• Volume 23,Issue 3,2014 Table of Contents
    Select All
    Display Type: |
    • >Survey
    • Survey of Histogram Equalization Technology

      2014, 23(3):1-8. CSTR:

      Abstract (2285) HTML (0) PDF 1.09 M (8483) Comment (0) Favorites

      Abstract:Histogram Equalization is a simple and effective technology in image enhancement, and it is widely used in medical image processing, computer vision and remote sensing image. When selected different equalization regions, histogram equalization can be divided into global and local histogram equalization method. While the equalizations choose different pixel area, it will be divided into traditional histogram equalization, bi-histogram equalization, recursive mean-separate histogram equalization, and even multi-histogram equalization. Histogram equalization also can be divided into histogram equalization based on space domain and histogram equalization combined with frequency domain in equalization objects. From the channel numbers of equalized image, it will be divided gray image equalization and color image equalization. This paper systematically summarizes the histogram equalization methods mentioned above, describes the evaluation index to measure equalization effect, and look into the distance of further research direction in histogram equalization technology.

    • Controller Based on Brain-Computer Interface

      2014, 23(3):9-15. CSTR:

      Abstract (1704) HTML (0) PDF 1.25 M (3319) Comment (0) Favorites

      Abstract:Our research is based on brain-computer interface controller for the realization of the brain communicate with the device. In this paper, we study how to obtain the characteristics of the eeg signals, during the experiment, to acquire EEG signal through the E-Prime psychology software and Neuroscan company production of 64 channel EEG acquisition equipment. Analysis of the original EEG signals using wavelet algorithm, frequency wavelet coefficients as the feature extraction of interest. Analysis of EEG power spectrum, design a classifier based on Fisher criterion. Based on the study of brain computer interface (Brine-Computer Interface, BCI) basis, the movement control was achieved through the imagination. In wheelchair for the actual control object, only through the two electrode EEG signal, the controller design, the theory is validated by experimental success through the imagination of four direction control the wheelchair movement. Finally this paper also discusses the application prospect of brain-computer interface.

    • Remote Sensing Image Automatic Registration Based on SURF Feature Extraction

      2014, 23(3):16-24. CSTR:

      Abstract (2280) HTML (0) PDF 2.03 M (3382) Comment (0) Favorites

      Abstract:SURF (Speeded Up Robust Features) feature extraction is currently more popular image registration method. This paper proposed a improved method based on block strategy on the basis of SURF. Firstly, using Watershed Algorithm to determine the number of image blocks; then the image was divided into blocks and each sub-block extracted a certain amount of feature points to realize uniform feature point extraction; then using sparse feature tree to find the matching feature points and finally using improved RANSAC algorithm to eliminate the error matching feature point pairs, while calculating transformation between the reference image and the image to be registered. Experiments show that this method can efficiently and quickly solve the problem of remote sensing image automatic registration.

    • Improved OAuth2.0 Protocol and Analysis of its Security

      2014, 23(3):25-30,39. CSTR:

      Abstract (2034) HTML (0) PDF 1.90 M (3254) Comment (0) Favorites

      Abstract:With the wide applicaitons of OAuth2.0 protocol, people have payed a special attention to its security. In order to enhance its security, in this study the digitial signature firstly is introduced, then an improved OAuth2.0 protocol is proposed which has the authentication from authorization server to client and authorization server to resource owner. At the same time based on the Blanchet calculus in computaional model, the correspondence is applied to model the authentication from authorization server to client and authorization server to resource owner, and finally the authentication is proved by CryptoVerif.

    • Online Order System of Remote Sensing Products Based on JBPM

      2014, 23(3):31-39. CSTR:

      Abstract (1742) HTML (0) PDF 1.60 M (3087) Comment (0) Favorites

      Abstract:In this paper, the workflow technical, as an effective approach to execute the business processes in the industrial production organization and office automation area, is applied on the online order system of remote sensing products. Therefore, a new design of the online order system of remote sensing products based on JBPM which is one of major open source workflow management systems is proposed. The JBPM as an analysis framework is also motivated by the following factors. First, considering the characters of online order system of remote sensing products, the ordinary three-tier architecture of JBPM was changed to five-tier architecture. Second, according to the defects of web process designer in JBPM, the client is developed by Flex and using the SHH designer framework which success to solve many cross-browser compatibility issues. Third, the web service, the JBPM's production-driven designer and the service-oriented architecture are all developed to reduce coupling degree and make the process configuration simple. In order to prove the new design system's good performance, the testing system was build. The testing data on the testing system show that the new system can meet users' diversified and individualized needs of remote sensing products. And those remote sensing products can be produced well.

