• Volume 23,Issue 8,2014 Table of Contents
    Select All
    Display Type: |
    • Network Information Currency Technology Based on Web Semantic Extraction Method

      2014, 23(8):1-9.

      Abstract (2129) HTML (0) PDF 965.98 K (4060) Comment (0) Favorites

      Abstract:With the arrival of the big data era, the currency evaluation of network information has become a spot for today's research. This paper will take Web news as the object of study and study the technology of Web information extraction and Chinese word segmentation in big data environment. On the basis of the above, this paper proposes an algorithm of network information currency evaluation based on Web semantic extraction method. The experimental results fully reflect the validity of the algorithm implementation. The study of technology plays a very important role in leading network users pay attention to more valuable Web information and helping Web site managers build a higher currency network.

    • Cloud GIS and its Key Techniques

      2014, 23(8):10-17.

      Abstract (2694) HTML (0) PDF 1.04 M (3766) Comment (0) Favorites

      Abstract:The combination of GIS and clouding computing provides an extensive development prospect for GIS information storage, management, processing and application. The definition of cloud computing and cloud GIS are presented, four application mode and a multi-level architecture model of cloud GIS are proposed. The key techniques, such as virtual technology, distributed data storage technology (Google File System), virtual data management technology (BigTable), parallel spatial analysis technology, data and functional interoperability technology as well as deployment model are mainly studied. Finally, an actual application framework of cloud GIS is given.

    • Research of Collaborative Filtering Recommendation Algorithm on Douban Network Data

      2014, 23(8):18-24.

      Abstract (1798) HTML (0) PDF 850.33 K (4068) Comment (0) Favorites

      Abstract:This paper improved the collaborative filtering recommendation algorithm by considering the nearest neighbor and directed similarity in Douban network data. Then, the improved algorithms were used to recommend books, movies and music for Douban users. The recommended results are carefully compared and analyzed in terms of three well-know indicators including accuracy, diversity and novelty. It is shown that the nearest neighbor algorithm has much lower computational complexity and the directed similarity algorithm obtains higher accuracy, while all these three algorithms have similar diversity and novelty of the recommended results, by comparing with the traditional collaborative filtering recommendation algorithm.

    • Application of Type Test Report Automatically Check Based on Business Rule Engine

      2014, 23(8):25-30.

      Abstract (1676) HTML (0) PDF 1.01 M (2680) Comment (0) Favorites

      Abstract:Business rule engine is the hot research topic recently, through the detailed description of the type test report check process. In this paper, we study the application of type test report automatically check based on business rule engine. We also analysis the main business processes and business rules engine for type describe the relationship between design and test data reporting database, using the type test reports' HS code, validity and other major business rules, and detailed description of the implementation of key rules. Through the application of type test report automatically check, business rules engine greatly improves the efficiency and accuracy.

    • Design and Implementation of the Mobile Phone Animation Spatial Layout Planning

      2014, 23(8):31-38.

      Abstract (1667) HTML (0) PDF 1.08 M (2735) Comment (0) Favorites

      Abstract:The phone 3D animation automatically generating system is to achieve the goal that the user sent the information to the server. After a serial process of information extracting, plot planning and scenario planning, the system would finally generated and sent a video animation which is related to the information contents to the receiver. Here, animation scenes planning module plans the various details of the plot basing on the plot qualitative and quantified into a three-dimensional animation scene file. Basing on animated plot planning, this paper mainly studies the spatial layout of the three-dimensional scene, make a layout of the three-dimensional available scene space according to semantic information of the object, design and achieve a three-dimensional scene layout repository, and ultimately achieve a reasonable placement of three dimensional objects. Experiment results show that this system could not only ensure unobstructed placed objects but also allows the same object to be added more, which makes the objects more diversity and reflects the semantic information of an object.

    • Country Cultivated Land Quality Early-Warning System Based on WebGIS

      2014, 23(8):39-46.

      Abstract (1661) HTML (0) PDF 901.29 K (3176) Comment (0) Favorites

      Abstract:For preventing farmland degenerating and increasing food production, this research used some theories and practices of early-warning both in home and overseas for reference. This paper collects and processes datum, designes technical flow and system structure, builds index system, chooses the early-warning models, and implements system function. Finally, the cultivated land quality early-warning system was proposed based on WebGIS. Using Feidong as an example, cultivated land capability class was established and cultivated land fertility was predicted.

