Business Logistics Integration Control Platform

      2013, 22(5):58-61. CSTR:

      Abstract (1461) HTML (0) PDF 2.52 M (3297) Comment (0) Favorites

      Abstract:According to the current status of constructing a provincial tobacco business logistics information system, following the targets of "The 12th five-year plan" tobacco logistics information technology planning, based on technologies of The Internet of Things, the research and exploration to the logistics integration control platform have been done and the "comprehensive awareness" of tobacco logistics information and "intelligent logistics business processing" in the province have been realized.

    • Item Bank System Based on the Split Storage Mode

      2013, 22(5):62-65. CSTR:

      Abstract (1399) HTML (0) PDF 723.55 K (2985) Comment (0) Favorites

      Abstract:Through comparing and analyzing the existing test bank system storage mode, this article puts forwards the split storage mode, viz., the test parameters is splited into public infrastructure part and the kinds of questions proprietary parts. Based on the model by using the oriented object method, test management and Algorithmic of test bank system is designed and implemented, small scale experiments show that the algorithm is corrective and effective.

    • Information Storage Solutions for Embedded Systems

      2013, 22(5):66-69. CSTR:

      Abstract (1414) HTML (0) PDF 616.74 K (2790) Comment (0) Favorites

      Abstract:An embedded systems solution for information storage systems is a high-speed, high reliability information storage solution in a special working environment. Using a Sip computer module as the control center, the system can accomplish to acquire information, storage information and replay information.

    • A Kind of Design and Majorization of Software Development Framework

      2013, 22(5):70-74. CSTR:

      Abstract (2009) HTML (0) PDF 827.90 K (2887) Comment (0) Favorites

      Abstract:In order to solve the defects that consist in 3-tier application,a design method of 5-tier application is presented. By using MVC design pattern we introduced the Controller which can reduce the cupling between UI and BLL, while, by using the technology of ORM we add the tier of Data Persistence which can solve the problem of impedance mismatch between Relation Data Model and Object Oriented Model.

    • An Interactive Segmentation Algorithm Based on a Regional Tracking

      2013, 22(5):75-80. CSTR:

      Abstract (1692) HTML (0) PDF 1.20 M (2801) Comment (0) Favorites

      Abstract:There are many motif elements containing certain features in traditional pattern which are useful to generation style pattern. It is difficult for the present method based on the edge and regional segmentation algorithm to obtain there elements and distribution information. Taking Xinjiang pile blanket for example, an interactive segmentation algorithm is proposed based on a regional tracking. First, template operator is defined, and motif elements are selected, through adjusting the parameter of template operator. Then, by introducing the symmetrical criterion of motif element, the problem of elements redundancy and overlapping is solved. The simulation results show that the proposed algorithm can satisfy the symmetrical fabric design segmentation and extraction.

    • Coal Gasification LS_SVM Forecasting Model Based on Particle Swarm Algorithm

      2013, 22(5):81-84. CSTR:

      Abstract (2001) HTML (0) PDF 744.65 K (2769) Comment (0) Favorites

      Abstract:According to the least squares support vector machine (LS_SVM) parameter selection has important influence on the model of performance, and conventional parameter optimization methods' effect is poor and time-consuming, this paper present a least squares support vector machine prediction model which based on particle swarm algorithm. The model based on least squares support vector machine theories, and with particle swarm algorithm to optimize the model parameters. In this paper we use the model to predict three main performance indexes of evaluating coal gasification effect of the fixed bed (gas heating value, gasification efficiency, gas production rate), through the practical data's simulation results show that the algorithm can effectively improve the prediction accuracy of the model, and the model's reliability and usability has been verified.

    • A Rapid Method of Fitting out Targets Hyperbola of Underground Pipeline Prospecting Image

      2013, 22(5):85-89. CSTR:

      Abstract (1356) HTML (0) PDF 883.65 K (3420) Comment (0) Favorites

      Abstract:The detection and recognition method of GPR targets hyperbola presented in this paper has two steps. First, the GPR image edge was detected, then template matching algorithm is used to identify out the pixels of hyperbola; Second, according to the hyperbola feature of GPR B-scan data, a modified Hough transform is used to detect the hyperbola from the data that being matched before, aims to get rid of the false target's hyperbola and recognize the parameters accurately. The method had been employed to find and fit targets hyperbola from GPR data. The results evaluated from real data show that all parameters of targets hyperbola are fitted fast and correctly.