    • Manufacturing Execution System (MES) Based on Supply Chain

      2014, 23(3):40-43,111. CSTR:

      Abstract (1588) HTML (0) PDF 1.45 M (2724) Comment (0) Favorites

      Abstract:Aim at the need of information sharing between companies in supply chain where discrete processing and assembly companies are the core. A manufacturing execution system which is based on supply chain has been developed. Through the three data architecture technology, the main engine factory issues plans or adjusts the plans to outsourcing factories. Then outsourcing factories make products according to the plan and timely deliver the order execution progress to main engine factory based on the RFID technology, which provides data supports to main engine factory for the next step decision making.

    • Computer Network Fault Intelligent Diagnosis System Based on Production Rule

      2014, 23(3):44-50. CSTR:

      Abstract (1678) HTML (0) PDF 1.82 M (3559) Comment (0) Favorites

      Abstract:With the increase of network's complexity, the influence of network failure is more and more critical. Fault diagnosis performance should be improved too, especially on the automation and intelligence. According to the experts' experience to diagnose network fault, this paper designs a production rule for it. Afterwards, paper implements network fault diagnosis by rule reasoning, and generates repair scheme automatically. Furthermore, the system can share the fault knowledge among all the agents, so that the whole network can be immune from the new fault automatically. Finally, we design and realize a set of intelligent network fault diagnosis & repair system, which can finish network fault diagnosis & repair work automatically.

    • Agricultural E-Business System Based on Google Maps

      2014, 23(3):51-55,50. CSTR:

      Abstract (1853) HTML (0) PDF 1.46 M (3010) Comment (0) Favorites

      Abstract:At present, there are many e-business sites, however, agricultural e-business site is not very common. This paper proposes a method to build agricultural e-business system, the most important feature of the system is the inclusion of a map service, and the integration of relevant data on many systems, such as agricultural specialized system and agricultural price-comparing system. In this paper, we describe the designing method of agriculture e-business system, and describe how to implement map basic function and personalization recommendation function.

    • Sunshine Long-distance Race Terminal System Base on DM3730

      2014, 23(3):56-61. CSTR:

      Abstract (1630) HTML (0) PDF 996.41 K (3285) Comment (0) Favorites

      Abstract:To solve some problems of traditional long-distance race, such the difficulty of management and supervision, the low enthusiasm of students, an embedded sunshine long-distance race terminal system is designed and implemented. DM3730 processor based on ARM is chose as the hardware platform and Linux is used as software platform. A new technology about twice identification based on identity card and fingerprint is presented, user running information is stored in SQLite databases, interaction with the remote server is based on Transmission Control Protocol(TCP), and Qt is applied to construct Graphics User Interface(GUI). The testing results show that system has a high speed and precision of identification, an operation of GUI is also very friendly, management gets intelligent, running is held without supervision at any time. Higher application prospect and market value is expected.

    • College Teachers’ Professional Skills Management System

      2014, 23(3):62-69. CSTR:

      Abstract (1667) HTML (0) PDF 1.46 M (3257) Comment (0) Favorites

      Abstract:A college teachers' professional skills management system is designed and implemented based on J2EE. The requirement analysis process which involves business modeling and function modeling, the key technologies of system's technical architecture, general query frame and access control strategy based on RBAC are respectively discussed.

    • Commercial File Transmission System

      2014, 23(3):70-76. CSTR:

      Abstract (1874) HTML (0) PDF 1.21 M (2877) Comment (0) Favorites

      Abstract:Studied on a commercial use of high reliability and efficiency of file transfer system. Based on the Socket transmission. Records and information of transmission through XML information interaction, Perfect transmission guarantee mechanism for transmission system design, when it transfers the file, the network transient fault, then the network recovery, the system can automatically recover the transmission, and it can transfer the file which not completed transmission. The system has the good fault tolerance; it cannot breakdown because of the abnormal transmission. The last, the commercial file transmission system has the detailed logging in an all-round way, when the system has the problem, it can position the problem accurately, and solves the problem. System configuration is simple, and easy to operate, when transfer the large file, supporting resume transmission, so it ensures the efficiency of transmission. The system test passed in Windows 7 Enterprise Edition system.

