GUO Ling-Bing , LUO Xin-Xing , ZHU Ming-Xun
Abstract:Customer’s trust is one of the critical success factors of mobile commerce. Its formation and development is a dynamic evolutionary process. Using evolutionary game theory to study the evolution of customer trust equilibrium, and simulation application Netlogo. Studies have shown that to establish the confidence of potential users, m-merchants should take the initiative to issue a credible signal; For old users, should be committed to enhance customer satisfaction; regulatory mechanisms should adjust its policy with the development of m-commerce in the strict management create appropriate and comfortable environment for development, compensation to customers and punishment to dishonesty m-merchants should be larger at an early stage, with the regulatory authorities to improve the probability of its discovery merchants acts of dishonesty, the amount can be gradually reduced.
ZENG Wen-Ye , FANG Lu-Ping , WAN Zheng-Jie
Abstract:3D Slicer, a useful Medical Image Processing Platform to research medical image, has obtained the attention of researchers worldwide. This platform has many advantages such as free and open source, high scalability, good portability etc. In this paper, 3D Slicer's GUI is analyzed and divided into three parts: the core, the command-line modules and the Python scripted modules. In order to achieve the goal of internationalization, QT's internationalization method is also researched in this paper according to different parts. Beside, the internationalization of input of 3D Slicer was also accomplished by analyzing the encoding of the input strings.
Abstract:Based on the fuzzy mathematics theory, the fuzzy comprehensive evaluation principle, the civil airport construction perimeter prevention system fuzzy comprehensive evaluation model. Perimeter prevention system of subsystems of fuzzy evaluation, in order to test the safety of each subsystem stability objective, comprehensive value will be divided into several respectively, and the corresponding to the organization of the airport four state, namely: crisis state [1,0.75], low state of crisis [0.75, 0.5], the basic normal [0.5, 25] and normal management state [0.25, 0]. When the calculated the comprehensive evaluation value in the above a certain range interval, can be directly shows the airport the perimeter security specific state.
Abstract:To deal with the design of remanufacturing reverse logistics network, considering the uncertainty of the product recovery and consumer market demand, a multi-period remanufacturing reverse logistics network model based on third-party recovery was established in order to maximize the benefits of both the third-party logistics supplier and the manufacturer. The model can be determined for the best price of products that the manufacturer pays for the third-party logistics supplier each period. The numbers of recycling centers and inspection/disassembly centers, and the allocation of the corresponding goods flows in the network can be decided. The uncertainty parameters were denoted by the triangular fuzzy numbers. With fuzzy chance constrained programming methods, the network model in the uncertain environment can be transferred into a certainty equivalent model. The validity of the model was illustrated by a numerical example, and the relationship between the two goals was analyzed by goal programming method.
CHEN Fu-Ping , FU Bao-Yu , LING Yu , LIU Rui-Chao
Abstract:In order to meet the special requirements for data involved in exploration and development research, as well as schematic design in the oil industry upstream business, techniques such as Multi data sources integration, Data classification and search, System service function customize, Data using authorized and safety control have been employed to realize the access and download of exploration and development data (e.g. different types of sources, multiple data class, mass data) under single system environment. This research breaks the access limitation of single or certain types of data to similar system at home and abroad.
WU Qiong , WANG Ying , LIANG Jin-Qian , SUN Lei
Abstract:As the use of cluster technology is becoming more and more widespread in fields of oil exploration, aerospace engineering, biological engineering, etc, the application requirements of different type nodes make cluster system harder and harder to manage in the cluster environment. In the paper, with the conception of cluster technology, applying xCAT+shell and Qt platform in Linux, the cluster deployment system has been designed and implemented to configure and distribute centrally different types of nodes in the cluster.
Abstract:Digital Signature System is an indispensible Information Safety Technology for E-commerce, E-government etc. The thesis probed main information safety hazard in the course of information transmission, emphatically explained PKC-based Digital Signature System's realization principle and selective analysised the Digital Signature System how to solve all kinds of potential safety hazard for network information. Finally, through combining Digital Signature with Digital Certificate, elaborated basic process of Internet Information secure transmission.
XU Ming-Zi , LV Li , LI Xi-Wang
Abstract:This paper researched key techniques of topic-focused web crawler at first, then designed and implemented a crawler system by using improved slef-adapted vector space model. It analysised documents both in text and links. As the same time, this paper also comed up with a web search stategy based on gene factor combined with manully control. This strategy can solve the problem of searching path blocked. In the end, we provide some experiment results to prove the feasibility and advantages of our system from recall ratio and precision ratio.