    • Detecting and Tracking of Moving Target in Video Sequence Based on OpenCV

      2013, 22(5):90-93. CSTR:

      Abstract (2120) HTML (0) PDF 710.43 K (7882) Comment (0) Favorites

      Abstract:In order to solve the moving target detecting and tracking in video sequence, the algorithm tracking follow detecting is proposed. First, it updated background model using the averaging background method, and detected the moving target. Then the size of the moving target was acquired by projection method. Finally, it tracked the moving target using the MeanShift tracking algorithm. During the object tracking, it programmed by the OpenCV to achieve the moving target detecting and tracking. The experiments show that the algorithm not only realize the detecting and tracking of the moving target exactly, but also reduce the amount of calculation and improve the tracking efficiency.

    • Control of Collision Avoidance in Progress of Dual-Arm Manipulation by Chinese Massage Robot

      2013, 22(5):94-97. CSTR:

      Abstract (2012) HTML (0) PDF 882.95 K (3300) Comment (0) Favorites

      Abstract:Control of dual-arm coordinated motion of Chinese massage robot was discussed in this paper. According to the structural characteristics of the manipulators, the problem of collision avoidance in three-dimensional space was transformed into one in the relevant plane. With the method of plane geometry, a collision avoidance strategy was designed. Kinematic process of collision avoidance of the two arms was simulated by MATLAB. The results showed that the method designed in the paper was effective for coordinated movement between the two arms.

    • Control Protocol for Mine Transport

      2013, 22(5):98-102. CSTR:

      Abstract (1741) HTML (0) PDF 938.33 K (2357) Comment (0) Favorites

      Abstract:Based on the introduction of mining transport control system, mine transport control protocol used between shuttle car console and mobile terminal is designed and implemented. The article describes the mine transport control protocol's packet format and communication methods, and provides implementation process. At last, this paper presents test results. Test results indicate that mining transport control protocol can meet the requirements of mining transport control system well.

    • Improvement of Partition Algorithm Based on Complexity of LANDMARC Location Algorithm

      2013, 22(5):103-106,121. CSTR:

      Abstract (2134) HTML (0) PDF 1.12 M (3392) Comment (0) Favorites

      Abstract:Based on the analysis of the basic principle and characteristics of RFID, the existing RFID indoor location system LANDMARC was discussed in detail. Then, the inadequate of LANDMARC system was proposed and summarized. In order to reduce the complexity of the algorithm, the partition algorithm was proposed. Simulation results show that the enhanced partition algorithm can achieve better location accuracy and higher location performance than the original LANDMARC algorithm. At the same time, the partition algorithm reduced the complexity of algorithm markedly.

    • Logistics Demand Forecasting Based on Least Support Vector Machine Optimized by Ant Colony Optimization Algorithm

      2013, 22(5):107-110. CSTR:

      Abstract (1384) HTML (0) PDF 754.90 K (2699) Comment (0) Favorites

      Abstract:In order to improve the forecasting accuracy of logistics demand, this paper puts forward a logistics demand forecasting model based on least support vector machines optimized by ant colony optimization algorithm (ACO-LSSVM). Firstly, the data of logistics demand are reconstructed, and then the complex nonlinear change rule of logistics demand is explained through LSSVM, and the parameters of LSSVM model are optimized by ACO, and lastly, the performance of mode are tested by logistics demand data. The simulation results show that ACO-LSSVM has improved the forecasting accuracy of logistics demand, and which is an effective method for logistics demand forecasting.

    • Design and Implementation of the SIP and RTSP Protocol Conversion Module

      2013, 22(5):111-115. CSTR:

      Abstract (2491) HTML (0) PDF 994.37 K (4959) Comment (0) Favorites

      Abstract:As the rapid development of streaming media technology and IP communication technology, the SIP protocol and RTSP protocol interoperability issue becomes increasingly prominent. This paper discusses the protocol communication problem between SIP and RTSP protocol from the aspects of protocol method corresponding, address mapping, interactive process design and so on. And based on the RTSP proxy server, the SIP and RTSP protocol conversion module is designed and implemented, realized the protocol method conversion between SIP and RTSP. Finally, the paper verifies the feasibility and validity of the method by taking SIP Client access RTSP camera to obtain real-time image as an example, which provides a good solution for the integration between the multimedia scheduling system based on SIP protocol and RTSP devices.