    • Message Pushing Server Based on the MQTT Protocal

      2014, 23(3):77-82. CSTR:

      Abstract (2972) HTML (0) PDF 1.10 M (9639) Comment (0) Favorites

      Abstract:Mobile devices and smart terminal represented by ipad, iphone and the android phones have made a significant development in recent years. The number of their users is growing explosively. In order to meet the requirments of timeliness of accesses of information, power consumption, as well as the network environment in practical application, we should replace the traditional pull way with the push way to deliver messages. MQTT(Message Queuing Telemetry Transport) is a messaging protocol just designed for the situation. This paper describes the basic content and features of the MQTT protocol.Meanwhile it designs and realizes a message pushing server based on the MQTT protocol in foundation of several open source projects such as Mosquitto and Redis.The server can push messages to the users who have subscribed them before.In the meantime, some more functions such as user identity authentication, ACL permission checking, topic automatic subscribing, hot topic stastics and server status monitoring are added.

    • Content-Based Filtering Recommendation System in Agricultural E-commerce

      2014, 23(3):83-87. CSTR:

      Abstract (1729) HTML (0) PDF 886.94 K (2508) Comment (0) Favorites

      Abstract:As the agriculture information developing, agricultural websites have become an important channel for accessing information for agricultural users, cooperatives and agricultural companies. Combined with Chinese modern agricultural business e-commerce platform, content-based filtering recommendation technology is proposed, adopting four-tuple to construct user interest model, introducing forgetting factor to mining and update user preference, and generating recommendations depending on the similarity of product model and preference model. By the practical tests, the results show that Content-based filtering recommendation algorithm can effectively improve the purchase rate.

    • Design and Implementation of Integrated Storage System

      2014, 23(3):88-92. CSTR:

      Abstract (1574) HTML (0) PDF 1.07 M (2684) Comment (0) Favorites

      Abstract:The paper designed and implemented a storage controller which can integrate IP SAN and FC SAN and it can support the functions of storage protocol interchange and storage virtualization. We also implemented integrated storage disaster recovery prototype system based on our integrated controller, It validated the feasibility of building storage disaster recovery system based on integrated storage controller via the test for integrated storage disaster recovery prototype system.

    • Central Signaling Control Server Based on SIP

      2014, 23(3):93-97. CSTR:

      Abstract (1830) HTML (0) PDF 827.99 K (3382) Comment (0) Favorites

      Abstract:The ministry of public security has issued a related document to deploy and implement GB/T 28181 which is dictate to realize the building of surveillance camera system which is based on the GB/T28181 before 2015. Under the demand of the special network for the ministry of public security, We raised an design of the central signaling control server in surveillance and control system, which will offer the registration, the selection of routers and the logical control function for the client under the SIP, devices, media adapters and gateway, and so is the communication between the interface and application servers.

    • Virtual Campus Roaming System Implementation Based on Tourweaver

      2014, 23(3):98-102,92. CSTR:

      Abstract (1793) HTML (0) PDF 2.11 M (2986) Comment (0) Favorites

      Abstract:In order to guide a public environment, such as a campus, this paper describes a method with the use of spherical panoramas to develop an online virtual campus, reasearches panorama roaming technology and finally implements the system. Present the method of adjusting the node when taking panoramic pictures.To regulate panoramas, this paper designs a series of processes to complete panorama stitching. Use Tourweaver software to import panoramas and publish a file of video format by adding maps, hotspots, radars and other elements of the roaming system. Roaming system has simple interface, functional and practical features, allowing users to be clear at a glance.

    • Affinity Propagation Algorithm Based on Particle Swarm Optimization

      2014, 23(3):103-107,76. CSTR:

      Abstract (1673) HTML (0) PDF 1.28 M (2842) Comment (0) Favorites

      Abstract:Aiming at the problem that the preference parameter and damping parameter in affinity propagation algorithm have limitations to the result of clustering, this paper puts forward an affinity propagation algorithm which based on particle swarm optimization (PSO-AP). By taking the two parameters in algorithm as a particle, then adjust it Intelligently by particle swarm optimization (PSO) algorithm, and improve the effect of clustering. The results of experiment show that the algorithm has effectively solved the problem, improved the result of clustering and the accuracy of damping.