YU Wei-Yong , JIAN Xian-Zhong , XI Li-Feng , GUO Qiang , YU Jiang-Yun
Abstract:More and more people pay attention to real-time three-dimensional dynamic display technology based on computer generated hologram. The major problem to restrict its development is computing speed. To solve the problem, we build PC-FPGA distributed computing holographic hardware acceleration system that multi-chip FPGA hardware block computing paralleled. Each chip FPGA unit must have the functions both of holographic algorithms computing and the data transmission to achieve this goal. Therefore, NIOS II soft core transplant uC/OS II operating system and LWIP Ethernet protocol stack based on already CGH algorithm acceleration module, NIOS II as the MCU to control CGH algorithm acceleration module and Ethernet data transmission. The article will introduce the NIOS II soft-core, uC/OS II and LWIP achieve to Ethernet data transmission process. To provide a new method to the realization of three-dimensional dynamic real-time display based on CGH.
LI Qiang , HE Sui , LI Guang-Bing , JI Li
Abstract:Study on the ideas and methods of using the technology of LDAP and single sign-on technology to establish a unified user management system in the meteorological industry. According to the analysis of the status of the existing meteorological business applications, this paper proposed a solutions program based on the LDAP directory services and single sign-on technology. Focus on the establishment of an LDAP directory, authentication and single sign-on. At the same time, it briefly introduces the establishment of the system flow, so that the user authentication and access control is more efficient, and management more convenient.
Abstract:This paper designs a monitoring system based on distributed network. Web camera collection video data for the system and compression, then send the data to the remote PC host, the hose analysis image frame for face recognition and gait recognition to detect the abnormal body, then control camera haeundae for monitoring. The system makes use of real-time transmission protocol and real-time control protocol to complete the distributed video acquisition and centralized processing on network, which provide a highly efficient feasibility and low cost solutions, the system has very good real-time and interactive performance.
WU Shu-Wei , YAN Xun-Chao , CAO Qi
Abstract:With the advancement of informationization in our society, the key business of enterprise rely on information system more and more. The progress of technology and change of IT environment of enterprise which is required by business, often force enterprisesfacing with the problem of existing information system data migration. Data migration brings interruption to the service of users, which is a waste of time that means losing opportunities, so it requires system data migration must be quick and accurate. Electric power enterprise information technology is developing rapidly, and the information systems update frequently, therefore how to ensure the system data migration convenient, fast, safe, reliable performance, is an important research topic of the information department in an electric power enterprise. In this paper, we made a detailed analysis of the data migration process in all aspects from the management of an enterprise data standpoint, integrated the experience of power system data migration, and put forward a solution of data migration of electric power production system, which has some reference value for the implementation of enterprise information system data migration.
Abstract:This paper designed and developed a marketing decision support system based on cloud computing, which interacted with other sub-systems, and together made up the entire management decision support system. Designed the distributed database, and the system could both process local database independently and read remote databases. The model base contained various marketing decision models, and complex decision problems could be solved by model combining. The system flow fully considered the human-computer interaction, and user's judgment was included in the decision making process. Completed the system development, and used simulation data to test the system. The running results show that the system is stable, the sub-modules join well, and the MDSS achieves data sharing with other sub-systems.
CAI Yong , LIU Mei-Ling , HU Hao , SHI Yun-Zhen
Abstract:Ruby on Rails (ROR) is a Web application framework. It can rapidly develop and highly respected by Agile Development Practitioners, which contains important concepts MVC pattern, DSL, Convention over Configuration, Generator, Don’t Repeat Yourself et al. In this paper, a real issue, “Chinese medicine database sharing platform”, for example, to study how to apply ROR technology to meet the actual needs of the project, the technology involved in the MVC pattern, RESTful SOA, AJAX etc.
CHEN Zhu-Hong , CUI Chao-Yuan , WANG Ru-Jing , ZHOU Ji-Dong
Abstract:As the foundation of cloud computing, virtualization technology’s security problems are gained more and more attention of the specialists with the development of cloud computing. This paper presents a virtual machine system kernel intrusion detection system, which use the introspection technology provided by Xen hypervisor to get internal states of kernel of the virtual machine. To achieve the goal of monitoring the kernel and preventing it from being compromised. This system can effectively defend the case of attack that dynamically modifies the kernel code and kernel unchanged data structure.