    • Framework to Enterprise Cloud Service Architecture Design

      2014, 23(8):47-52.

      Abstract (1771) HTML (0) PDF 1.90 M (3419) Comment (0) Favorites

      Abstract:The application of cloud computing technology and the enterprise private cloud solutions are neither simply virtualization nor traditional hosting cloud service. Therefore, considering service viewpoint models of DoDAF V2.0 as the main view models, an enterprise cloud services architecture design framework was proposed based on SOA (Service Oriented Architecture) in order to enhance the information resources reusability, agility and faster time to the changing requirements of enterprise IT service systems. In the paper, the enterprise cloud service architecture design standard and enterprise cloud computing application context was established by research on the constraint relationship among service viewpoint models in DoDAF V2.0 and the analysis of mix cloud computing pattern to Service Oriented Architecture. Finally, a cloud application solution based on loose coupling SOA was presented to support the enterprise cloud service architecture design and the cloud computing application technique implementation.

    • Wireless Sensor Networks for Temperature and Humidity Acquisition System Based on TinyOS

      2014, 23(8):53-58.

      Abstract (1635) HTML (0) PDF 811.75 K (3082) Comment (0) Favorites

      Abstract:Wireless sensor networks have widely application prospects in smart home system. Temperature and humidity are two important parameters of indoor environment, which affect the comfort of the room. In this paper, a temperature and humidity data acquisition system using wireless sensor networks based on TinyOS is presented. Wireless node module and sensor module are designed and TinyOS operating mechanism and development steps are analyzed. Underlying hardware drivers based on TinyOS and upper computer system are developed, forming a multi-hop network. Experimental studies show that this system is running well, and the expected design requirements are achieved.

    • Unified Certification Center of Universities Based on OAUTH2.0

      2014, 23(8):59-62.

      Abstract (1950) HTML (0) PDF 672.60 K (3271) Comment (0) Favorites

      Abstract:This paper puts forward one kind of design principles and implementation of unified certification center of universities. This implementation allows users to achieve a unified login authentication across multiple subsystems and can maintain the consistency of the authentication data. Meanwhile, due to the use of advanced and widely adopted OAUTH2.0 protocol, not only the system specifications and safety certification of university subsystems is guaranteed, but also external open platform account can access authentication.

    • Seismic Data Interpretation System

      2014, 23(8):63-67.

      Abstract (1728) HTML (0) PDF 891.86 K (3181) Comment (0) Favorites

      Abstract:Seismic data interpretation system is one of the important tools of oil exploration research. By analyzing the seismic data interpretation business requirement and technology trends, in case of conventional seismic data interpretation system defects, the solution for deploying a large-scale seismic data system based on distribution and concentration integration work mode is proposed. It has been widely used in land and marine seismic data interpretation projects, which shows the system can meet the growing oil exploration business requirement well.

    • Multi-cascade Motor Control System Based on CoOS and CAN Bus

      2014, 23(8):68-72.

      Abstract (1581) HTML (0) PDF 807.17 K (3531) Comment (0) Favorites

      Abstract:In the paper, a high real-time, high-precision multi-motor control system based on micro operating system and CAN bus is introduced. The system is proposed based on NXP LPC11C14 micro-processors. The transplanting CoOS operating system allows the execution of the program in order to run the task, which effectively solves the multi-motor synchronous coordination problems. By forwarding commands by CAN bus, the problem of cascading multiple controllers work is solved. It also expands the control range. The VS2008 MFC PC control software design allows to achieve the control of a graphical display. The application results show that the system is stable and reliable, real-time, it also has some practical and promotional value.

    • Cross Platform Single Sign-on System

      2014, 23(8):73-78.

      Abstract (1975) HTML (0) PDF 902.48 K (3111) Comment (0) Favorites

      Abstract:The typical single sign-on technologies are based on Kerberos protocol. There are vulnerabilities in the ticket's lift-time solution. And most of the single sign-on technologies are applied to Web-based application systems. According to these, a new mode of authentication is proposed. And a single sign-on system is designed and implemented. The system uses PKI as security infrastructure, uses a technique called regular check-in to solve the limitation of tickets and authentication information. The client agents of the sign-on and identity authentication use Hook API and BHO. The results show that the system can overcome the shortcoming of the lifetime, without requiring the existing infrastructure support development interface, and with advantages such as flexible deployment and expansion.