    • Battlefield Intelligence Information Compression Algorithm Based on FPGA

      2014, 23(3):108-111. CSTR:

      Abstract (1446) HTML (0) PDF 705.40 K (2651) Comment (0) Favorites

      Abstract:Fixed battlefield information contains a large number of related terms with fast and efficient transmission, compression is conducive to rapid transmission of information, but some of the existing compression algorithm for war intelligence and compression effect is not ideal. This paper introduces the principle of LZW algorithm, based on the LZW algorithm increases the situation dynamic dictionary, repetitive encoder algorithm is improved. In a number of improvement on the basis of combining the advantage of FPGA in hardware implementation, obtained the good effect.

    • Enterprise Transfer Alliance Vehicle Routing Problem Based on Fuzzy Time Windows and its Genetic Algorithm

      2014, 23(3):112-118. CSTR:

      Abstract (2193) HTML (0) PDF 1.03 M (2714) Comment (0) Favorites

      Abstract:After general description of enterprise transfer aliance vehicle routing problem based on fuzzy time windows, a multi-objective mathematical model for the problem is built up. Then, a hybrid genetic algorithm is proposed to this kind of problem. In this algorithm, a ternary type chromosome coding mode is used through some transformation and correction algorithms, based on the classical vehicle routing genetic coding. Additionally, crossover operator and mutation operator aew also improved. In the end of the article, the validity of model and the algorithm is proven by an example.

    • Follow-line Algorithm for Smart Car Based on Electromagnetic Sensors

      2014, 23(3):119-122. CSTR:

      Abstract (1992) HTML (0) PDF 692.06 K (5076) Comment (0) Favorites

      Abstract:The Freescale Cup National Undergraduate Smart Car Competition for the background, how electromagnetic smart car road information from the limited body to extract the deviation from the actual center of the runway. Traditional method is based around two inductive voltage value or the difference calculating a normalized value calculated in order to obtain a deviation from the track center of said body center level. However, these algorithms are present enough deviation calculated from linear defects, the need to rely on steering angle deviation for the body and the motor acceleration and deceleration of the intelligent vehicle control system is concerned this is a big problem. This paper presents a new method of calculating theoretically proved through simulation Maple normalization algorithm to solve the difference algorithm and drawbacks. By applying this algorithm to the actual competition, which validate the algorithm.

    • Predication Model of Controlled Atmosphere Storage Based on Grey System Theory

      2014, 23(3):123-126,118. CSTR:

      Abstract (1393) HTML (0) PDF 1.14 M (2713) Comment (0) Favorites

      Abstract:Based on low temperature storage and control of concentrations of oxygen and carbon dioxide, technology of controlled atmosphere storage affects the maturity and withering progress of fruit and vegetable, so as to improve the fresh-keeping effect of controlled atmosphere storage. Gray system prediction theory is used to establish a prediction model of controlled atmosphere storage environmental parameters (including temperature, humidity, CO2, O2, etc.) by analyzing the variation rules of them. For the parameters of large error and not complying with the model prediction accuracy required, the residuals of which is regarded as raw data to be processed by the symbol, to establish the GM (1,1) model error compensation, and to effectively reduce the prediction error rate. The experimental results show that the model has a higher degree of prediction accuracy, the accurate and timely forecasts of which can be used to adjust the controlled atmosphere storage environmental parameters, sequently to improve fresh-keeping effect.

    • Method of Image Registration Based on Camera Calibration

      2014, 23(3):127-131. CSTR:

      Abstract (1608) HTML (0) PDF 849.99 K (4088) Comment (0) Favorites

      Abstract:Image registration is to register two or more images in the same scene in space. It's widely used in the field of image analysis such as medical science, remote sensing image analysis, image fusion, image retrieval and target identification. A main problem of image registration is difficulty in matching, which is caused by a lot of image distortion in original images. Compared to the reference image, the problem is caused by the floating image produces large areas of the same color or various distortions such as translation, rotation and zooming in the image. For all of these distortion problems, this paper proposes a solution, which uses the camera calibration information to get the translation matrix, the rotation matrix, and the scaling of the distortions, and corrects the image distortions by inverse transformation. The camera calibration information, however, often be changed by moving the camera position. To solve this problem, this paper is by getting the PTZ Corner in the multi-angle to determine the camera calibration information. Experiments show that this paper provides a good solution to solve the distortion problems in the stage of image registration and improve the accuracy in the stage of image registration.