XU Yi-Qin , ZHANG Sheng-Shan , LV Xi-Sheng
Abstract:To improve the real-time scheduling of the tobacco industry plans, a system that complies with the characteristics of cigarette production planning and scheduling system is proposed, and described the architecture, functional modules and rule scheduling algorithm of the production and scheduling system. The designed system could run continuously and stably, and corporate customers can use the system software to develop the scientific and reasonable production scheduling plan quickly and accurately according to the sales contract and scheduling plans, and realize the operation of the management and control integration.
Abstract:This paper introduces the basic ALOH algorithm, slotted ALOHA algorithm, frame slotted ALOHA algorithm and dynamic frame slotted ALOHA algorithm in details, as well as their basic principle and system effectiveness, and analysis their characteristics. Based on the dynamic frame slotted ALOHA packet algorithm of this paper is presented, labels are grouped according to the number in the algorithm, and dynamic matching optimal frame length, the simulation results show that the improved system has the advantages of high throughput, unrestricted in the number of labels, saving time slots of a frame, and so on.
LEI Ming , WANG Xin-Fang , LIU Qiao , SUN Xin
Abstract:Based on the method of dual backward and forward delay kernels, an improved algorithm of echo hiding in which watermark codes embedded the audio signal is proposed in this paper. The energy of each segment into which the original audio is first divided was computed. The energy threshold of audio segments is set by the given rate of embedding watermark codes. Then the audio segments whose energy value above the energy threshold are embedded with the watermark codes and the secret information is detected with a power cepstrum computing method. The simulation results show that the improved algorithm has a significant improvement in imperceptibility and can remarkably decrease the bit error rate of detected watermark codes.
TIAN Yang , YANG Jiao-Ping , BAO Yu-Mei
Abstract:The mathematical model of Enterprise transfer alliance vehicle routing problem based on fuzzy demand is established, and the problem based on fuzzy demand is transformed into a clear demand through the structured element theory. In order to solve this model, a planar structure chromosome and its genetic algorithm is proposed, which is proved by an experiment.
Abstract:The design of test-cases is one of the most important parts of software testing, which play an important role in guiding the post-testing and also is the fundamental guarantee of quality software. For the shortcoming of method raised by Moheb R. Girgis, an improved genetic algorithm for the automatic generation of data flow test-cases was proposed by introducing the branch functions and adaptive genetic strategies. Experiments show that the improved algorithm has a more increase in the performance of convergence rate and coverage rate.
LI Wei-Bin , XU Xiao-Bo , SHANG Bao-Wei , MA Xian-Min
Abstract:For the navigation satellite receiver technology, the weak signal acquisition is the key to improve the receivers' sensitivity. According to the characteristics of the weak signal, long duration correlation integral is the classic method. Unfortunately, the duration is always limited to 10ms for that navigation bit rate is 50bps. In this paper, a dichotomy-based acquisition algorithm is proposed to extend integration duration to 19ms. Meanwhile, to reduce its computation complexity, the convolution operation is replaced by summation for its potential linear relation in the special time. Theoretical analysis and simulated result proves that the proposed algorithm can improve receivers' sensitivity and reduce its computation.
ZHANG Bo , WANG Tian-Zhao , LI Ke , CHEN Jin-Yu
Abstract:According to the problems of low-precision and less real-time in Harris feature point matching, proposes an improved algorithm of Harris feature point matching. Firstly, Harris feature point extracting algorithm is improved so that it can reduce false feature point extracting. The initial feature point pairs are extracted with the method of improved bidirectional greatest normalized correlative coefficient, and the false feature point pairs are rejected by the improved random sample consensus algorithm to realize precision matching. The results indicate that the improved algorithm not only improve the precision of feature point matching but also improve the efficiency of feature point matching greatly.
ZHANG Quan-Fa , PU Bao-Ming , LI Tian-Ran , SUN Hong-Guo
Abstract:We propose a vehicle detection algorithm for Intelligent Surveillance used in open pit area . The algorithm detects vehicle in the image using Histograms of Oriented Gradients features (HOG) as the image description, combined with support vector machine (SVM) classifier training. In order to improve the detection efficiency and accuracy, Hough transform line detection method to extract the region that contains the target to reduce the search range. The experiments show that the algorithm can be able to recognition the target in complex images, with high degree of accuracy, robustness for the different environments of the experiment.