    • Research and Realization of a Web Information Extraction and Knowledge Presentation System

      2013, 22(5):116-121. CSTR:

      Abstract (1524) HTML (0) PDF 1.02 M (4013) Comment (0) Favorites

      Abstract:This paper presents an improved dynamical k-means clustering model to solve the dynamical problem, called Dynamical K-means algorithm, in order to solve the problem that only solving the constant clustering problems of classical k-means clustering method. Based on classical k-means method, by analysis and solving the new adding samples of dynamical training data set, local renew or global clustering is performed by the changing range of objective function, and the dynamical data are clustered online. The speed of classical k-means algorithm is slow by the reiterative clustering is needed of every online clustering step, but the speed of Dynamical K-means algorithm is accelerated. Simulation results on standard and artificial social network datasets demonstrate that comparing with classical k-means clustering means, the excellent clustering results can be obtained by this method and the concept drifting phenomenon can be monitored efficiently.

    • Research Based on Aprior & FP-growth Algorithm

      2013, 22(5):122-125. CSTR:

      Abstract (1490) HTML (0) PDF 835.88 K (4398) Comment (0) Favorites

      Abstract:Mining of association rules in data mining plays an important role, Apriori algorithm and FP-growth algorithm are the two major association rules frequent itemsets discovery algorithm.study of the two kinds of the basic idea of the algorithm, points out the advantages and disadvantages of the algorithm through specific examples of frequent itemsets found method, finally through the experiment to the algorithm for the performance comparison.

    • The Projection Models and Algorithms of Panorama

      2013, 22(5):126-132,192. CSTR:

      Abstract (1573) HTML (0) PDF 1.39 M (8231) Comment (0) Favorites

      Abstract:Panoramic image technology made research by many specialists has become a research focus in certain area such as computer visual, computer graphics, virtual reality and so on because of being applied widely. Based on projection algorithm dealing with panoramic image, this paper introduced core transform matrix involved in plane transformation and the working context and prince of it, analyzed various curved surface transformation methods in detail, for example projection algorithm and an improved algorithm of it involved in cylindrical panoramic technology, conventional algorithm and block algorithm and conversion algorithm of complete directed graph referring to spherical panorama, probed deeply into traditional algorithm and two-dimensional texture algorithm and stereoscopic projector relating to cube panorama, prospected development trend of the projection algorithm involved in panoramic image technology.

    • Development of Universal Network Communication DLL Using MFC CSocket Class

      2013, 22(5):133-138. CSTR:

      Abstract (1932) HTML (0) PDF 1.19 M (3619) Comment (0) Favorites

      Abstract:This paper develops a Dynamic Link Library (DLL) module that could be generally utilized by multiple programming environments for the construction of network communication. CSocket class, which is included in Microsoft Foundation Class (MFC), was adopted to develop the DLL that supports TCP and UDP protocol in visual studio 2010. The DLL was developed to construct network communication mechanism in the client/server, peer-to-peer and broadcast modes in a LAN. The realization of universal network communication DLL provides a good way to design the modularized data transfer applications in different programming environments. It can greatly raise the developing efficiency of such application projects.

    • Study of Numerical Optimization Constraint Problems Based on Genetic Algorithm

      2013, 22(5):139-142,197. CSTR:

      Abstract (1991) HTML (0) PDF 1.12 M (3750) Comment (0) Favorites

      Abstract:For numerical optimization constraints appear in the large-scale, multi-function polymorphism, on global opti-mization with discrete variables under such circumstances, General optimization method, convergence is slow to seek global extremum of low probability. Made with genetic algorithm of numerical optimization constraints problem solution, by numerical simulation experimental results indicates that, the algorithm performance better than existing other algorithm, it not only can processing linear equation constraints, and also can processing nonlinear equation constraints, while improve has convergence speed reconciliation of precision, is efficient sound of intelligent algorithm, has is high of global found excellent ability and soon of convergence speed, on solution complex more peak more State function of optimization constraints problem has feasibility and effectiveness.