    • Application-Oriented Construction of Personalized 3D Face Model

      2014, 23(3):132-137. CSTR:

      Abstract (1830) HTML (0) PDF 881.06 K (3882) Comment (0) Favorites

      Abstract:Realistic 3D face modeling has become the focus of researches in computer graphics, but the existing researches have not provide a convenient, efficient, realistic 3D face models generation method. Based on the analysis of pose correction and transformation of 3D face model, a method of personalized 3D face modeling by matching a few key feature points is discussed, which need only a face picture and a common 3D face model. Then, a prototype system was implemented using C++ and OpenGL, and the experimental results suggest that the proposed method is easy and efficient, and can be widely used in film and advertising, 3D network games, and medical hairdressing, etc.

    • Hierarchical Feature Extraction in the Application of Neutron Lifetime Depth Correction

      2014, 23(3):138-141. CSTR:

      Abstract (1851) HTML (0) PDF 673.56 K (2641) Comment (0) Favorites

      Abstract:Neutron lifetime logging has been widely used, as the oilfield enters the mid and late development. Aiming at the existence of neutron lifetime logging curve depth error, contrast correction curve of two different stratigraphic information, and take advantage of the characteristics of logging curve sequential, for logging curve of hierarchical feature extraction and calibration. Logging curve correction method is presented based on the hierarchical feature extraction. Using the maximum position, spike number to match and categorize, and then using the maximum thickness ratio, and relative slope characteristics of the curve segment to judge similarity, and Finally realize the hierarchical feature extraction, these all based on the experience of the artificial vision correction. The experimental results show that the method can quickly and efficiently correct the logging curves.

    • HITS Algorithm Based on the Hadoop

      2014, 23(3):142-148. CSTR:

      Abstract (1725) HTML (0) PDF 957.34 K (2771) Comment (0) Favorites

      Abstract:In this paper HITS algorithm based on the Chinese vocabulary network is redesigned after analyzed the Hadoop platform, which is combined with the HITS's design theory and technology. This algorithm conforms to Hadoop framework.And Map/Reduce function's design scheme is analyzed in detail. With test data in a different cluster on the experiment, the results show that HITS algorithm can run well in a distributed environment and the cluster advantages are obvious.

    • Simulation of Routing Protocol in NS2 Based on Locomotive Parking Space Monitoring System

      2014, 23(3):149-152. CSTR:

      Abstract (1507) HTML (0) PDF 732.45 K (2814) Comment (0) Favorites

      Abstract:In order to improve the efficiency of management of the locomotive vehicle for factory employees, network simulation model is brought up base on the locomotive parking space monitoring system. NS2 is used to simulate the routing protocol of DSDV. The simulation results show that all data are sent to service node from wireless node through the base station in the system. Monitoring scene is similar of actual scene and suitable for the requirements of the system. The next task is to develop new routing protocol and applys it to the actual monitoring system.

    • Multilayer BOM Structure Ergodicity of MRO and the Display Algorithm

      2014, 23(3):153-157. CSTR:

      Abstract (1495) HTML (0) PDF 734.64 K (3042) Comment (0) Favorites

      Abstract:In order to optimize the performance of MRO system and improve the operating efficiency of this system, two formation methods of BOM have been put forward. In addition, advantages and disadvantages of these two methods are pointed out. The storage means of BOM structure is extended from three layers to multi-layers, and Java language as well as Swing library are applied to go through and display this BOM structure. The practical application indicates that the BOM structure ergodicity and the display algorithm mentioned in this paper can effectively improve the operating efficiency of MRO system.

    • Modified Partially-occluded Object Recognition Algorithm Based on Feature Points Matching

      2014, 23(3):158-161. CSTR:

      Abstract (1973) HTML (0) PDF 674.12 K (3122) Comment (0) Favorites

      Abstract:Image target recognition is one of the most important topics in the fields of image processing and pattern recognition. It has been more and more widely used in the fields of security monitoring, medical diagnostics and so on. Traditional algorithm can accurately identify the non-occluded target with simple background. For the partially-occluded target, however, the traditional recognition algorithms often make mistakes of false alarm and missed alarm. To solve the problems caused by partial occlusion, this paper proposes a modified target recognition algorithm, based on matching feature points. This algorithm gets the feature points roughly by corner detection of Harris, estimates the effectiveness of the feather points' probability density, therefore effectively recognize the target. The proposed algorithm has better real-time tracking, and it provides a good solution to solve the recognition of the partially-occluded target.