Abstract:In order to solve data sparsity and scalability of the Collaborative Filtering (CF) recommendation algorithm when the volume of the dataset is very large. After deeply analyzing the Hadoop distributed computing platform and the characteristic of Collaborative Filtering recommendation algorithm, the paper propose a optimization scheme on Hadoop platform. The experimental results show that it can effectively improve the execution efficiency of Collaborative Filtering recommendation algorithm in large data size, when it is realized by MapReduce with Hbase database on the Hadoop platform.And then, it contribute to build one recommendation system which is low cost, high-performance and dynamic scalability.
PAN Zheng-Rong , ZHOU Li-Ping , ZHANG Ning , ZHU Xiang
2013, 22(7):113-116,112. CSTR:
Abstract:A new type of binocular vision system was designed used common CCD cameras. Because of positioning accuracy is not high, the experiment used the modified projection algorithm to get the position messages. This algorithm joined the explicit-implicit distortion correction method in the projection algorithm. After correction, the positioning accuracy of the whole system was improved. The experimental results showed that: In the range of 2600 mm, three direction errors in the world coordinate axis Xw, Yw, Zw are 0.200 mm, 2.300 mm and 35.432 mm. Comparing projection algorithm, the errors of the improved positioning algorithm are smaller. The new method can satisfy the system accuracy requirements.
SU Guo-Dong , WANG Ping , XU Shi-Wu , CAI Bi-Li
Abstract:The energy consumption is a primary consideration factor in the Wireless Sensor Networks(WSN).To balance the energy consumption of each node and enhance the lifetime of the network, in this paper, a fuzzy logic approach to cluster-head election which is called FLCHE is proposed. This algorithm fully consider the residual energy of the node, the energy consumption rate, and the distribution density of the node.Simulation with Matlab shows, compared to the LEACH, FLCHE balance the energy consumption of the nodes more and prolong the network lifetime. The overall performance is better than LEACH.
Abstract:This paper proposes a publicly verifiable delegation model for multi-boolean-function, and gives a construction based on key-policy attribute based encryption (KP-ABE) supporting non-monotonic access structure. In our scheme, any third party could verify the result of the delegation for the boolean-function. Compared to the construction proposed by Parno, our scheme is more efficient, since it can delegate multi-boolean-function after the setup of the system, by binding the inputs to the specific boolean-function .
2013, 22(7):127-132,160. CSTR:
Abstract:After the eighteenth central economic working conference of the CPC, the government and enterprises are giving priority to Green industry, which applies for Towns construction, traditional manufacturing industries, especially for the logistics and transport. Different from the traditional VRP, we set minimizing fuel consumption as the objective rather than the transport distances, and establish a VRP model that take 4 factors that are essential to fuel consumption: running distance, cargo weight, road pavement, and road grade, under the VRP with simultaneous Pick-up and Delivery(VRPSDP). A new heuristic factor is adopted , the pheromone update is also a new version in order to better mimic the ants’ parallel strategy in natural environment. Then we explore the parameters setting which affect ACS’s performances a lot. The empirical results show that the optimization program has achieved satisfactory results, thus validating the scientific and effectiveness of the proposed methodology.
LIU Ming-Chao , YANG Liang Huai , ZHOU Wei-Gang
Abstract:HHJ is one of the mostly used core join algorithms for query processing in a database management system. This paper proposes a buffer-optimized hybrid hash join algorithm(OHHJ) by optimizing the bucket buffer to reduce the random I/O in hash join, i.e., to minimize the random I/O by optimizing the bucket buffer size in partition phase. By quantitatively analyzing the relationship between the bucket size, bucket buffer size, available memory size, relation size and random I/O access characteristics of hard disk, we have derived the heuristics for allocating the optimal bucket and bucket buffer sizes. The experimental results demonstrate that OHHJ can effectively reduce random I/O in HHJ during partition phase, and thus enhance the performance of the algorithm.
2013, 22(7):137-140,121. CSTR:
Abstract:In order to improve the solving efficiency and performance of Weapon Target Assignment (WTA), this paper puts forward a kind of improved quantum-behaved particle swarm optimization algorithm for solving WTA. First, by defining particle evolution speed and particle aggregation degree, the inertia weight is expressed as the function of particle evolution speed and particle aggregation degree, making the inertia weight have self-adaptivity. Secondly, the slowly varying function is introduced into the traditional location updating formula, effectively overcoming the problem of the partial optimization. Finally, a multiple weapons target assignment is built to meet the target of the minimum failure probability in allocating weapons and shooting all targets. Simulation results indicate that the new algorithm can get the optimal or suboptimal solution to WTA problems, that is, effectively solve WTA problems.