    • Implementation of Teaching Simulation Demo System of Electrical Control Circuit Using FLASH AS3

      2014, 23(8):79-83.

      Abstract (1619) HTML (0) PDF 735.06 K (2905) Comment (0) Favorites

      Abstract:The application of virtual simulation experiment can improve the effect of theory and practice integrated teaching, improve students' learning intrest, and avoid various unfavorable factors of hardware experiment effectively, to achieve the goal of reducing teaching cost and promoting teaching reform. A new idea of circuit simulation software developmt based on FLASH software's object-oriented development is proposed in this paper from the viewpoint of practical applications, an overall architecture scheme of software realization and the whole function modules' realization method are given also. The practice results indicate that, the development thinking is feasible, the teaching application of coresponding software have a good effect. The software can be used in the simulation testing of electrical engineering design, and also has a strong ability of sustainable research and system upgrade.

    • Vehicle Attitude Sensing System Based on MEMS

      2014, 23(8):84-89.

      Abstract (2190) HTML (0) PDF 933.40 K (4399) Comment (0) Favorites

      Abstract:In view of the MEMS sensors' low precision and large errors, three-axis accelerometer, three-axis magnetometer and three-axis gyroscope are combined to measure attitude. And Kalman filter are used for multi-sensor data fusion. The gyroscope's attitude quaternion calculated by rotation vector becomes a predictive vector of Kalman filter. The accelerometer and magnetometer's attitude quaternion calculated by Gauss-Newton method becomes a observation vector of Kalman filter. Kalman propagation equation is established to obtain more accurate attitude quaternion to calculate the attitude angle and correspond the attitude angle in AHRS with the vehicle' attitude angle. Experimental results show that the changed attitude angle of the vehicle coincides with the different states of the vehicle state.

    • Drowsiness Determining Algorithm Based on Eye Features

      2014, 23(8):90-96.

      Abstract (1721) HTML (0) PDF 901.94 K (5937) Comment (0) Favorites

      Abstract:PERCLOS value has been used widely in drowsiness detection because of its accuracy and non-contact nature, but in practice, only one PERCLOS criterion is commonly used. In this paper, a method is proposed using continuous eye closure time and PERCLOS value simultaneously for determining the drowsiness degree. Firstly, the algorithm uses Haar-like classifier and Adaboost algorithm for face detection and localization. Then the searching area of the human eyes is narrowed based on human facial structure characteristics. Then the human eyes are positioned using Adaboost algorithm, which can avoid the influence of the eyebrows. Finally image processing methods including image morphology are used to get the vertical height of the human eye, i.e., the distance between the upper and lower eyelids, which can indicate whether the eyes are closing or not. In drowsiness prediction phase, different PERCLOS criteria are used in different time slot. With 10 frames/s testing video speed, the accuracy of the algorithm can reach 86.14%. The method presented in this paper can meet the real-time requirements and improve the accuracy of driver drowsiness degree predictions.

    • An Improved Method Based on LEACH Protocol for Wireless Sensor Network

      2014, 23(8):97-100.

      Abstract (1541) HTML (0) PDF 694.40 K (2880) Comment (0) Favorites

      Abstract:LEACH is a classical hierarchical routing protocols. However, the algorithm is adaptive cluster head randomly generated. It does not consider the current node residual energy, so the choice of cluster head will make the network energy consumption which is not balanced, resulting in network premature death. In order to avoid less energy because elected as cluster head node after the premature death, we propose a new routing protocol(LEACH-PHQ). The improved algorithm in the cluster head selection phase took into account the residual energy of each node in the data transfer phase using data fusion transmission strategy. Experimental results show that the improved method is effective to reduce the energy consumption of the network and the network load balance, which can extend the network lifetime.

    • Real-Time Adaptive Traffic Signal Countdown Display Control Method

      2014, 23(8):101-104.

      Abstract (2098) HTML (0) PDF 718.85 K (2773) Comment (0) Favorites

      Abstract:Aiming at the present city's growing traffic jams, the traditional method of traffic control is inflexible and difficulty to adapt because of the current traffic demand. This paper presents a real-time adaptive traffic signal countdown display control method, which can be throughout the countdown, no transitions, timing and consistent focus on an actual time. According to real-time traffic conditions for each phase adjustment target phase green countdown time, this method not only allows people to learn the real countdown time, but also effectively relieves traffic congestion, with good practicality.