    • Probability-Based CDMA Code Assignment Algorithm for Underwater Sensor Networks

      2014, 23(3):162-166,82. CSTR:

      Abstract (1319) HTML (0) PDF 1.23 M (2950) Comment (0) Favorites

      Abstract:Underwater sensor network (UWSN) adopts acoustic communication, characterized by high delay, low bandwidth, high error rate etc., resulting in communication protocols designed for radio channels are unsuitable for underwater acoustic channels, which brings significant challenges to the protocol design for UWSN. So, we propose a distributed probability-based CDMA code dynamic assignment protocol for underwater sensor networks which can avoid conflict between the spread codes with high probability. This algorithm does not require accurate time synchronization and can adapt to the dynamic topology of underwater sensor networks. The algorithm can be used for both the transmitter oriented and receiver oriented code assignment. Simulation indicates that our proposed algorithm performs better than the traditional code assignment algorithm due to highlight the personalization of each node, further reducing the risk of interference.

    • Buffer Algorithm for Solid State Disk Based on the Cluster of Write Pages

      2014, 23(3):167-171. CSTR:

      Abstract (1368) HTML (0) PDF 996.07 K (2924) Comment (0) Favorites

      Abstract:For the inherent characteristics of flash memory such as erase before write, the I/O overhead of reading and writing unbalance, and so on, studying the buffer management of flash memory has important theoretical significance and application value to improve access performance of Flash-based SSD (Solid State Disk, SSD). Analyzing of the key technologies of SSD and the existing buffer management algorithm, it has implemented a buffer algorithm used for SSD, which is based on the cluster of writing pages. The key technology and the principle of the algorithm has been described in detail, and the writing of SSD buffer management is implemented on basis of Flashsim platform. Compared the performances of traditional buffer algorithm and the new algorithm, it indicates that the buffer algorithm based on the cluster of write page can reduce the random write times and the data dispersion of SSD and improve the average response rate of SSD.

    • Mixed Programming Between VC and MATLAB Used in Pressure Vessel Weld Defect Detection

      2014, 23(3):172-175. CSTR:

      Abstract (1963) HTML (0) PDF 686.26 K (3047) Comment (0) Favorites

      Abstract:For the problem of pressure vessel weld defect detection, this paper use VC++ and MATLAB mixed programming method for defect detection. This paper mainly describes the steps and advantages of VC++ and MATLAB mixed programming that use of MCC compiler in MATLAB and used for the pressure vessel welds image processing and quality assessment software development. Users can get an intuitive processing and evaluation results through just a simple menu operation. This method was superior to the effects of separate using VC programming and give full play to the VC++ and MATLAB respective advantages. The results show that, VC and MATLAB mixed programming can reduce the programming effort and improve software development efficiency.

    • Real-Time Query Client on Mobile Platform in Intelligent Transportation System

      2014, 23(3):176-180. CSTR:

      Abstract (1491) HTML (0) PDF 965.69 K (3859) Comment (0) Favorites

      Abstract:With the popularization of smart phones and high-speed mobile networks, intelligent public transport query system which is as a public information platform in the city can greatly facilitate people's daily travel. Transport query clients on the Android platform divided into two kinds, one is query static information, such as the transfer scheme, line information, etc. another is the bus real-time queries. In this paper, based on the traditional methods, we design and realize a movable platform for bus querying in real-time, which introduces local database and HTTP connections double query and obtains data by parsing the JSON data. On the basis of the query site and line information, the client can show real-time information of the close-in car on the activity, making the user understanding of the current public transportation system clearly and adjusting travel plan adaptively. Therefore, this project has a great realistic significanc.

    • High Dynamic Carrier Tracking Method Based on UKF

      2014, 23(3):181-185,87. CSTR:

      Abstract (1459) HTML (0) PDF 1.30 M (3603) Comment (0) Favorites

      Abstract:Under high dynamic situation, the typical GPS carrier tracking loop can not guarantee a reliable tracking. In this paper an improved high dynamic carrier tracking method based on unscented Kalman filter is presented, a rapid frequency traction method is adopted to ensure that the filter can convergence quickly, and joining a carrier amplitude estimation method. The U.S Jet Propulsion Laboratory high dynamic carrier model is used to test the loop tracking performance, the test results show that the method can not only pull-in and lock the carrier signal quickly in a high dynamic environment, but under the the jerk of up to 100g/s which also have a continous and precise tracking performance.

    • Design and Implementation of Strategy in Report Management System

      2014, 23(3):186-189. CSTR:

      Abstract (1404) HTML (0) PDF 703.10 K (2574) Comment (0) Favorites

      Abstract:In the project of "Comprehensive Demonstration of Water Environment Management about LiaoHe River Basin", there are many heterogeneous databases in business systems, like Oracle, SqlServer, MySql, and so on. A generic service oriented reporting system, must be able to extract data from the heterogeneous database, processing data and generate reports. Therefore, combined with the actual needs of report management system, we build a strategy to complete data extraction, data processing in report management system. This paper firstly introduces the basic principle of the structure of the report management system, and then introduces the strategy overall structure, basic function and Realization way.