    • Behavior Simulation for Wireless Sensor Networks Based on Directed Diffusion

      2013, 22(5):143-146,210. CSTR:

      Abstract (1615) HTML (0) PDF 1.49 M (3324) Comment (0) Favorites

      Abstract:In order to improve the performances of wireless sensor networks based on directed diffusion, the simulation for network behavior was completed. The models of node distribution, directed diffusion gradient field, data aggregation and statistical characteristics were given. In addition, the main simulation algorithms and the simulation results in graphical way were presented. The theoretic analysis and simulation results illustrated that there were still defects within the original directed diffusion protocols in wireless sensor networks, and the improvement direction was indicated.

    • Implementation of Charging for Credit System Based on Asynchronous Web Service

      2013, 22(5):147-150. CSTR:

      Abstract (1771) HTML (0) PDF 843.40 K (2550) Comment (0) Favorites

      Abstract:This paper addresses the Web Service technology implementation of realtime data sharing between educational system and financial system in charging for credit system, and puts forward a data sharing framework based on the Web Service which can effectively meet the data sharing system's requirement of cross platform and program language independence, and then introduces the asynchronous data request technology to the framework in order to speed up the response of system and improve the user experience.

    • A Method to Generate Query Recommendations for Search Engine of the Traditional Chinese Medicine Industry

      2013, 22(5):151-154,202. CSTR:

      Abstract (1986) HTML (0) PDF 1.24 M (3169) Comment (0) Favorites

      Abstract:Along with the development of computer information technology, a large number of Traditional Chinese Medicine(TCM) literatures and database resources need to be shared to the Internet for search by professionals and the unique TCM industry search engine is developed to comply with such requirements. A new method for generating related query recommendations according to the user enquiry is proposed according to the features of the TCM industry, based on the author's experiences and understandings. Different from methods used by other search engines, the new method combines the features of the TCM industry search engine and the Chinese word segmentation of the TCM industry and uses algorithms to calculate the correlations between query recommendations and stores and manages such query recommendations in relation data tables. Practices indicate that such method generates accurate and industry-specific query recommendations promptly, and therefore has certain innovation and promotional value.

    • Distributed Load Balances Technology Based on the Nosql Database

      2013, 22(5):155-157. CSTR:

      Abstract (1812) HTML (0) PDF 677.57 K (2838) Comment (0) Favorites

      Abstract:This paper is based on the non-relational database of load balancing algorithm by introducing the query cost index. The load is more accurate through the analysis of the historical inquires the log to estimate inquires the price, and applied to the decision-making part of the load in the load balancing. At the same time figure out query cost of the current task to find the right to accept the task node, thus the load balancing change from passive to active, effectively shortening the average query response time, and improve the overall performance of the system.

    • System Simulation of Price & Advertising Combined Game

      2013, 22(5):158-162,187. CSTR:

      Abstract (1398) HTML (0) PDF 1.36 M (3216) Comment (0) Favorites

      Abstract:This paper studies marketing mix decision model of price and advertising in duopoly market. Firstly, market response model of advertising is the constructed, and effective advertising input range is calculated based on market forecast results. Secondly, the combination principle of price and advertising is studied, and the marketing mix model is built. Thirdly, game theory is used to establish the two-stage game of price and advertising, and the solution is given. Meanwhile, modern information technology is used do develop the marketing mix decision support system, so that the effectiveness of the marketing models can be proved and put into practice.

    • Time Series Regression and Prediction Based on Information Granulation and SVM

      2013, 22(5):163-167,206. CSTR:

      Abstract (1563) HTML (0) PDF 2.03 M (3960) Comment (0) Favorites

      Abstract:In order to improve learning efficiency and generalization ability of SVM, firstly, the raw data is preprocessed by using an information granulation algorithm. This algorithm can divide sample space into multiple particles (subspace), reduce the sample size and save the time complexity. And then, the granulated information take SVM to carry on the regression analysis, while take cross validation to select the optimal classifier adjustable parameters, which can reduce the complexity of the classifier and improve the generalization capability of the classifier and avoid Over learning and less learning. Finally, the test results on forecasting the Shanghai Composite Index have proved that the system has a good-performance and make time series regression prediction precisely.