    • Research and Application of Fuzzy Least Square Support Vector Machine Regression

      2014, 23(8):105-108.

      Abstract (2083) HTML (0) PDF 743.70 K (3114) Comment (0) Favorites

      Abstract:The traditional SVM is more sensitive to the noise and isolated points in training sample, and have lower modeling accuracy. In this paper, fuzzy set theory is introduced to least squares support vector regression, and then to establish a data domain description fuzzy least squares support vector machine regression. This method will sample mapped into a high dimensional space, and search a minimum enclosing sphere in high dimensional space. Meanwhile, according to the distance from sample to the center of the sphere, the size of fuzzy membership can be determined. A simulation experiment is provided to demonstrate that this algorithm can improve the accuracy of support vector machine regression. This model is applied to predict the concentration of glutamic acid bacteria fermentation process. Results we obtain in simulation show the effectiveness of the proposed approach.

    • Correction of Fisheye Image in Laser Target Shooting Training System

      2014, 23(8):109-113.

      Abstract (1635) HTML (0) PDF 906.86 K (2723) Comment (0) Favorites

      Abstract:A fisheye image correction method for laser target shooting training system is discussed in the paper. Because each ring in target image has the same width, the mapping relationship of the undistorted distance and the distance between optical center of lens and each point in the image is approximated by least square method. Fisheye image correction and scoring method are implemented when center of blank is located at optical center. In case of none overlapping, center of blank and optical center are connected with a straight line. The distance between optical center and intersection points of the straight line and each ring are measured, and the mapping relationship is approximated. Experimental results show that the proposed method provides satisfactory accuracy for shooting scores.

    • Road Network Extraction Method from Remote Sensing Images Based on Saliency

      2014, 23(8):114-118.

      Abstract (1683) HTML (0) PDF 1.40 M (2919) Comment (0) Favorites

      Abstract:In the remote sensing images, roads are considered to be the long and narrow linear target which is similar in color, texture and shape. Based on these features, the entire road network in the image will show a very significant feature, which can easily excite the attention of the human, which can be called the region of interest. The region of interest(ROI) in the scene can cause the most interesting of users, which reflects the main content of the image area, visual cognitive theory study shows that the visual attention mechanism can simulate the observation processing of the human eye to identify the salient region of remote sensing images. This paper proposes the idea of using visual attention mechanisms to assist road network extraction by analysising and processing the salient region and get the final road network. Comparative experiments show that the algorithm can effectively improve the accuracy and integrity of the road network extraction.

    • Learning Partners Recommendation Algorithm Based on Thematic Study

      2014, 23(8):119-124.

      Abstract (1647) HTML (0) PDF 887.89 K (2857) Comment (0) Favorites

      Abstract:Learning partners are important resources in opening virtual studying community. The tutors who come from the learning partners can help the general learner out of learning disabilities, and improve their ability of communication each other. After constructing a Knowledge Database based on ontology, we record the learner characters about interest, grade of cognize, degree of enthusiasm. According to these factors, we bring forward a learning partner recommendation algorithm using Thematic Study. The result of experiment indicates that the algorithm can make different partner grade on the foundation of the learner's study experience. These grade can reflect the reality situation. It is significant for opening virtual studying community to improve its personalization and intellectualization, consequently to advance study efficiency.

    • Meteorological Data Compression Algorithm Based on Time-Series Segmentation

      2014, 23(8):125-129.

      Abstract (1959) HTML (0) PDF 904.18 K (3196) Comment (0) Favorites

      Abstract:It is not only inefficient to use the raw time series of meteorological parameter such as temperature refractive index structure parameter, wind speed and temperature to make short-term prediction, query similarity and classify and cluster time series, but also affects accuracy and reliability of data mining of time series. This article proposes a simple and fast method which based on the election of extrema point and tendency turning point to make the piecewise linear representation of time series. The method can extract the main pattern of series effectively, and reduce the dependency of threshold. It has the characteristic of small cost of computing, efficient and convenient and strong commonality. Then based on that, the experiments on temperature refractive index structure parameter and other kinds of meteorological parameter are implemented and conduct the comparison analysis between the method and another kind of sequence segmentation algorithm. The result shows that the method proposed is capable of reflecting the pattern of time series effectively and accurately.