    • Realization of Storage Blade in ATCA Multimedia Resource Server

      2014, 23(3):190-194. CSTR:

      Abstract (1542) HTML (0) PDF 854.55 K (3230) Comment (0) Favorites

      Abstract:Multimedia Resource Server is a main entity of IMS, and file storage is a key function of Multimedia Resource Server. This paper introduces the technical realization of ATCA storage blade as storage resource in Multimedia Resource Server. The scheme can be also used as a general design to replace RAID in product based on ATCA, for increasing integration level.

    • Multi-Channel Strap-Down Inertial Navigation of Data Acquisition System

      2014, 23(3):195-198. CSTR:

      Abstract (1521) HTML (0) PDF 815.56 K (3052) Comment (0) Favorites

      Abstract:As an important component of the inertial navigation, inertial device is usually composed of gyroscopes and accelerometers. To complete the evaluation of its performance, it is needed to develop a specialized data acquisition system. The traditional set of data collection is becoming more and more difficult to meet the test needs due to the huge volume, technology updated difficulties, and poor reliability. With the rapid development of FPGA technology, the IMU data acquisition system is smaller and more simple. Through the XC3S1000-4FT256I chip of XILINX, the gyroscope, accelerometer IMU output pulse signal of pulse signal and a temperature sensor signal input directly to FPGA for processing, the pulse data collection, through the practical application in the two axis turntable. By comparing a large amount of test data and analysis, we found that the stability of the IMU data increased nearly 1 sigma, compared with the traditional method.

    • High Precision Data Acquisition System for Weak Signal

      2014, 23(3):199-202. CSTR:

      Abstract (1504) HTML (0) PDF 847.40 K (3514) Comment (0) Favorites

      Abstract:According to the weak characteristic of the output signal of accelerometer, we design a high precision data acquisition system based on TMS320F28335, CPLD and AD7760. The output signal of accelerometer after signal conditioning circuit go into 24 bit precision AD7760 to complete analog to digital conversion, DSP TMS320F28335 as the main controller control CPLD to read and write AD7760, DSP also send the collected data to the PC via the serial port. This paper introduces the design of system hardware in detail, including the signal conditioning circuit and the interface circuit between ADC、CPLD and DSP. This paper also introduces the software design of the system. The results of experiment show that, the data acquisition system designed can compete the task of acquiring weak signal.

    • Research on Dynamic Gray Forecast for Mine Inflow and Drainage Energy Control

      2014, 23(3):203-207. CSTR:

      Abstract (1869) HTML (0) PDF 1.15 M (2616) Comment (0) Favorites

      Abstract:Great financial losses and safety loophole will be caused by water gushing accident in coal mine. The vast original water inflow data come from one FuXin coal mine is used to establish dynamic the gray G(1,1) model for water inflow forecast with gray system theory and method. Its characteristics are simple structure, less calculated amount and good adaptability. The Siemens S7-300 series PLC and configuration software are used to finish high efficiency and energy saving integrated automation control in underground drainage system. It is safe and reliable and can be used to increase production efficiency, save energy and reduce cost. Log monitor and auto run are realized. The results show that the model can precisely predict water inflow with good reliability and instantaneity.

    • PTS Based Synchronization Display Technology of Video Stream in Cluster

      2014, 23(3):208-211. CSTR:

      Abstract (1432) HTML (0) PDF 796.81 K (3032) Comment (0) Favorites

      Abstract:A PTS Based synchroniztion display technology of video stream is presented to solve asynchronous display problem of node computer in cluster. Features of cluster tiled display system is analysed. Video stream synchronous mechanism based on PTS information is researched, and the implementation of modules, such as multicast receiving, stream unpacking, video decoding, synchronization control, are discussed. The experimental results show that PTS based synchronization display technology of video stream in cluster is effective.

    • Campus Data Center Security Policy in Cloud Environment

      2014, 23(3):212-215,152. CSTR:

      Abstract (2360) HTML (0) PDF 1.90 M (3148) Comment (0) Favorites

      Abstract:In the campus network security strategy, the traditional data center consider the counted traffic safety as the only factor, but virtualized data center security model in cloud computing environment is changed from 2 d to 3 d, this paper puts forward four kinds of safety strategy and design the campus data center safety and equipment deployment in the cloud environment, in order to improve the campus data center security.