2013, 22(7):141-143,182. CSTR:
Abstract:UML is a powerful visual modeling language. This paper, based on Customer complaint management system for Han zhong tea, combining the advantage of UML system modeling, states modeling process about software development, detailing the functional analysis, system design, to system implement and constructs requirement model, static model and dynamic model by modeling tools Power Designer 15.
Abstract:This paper introduces firstly the analog signal energy meter and a pure digital power meter integrated into the architecture of a Measurement system, and analysis of the realization of the measurement system in embedded real-time operating system uCOS-II environment and include: the division of tasks communication and data sharing issues between tasks, which focus on the problem of communication data sharing between tasks. Concluded the overall inter-task communication situation, and laid a solid foundation for the design of a high-precision digital power meter measurement software.
LI Zi-Feng , CHENG Shao-Yin , JIANG Fan
Abstract:Currently, the issues on Android application’s security have attracted more and more attentions. This paper presents a static analysis method to detect malicious behavior in Android applications. The method uses static data flow analysis technology, and implements a const analysis algorithm that tracing how the const value is used by the application to detect different kinds of malicious behavior, such as ordering services and consuming payments maliciously. The result of experiments shows that the method is practical, and can detect the malicious behavior in Android applications effectively.
LI Hai-Long , LIU Yu-Qing , ZHU Xiu-Qing
Abstract:Calibration of optical see-through head-mounted displays(OSTHMD)is a key issue in augmented reality domain. In the paper, several common technologies about calibration of OSTHMD are researched; their advantages and disadvantages, discussed in detail the current most commonly used OSTHMD calibration method: SPAAM, and raise a fast method about calibration of OSTHMD based on image, compared the two calibration method from algorithm complexity, with user self-assessment method, the fast method about calibration of OSTHMD based on image is considered more rapid and precise.
Abstract:For the inaccurate speed estimation in speed sensorless servo system which is caused by the uncertainty of the stator resistance, an improved model reference adaptive system (MRAS) method is proposed in this paper. In this method, the current model of PMSM is regarded as adjustable model. Moreover MRAS’ adaptive laws which add resistance estimation are designed. And then a simplified model is achieved according to the control strategy. Finally the simulation model is built under the Matlab/Simulink. The result shows that the speed estimation with resistance estimation has strong robustness in the effect of the uncertainty of the stator resistance in a wide range of speeds.
WANG Wan-Liang , ZHANG Xiao-Wei , YAO Xin-Wei , CEN Yue-Feng
Abstract:In the high error rate wireless network environment, packet loss caused by wireless error will be misunderstood as congestion packet loss by the classic mechanism of TFRC, leading to lower throughput. To solve the transmission control problem of the wireless network for real-time streaming media service, the paper proposed a mechanism called Adaptive-TFRC which was an improved mechanism of TFRC, which can reflect the true state of the network by using loss differentiation parameter of the receiving end, then the value of parameter would be sent back to the sending end, also we have improved the throughput model formula of the classic mechanism of TFRC in this paper, finally it can realize the dynamic adaptation of transmission rate. The simulation result shows that Adaptive-TFRC can greatly improve the throughput, reduce the delay jitter of real-time traffic, and it posses TCP friendly characteristic very well, thus guaranteeing service quality of the wireless network real-time streaming media.
Abstract:6LoWPAN enables the IPv6 communication over Wireless Sensor Networks, which defines two routing strategies: mesh-under if the layer concerned is adaptation layer and route-over if the network layer. To address problems in route-over forwarding for IP fragmented packets in 6LoWPAN, this paper proposes an improved route-over strategy based on virtual circuit which enables fragments forwarding in pipelined manner, and presents the design of the improved strategy which create a forwarding mapping for subsequent fragments based on IP compression header of the first fragment. The experiments show that the improved strategy proposed in this paper perform better than original one in transmission and time delay in dealing with IP fragmented packets.
Abstract:It is very important to research and analyze one of Knapsack Cryptosystems in which the density of knapsack is greater than 0.9408. For the new knapsack public-key algorithm which is based on linear indeterminate equation in two variables, public key and ciphertext are used to construct a lattice to attack the scheme and the NTL library to verify the efficiency of the lattice attack algorithm, which finally illustrates the effectiveness of the attack method. It then proves the new knapsack public-key cryptosystem is insecure.