    • Research and Implementation of Binocular Stereoscopic Display Based on OGRE

      2013, 22(5):168-171. CSTR:

      Abstract (1455) HTML (0) PDF 785.16 K (3126) Comment (0) Favorites

      Abstract:Binocular stereoscopic display is a cutting-edge technology in computer graphics which plays an important role in virtual reality. The thesis analyzes the principle of binocular stereoscopic display and a solution of binocular stereoscopic display based on OGRE (Object-Oriented Graphics Rendering Engine) and parallel binocular projection model is proposed. The solution takes full advantage of virtual camera in OGRE and viewport synthesis technology, leveraging CG script at the lower layer which brings the highest rendering efficiency. The results indicate that the solution has a good binocular stereoscopic effect with flexibility of easily loading different scene models, which is very suitable for practical applications.

    • Design of Portable Automobile Engine Testing Device

      2013, 22(5):172-175. CSTR:

      Abstract (1472) HTML (0) PDF 853.32 K (2719) Comment (0) Favorites

      Abstract:The design is based on SEP4020 as the control chip, theμC/OS-II for real-time operating system to manage the various tasks, moved to theμC/GUI to complete the TFT color LCD screen operation, joined the FAT32 file systems on the SD card data storage function operation, using TLC2543 as a data acquisition module of the multichannel portable engine testing device. Realization of real-time data acquisition, data display and storage function. The design has the advantages of simple structure, easy implementation, convenient operation, high efficiency, strong real-time, mobile and universal property.

    • The Key Technology of Circuit Virtual Maintenance

      2013, 22(5):176-180. CSTR:

      Abstract (1370) HTML (0) PDF 1.14 M (2577) Comment (0) Favorites

      Abstract:3ds max was used to create the three-dimension modeling, to provide the operation object for virtual maintenance; OrCAD was used to circuit simulation model, to provide the data support; The virtual maintenance operation was designed in the virtual environment, which was created by EON Studio. The result of circuit simulation was sent to virtual environment via VB, complicating real-time reading the simulating result of the electron equipment, providing cogent technology for maintenance training of the electron equipment.

    • Research and Application Analysis on Human-Mobilephone Interaction Prototype Based on Inertial Sensors

      2013, 22(5):181-183. CSTR:

      Abstract (2284) HTML (0) PDF 699.60 K (2725) Comment (0) Favorites

      Abstract:Microsensors leads to a new three-dimension input mode, and promotes the application of invisible interaction. On the basis of analyzing the existing interaction models, a new distinct and extensible human mobilephone interaction(HMI) prototype was put forward, and its system concept model was built. Then, the mobilephone application based on inertial sensors was analyzed.

    • Selection of Artificial Mark System in Astronaut Operation Assistant System

      2013, 22(5):184-187. CSTR:

      Abstract (1261) HTML (0) PDF 767.55 K (2590) Comment (0) Favorites

      Abstract:Two common artificial mark systems, i.e. ARToolKit and ARTag are investigated in the paper for selection. Important aspects of the two system, such as minimal recognition size, recognition accuracy, processing speed and occlusion, are compared in details. Furthermore, the algorithms are analyzed in order to present the difference in performance between the two systems. Results of the paper can offer technical reference for selection of Artificial Mark System in Astronaut Operation Assistant System.

    • Extracting and Clustering Product Features from User Reviews

      2013, 22(5):188-192. CSTR:

      Abstract (1956) HTML (0) PDF 877.24 K (3634) Comment (0) Favorites

      Abstract:User Reviews contains a large number of product features and user's opinions towards these features. This paper proposed an approach to extract product features, which is based on Apriori algorithm, and using PMI with the seed set and co-occurrence degree with opinion words to filter features. And then an approach to group product features based on K-means algorithm is proposed, in which sharing words, lexical similarity and opinion words are chosen as the tokens to represent the association of product features. With the Chinese reviews of restaurants from the Internet, experimental results demonstrate the validity of the proposed method.