    • Automatic Payment System in Canteen Based on Dishes Feature

      2014, 23(3):216-219. CSTR:

      Abstract (1439) HTML (0) PDF 807.13 K (4008) Comment (0) Favorites

      Abstract:This paper presents a design of automatic payment system in canteen based on dish feature. The design is based on dishes feature and image recognition technology to achieve the function of automatic payment. Combined with staff cards or student cards, it can achieve self-payment function. Therefore, the process from selecting dishes to pay for the dishes can be done by computer without people assistance.

    • Home Sleep Apnea Syndrome Observation System Based on Neural Network

      2014, 23(3):220-223,131. CSTR:

      Abstract (1336) HTML (0) PDF 1.22 M (3198) Comment (0) Favorites

      Abstract:This paper introduces a new SAS monitoring system. The system utilizes a self-designed app invoked by mobile phones to collect the data of users' snore. Then it transmits the data via home wireless network by means of ftp and finally stores the data in a PC. Moreover, the neural net algorithm and voice-recognition technology have been inserted into core algorithm of the system to identify voice and snore, which can implement the diagnosis of the SAS by combining the analyses of symptoms. The system has a higher disease classification rate than a traditional SAS monitoring system.

    • Wireless Sensor Network Security Monitoring System Based on Wi-Fi and GPRS

      2014, 23(3):224-227. CSTR:

      Abstract (2411) HTML (0) PDF 853.23 K (3322) Comment (0) Favorites

      Abstract:A sensor network is a network that has capabilities like data collection, wireless positioning, remote controling and device management with the help of combining sensor technologies, embeded systems and communication network. By integrating multiple wireless networks including ZigBee, Wi-Fi and GPRS, we build a heterogeneous wireless sensor network to perform data collecting, positioning and controling and exceptional event alarming for wireless network and mobile communication network. The system is able to collect data in the wireless sensor endpoint and exchange and share data among different heterogeneous network devices by using the wireless network gateway with capabilities of data receiving and redirecting, which can be used to perform wireless positioning, SMS alarming and upper machine software monitoring.

    • Design of Ethernet Switching Signal Monitoring Terminal Based on μC/OS-Ⅲ

      2014, 23(3):228-231. CSTR:

      Abstract (1359) HTML (0) PDF 1.81 M (2875) Comment (0) Favorites

      Abstract:In the modern industrial control systems, due to the needs of distribution and intelligent of system, industrial Ethernet is widely used. Transmission, control and transform of information are usually based on the form of switching signals. This paper presents a design of Ethernet switching signal monitoring terminal. The terminal software is based on embedded operating system μC/OS-Ⅲ and embedded TCP/IP protocol stack μIP, the function of network address and port configuration is embedded in the software. The terminal hardware is based on ARM core MCU LPC2106, with a photo-coupling method used for the isolation of the switch signal. This developed terminal with the advantages of universal, reliable and expandable characteristics can be connected to Ethernet for configuration and switching signal monitoring flexibly, and it has the significant potential for use in the various applications such as industrial control and smart home.

    • Extension of Simple Multicast Forwarding in MANET

      2014, 23(3):232-236,211. CSTR:

      Abstract (1520) HTML (0) PDF 1.23 M (3105) Comment (0) Favorites

      Abstract:Simple multicast forwarding protocol in the absence of the recipient, the multicast source will be flooded throughout the network, this will lead to unnecessary duplication of data. In order to avoid MANET this problem, the authors propose protocols for multicast forwarding simply an extended method, which based on limited flooding scope and reach all the multicast receivers unicast, multicast source list calculated for each recipient a mix value. With this mix is the standard way with limited options flooding the best combination of unicast to minimize network overhead caused by flooding.

    • Based on Multiple Minimum Supports of Association Rules in Data Mining

      2014, 23(3):237-239,219. CSTR:

      Abstract (1452) HTML (0) PDF 1.01 M (3944) Comment (0) Favorites

      Abstract:This paper analyzed the limitation of the single minimum support degree of association rule mining. We put forward the model of association rule mining based on multiple minimum support. Our work focus on the multiple minimum support MS -Apriori algorithm the basic idea and points out the advantages and disadvantages of the algorithm with practical examples. Our work found that the method of frequent itemsets, and finally points out the shortage of the algorithm and improved algorithm.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063