GONG Jian-Feng , LI Xi , CHEN Xiang-Lan , ZHU Zong-Wei , JIA Gang-Yong
Abstract:Flash memory is widely used as storage media in electronic devices recently, and the researches of flash memory also receives more and more attention. This paper proposes a cache management algorithm called LRU-BLL, which is based on block level locality and replacement cost difference of clean page and dirty page, and combines with character of flash memory. By using simulation to evaluate the scheme, we find hit ratio and number of write/erase operations have a satisfactory improvement in proposed algorithm.
2013, 22(7):183-186,176. CSTR:
Abstract:Aiming at the system performance degradation problems of distributed file system in massive small file access patterns, designed and implemented a delegation mechanism for meta data cache in client .The client apply some kinds of delegations when getting meta data from the server. The meta data server checked and decided ecide whether to grant the delegation or not. Once the client getting the delegation which is stored in the local memory, the meta data getting operation can be unnecessary to sent RPC request. The simulation result shows that our method in this paper can reduce the number of the RPC request effectively, and aving valuable network bandwidth resources, reducing the metadata server load.
Abstract:In order to load Java class file during the Java application runtime and without affecting the normal operation of other functional modules, the realization of Java dynamic class loading method is given based on the java virtual machine (JVM) mechanism. Java Class Loader architecture, theory of dynamic class loading mechanism, the implementation process are analyzed, and which are applied to the file release module of web site management platform system. The file release module is designed to make static web pages and website management system linked. Through the custom loader to loading encryption of Java class files. In a hot swap way to implement the deployment of secondary website, enhance the site management platform's flexibility and expansibility.
Abstract:This paper briefly analyses the type of service of the GBS(Global Broadcast Service),put forward an approach of the service modeling based on Hidden Markov Model(HMM). By simulating the GBS in Qualnet, the service traffic trace is captured. The proposed modeling approach is realized in Matlab. The HMM based modeling approach only used two variables: packet size and inter packet time, which are hardly influenced by encryption techniques. The experiment results show that by the use of discrete variables, the proposed modeling approach can decrease the calculating complexity and model constructing time, improve the time cost.
JING Lin , LIN Yao-Hai , WEN Yong-Xian , HUANG Shi-Guo , LIN Yi-Kuan
2013, 22(7):196-199,191. CSTR:
Abstract:Scaling automation for bundled logs not only improves production efficiency, but also is a requirement for forest resource management. After image processing, diameter of each log and the number of logs is obtained, and this process is key point of scaling automation for bundled logs. Because the imaging environment of bundled logs is complex, much man-machine interaction is needed while using the existing methods for outline identification of bundled logs. In this paper, the color feature of logs in the image of cross section of bundled logs has been discussed, which is used to remove the irrelevant pixels in the image and obtain the pixels of logs. In the next step, Laplace filter is used to work out the edge in the image, implementing the separation of log outlines. Finally, we achieve outline identification of bundled logs.
LEI Hao , YU Guang-Jun , YAO Zhi-Min
Abstract:The damage calculation model of the target key components by the warhead fragmentation was set up with Monte-Carlo method. The damage ability index of the fragmentation was estimated. Taking the air-defense missile attack on the target as an example, the effectiveness of this method was shown. It was of help to the decision making in calculating the target damage effect.
LI Xiao-Feng , DING Shu-Chun , WANG Xue-Mei
Abstract:Intersection traffic flow analysis and analysis of algorithms, design of algorithms, this paper, the vehicles unified identification as a standard car equivalent steps of the algorithm based on the decision-making on the flow of traffic junctions, the algorithm is applicable not only to single-coil detector or single magnetic detector such as a single detector, but also applies to dual-loop detectors. The detection process is simple and can achieve very high accuracy rate, and through case studies, to verify the effectiveness and accuracy of change algorithm.
XIONG Feng-Guang , HAN Xie , ZHANG Hui-Bing
2013, 22(7):207-211,172. CSTR:
Abstract:A visual simulation system of fragment warhead missile attacking F16 “Falcon” fighter plane based on simulation and virtual reality technology is proposed. Firstly, the design of visual simulation of missile attacking F16 is finished, and function of each model is demonstrated detailed. Then 3D models in virtual battle field are optimized through LOD, Texture, and the model of fragment and power field of F16 are built. Finally, Vega scene driver program is developed, and special effect, view transform, preview and collision detect are emphasized. The simulation result provides reference for damage assessment of missile attacking F16.