    • Segmentation of Handwritten Chinese Characters Based on the Candidate Characteristics Strokes and Multi-Class Threshold

      2013, 22(5):193-197. CSTR:

      Abstract (1482) HTML (0) PDF 856.51 K (2879) Comment (0) Favorites

      Abstract:With the analysis of the common structures of Chinese characters, a handwritten Chinese characters segmentation method which based on the candidate characteristics strokes and multi-class threshold is proposed in view of the significant difference between the distance between Chinese characters and the distance between the components that constitute a Chinese character. Firstly, the candidate characteristics strokes are extracted from the collection of strokes that constitute handwritten Chinese characters, the handwritten Chinese characters are pre-segmented according to the candidate characteristics strokes. Then, the over-segmentation components of Chinese characters are combined by using a components combination rule based on the spacing threshold. Finally, the adhesions Chinese characters are searched by using an adhesions Chinese character judgment rule based on the single character width threshold and recursive segmented. The experiments show that the segmentation accuracy of continuous handwritten Chinese characters is quite high by this method, having certain practical.

    • Technology of Video Wireless Transmission Based on RTP and Template Convolution

      2013, 22(5):198-202. CSTR:

      Abstract (2030) HTML (0) PDF 934.63 K (2987) Comment (0) Favorites

      Abstract:The paper proposes adaptive subcontracting technology using a new RTCP feedback technology and calculation methods of motion vector based on template convolution, based on RTP transport protocol and MPEG-4 stream subcontracting. The technology in a wire transmission can effectively solve the high-resolution video images of the large amount of data packet loss rate problem. By the experimental results show that the technology can guarantee a high quality of real-time wireless video transmission.

    • Optimization Sequencing of Graphic Elements Based on HPGL File

      2013, 22(5):203-206. CSTR:

      Abstract (1361) HTML (0) PDF 822.27 K (2961) Comment (0) Favorites

      Abstract:In HPGL file, the graphic elements are recorded according to the sequence made by the designers. A lot of useless journey is made by using the file and it is inefficient in drafting or machining process. In order to solve the problem, an algorithm based on the graphic elements whose start point and endpoint could be dynamically changed Along the drafting path was put forward. The sequence of the graphic elements and its reference points could be optimized by Using the algorithm, the question is converted to DXF, and the drafting or machining path could be reduced based on the optimized HPGL.

    • Age Estimation of Face Image Based on Fuzzy Membership Degrees

      2013, 22(5):207-210. CSTR:

      Abstract (1386) HTML (0) PDF 913.05 K (2946) Comment (0) Favorites

      Abstract:Because of the greater uncertainty exists in both face features and age, a novel method based on fuzzy membership degrees for age estimation of face image is proposed. Face features are extracted by Gabor wavelet transform which are robust to the illumination change and scale variations. In order to avoid dimensions disaster and reduce the follow-up calculation, the dimensions of the extracted features are reduced by means of principal component analysis. The fuzzy function is appropriate for age estimation of face image was derived rigorous. The principle of maximum membership degree is used to age estimation, the experiments were conducted on the FG-NET face database and own FAID face database, the highest recognition rate of 94% was achieved.

    • Evaluation of POL Support Ability of Naval Vessel Unit Campaigning Based on Cloud Bary-Center Theory

      2013, 22(5):211-215. CSTR:

      Abstract (1437) HTML (0) PDF 972.71 K (2844) Comment (0) Favorites

      Abstract:In order to evaluate POL (Petrol-Oil and Lubricants) support ability of naval vessel unit campaigning, evaluation indexes system is built from 6 aspects: the ability of POL storage, POL transportation, POL replenishment, response, organizing, repair and emergency disposal based on POL support characteristic and correlative demands of naval vessel unit campaigning. The cloud barycenter theory is adopted to build evaluation model of POL support ability of naval vessel unit campaigning, and the model is validated by analyzing an example. The result indicates that the method based on cloud barycenter theory can syncretize subjective and impersonal information effectively and solve the uncertainty transition between qualitative and quantitative problem in the evaluation, which reduces the impacts that fuzziness and randomness have in evaluation and improves the scientificity of POL support decision-making of naval vessel unit campaigning.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063