    • B-Spline Curve Fitting Silhouette Based on Freeman Chain Code

      2014, 23(8):130-134.

      Abstract (1922) HTML (0) PDF 928.85 K (2766) Comment (0) Favorites

      Abstract:This paper presents a contour fitting algorithm which combine Freeman chain code and error control of B-spline curves. Firstly, it uses Freeman chain code boundary tracking method, based on the difference between adjacent pixels variation of chain code, eliminate false feature point, the vast majority of the extracted contour feature points, and then combined with error control based B-spline curve method, to obtain feature points which can accurate represent contour information. This method of avoiding the use of strike curvature characteristic points for complex calculations to improve the feature point detection speed, and the extracted contour to precisely fit the local support points, error control based on the realization of the profile curve fitting. Experimental results show that the algorithm is correct.

    • Maze Algorithm in Sokoban Game of Touch-Screen Edition

      2014, 23(8):135-138.

      Abstract (1430) HTML (0) PDF 1.83 M (3507) Comment (0) Favorites

      Abstract:In the Sokoban game of touch-screen edition which runs on the mobile platform such as Android, the computing of the game protagonist's walking path under touch operation belongs to maze algorithms. A path searching maze algorithm based on the right-hand rule, footprint marking and shortcut optimizing is proposed. It is implemented through three steps, including walking straight, searching along the wall and optimizing path. After verification of application in the actual project, it shows that the algorithm has good effectiveness and efficiency to meet the real-time requirements of the game operations.

    • Maximum Entropy Fuzzy C-Means Clustering Based on Sample Weighting and Initial Cluster Centers

      2014, 23(8):139-143.

      Abstract (1357) HTML (0) PDF 1.35 M (3181) Comment (0) Favorites

      Abstract:This paper aims to demonstrate the traditional maximum entropy fuzzy C-means clustering algorithm (MEFCM) applies to spherical or oval-shaped clusters only. In order to solve the confusion and highly relevant data distribution division of this difficult situation, it introduces Mercer kernel function, so that the original features which do not show can stand out and make the clustering effect better. However, in practical, the majority of sample sets are exist importance (weighting) of different phenomena. The main focus are the samples of different importance to design of each data weighting and in order to overcome the sensitivity of weakness of the initial cluster centers. This paper presents an optimization of the initial cluster centers weighted kernel maximum entropy fuzzy clustering algorithm (WKMEFCM). Experiments show that compared with the MEFCM, the clustering result is more stable, accurate and the clusters division effect is better.

    • Extraction Method for Non-contact Finger Phalangeal Prints

      2014, 23(8):144-149.

      Abstract (1198) HTML (0) PDF 1.17 M (2871) Comment (0) Favorites

      Abstract:Finger phalangeal prints become one of the authentication methods due to its uniqueness. Existing literatures are mainly based on the principle of wavelet multi-resolution analysis to extract the finger phalangeal prints distribution information. But the paper presents a detection method for the relationship between the relative positions of finger phalangeal prints. For self-built gallery of thumb outwardly open, four fingers closed hand images, the first step is to find out the fingertips and finger valley points by using the Step edge detection pretreatment methods. Then the whole image is rotated to a horizontal position in order to compare the relative positions of finger phalangeal prints. Finally, we can find out the horizontal coordinate position of finger phalangeal prints in four fingers except the thumb by using the Roof edge detection method. In order to verify the proposed method, the use of self-built small natural gallery display test results showed that the extraction rate is up to 98.035%, indicating that the method is feasible and effective.

    • Algorithm of License Extraction Based on HSV Clor Space and SVM

      2014, 23(8):150-153.

      Abstract (1546) HTML (0) PDF 821.76 K (4167) Comment (0) Favorites

      Abstract:In order to overcome the drawbacks from the disturbance such as the color area similar to the vehicle plate, a new method of license plate extraction based on HSV and SVM is presented in this paper, which can locate and extract some kinds of plate perfectly. Firstly it caculates the coarse positioning of the blue and yellow plates based on the edge characteristics and HSV color space to get Several candidate regions. Then a pre-trained SVM is used to classify character and non character. Finally the plate was precisely located and extracted through the characteristics of the plate. Experimental results show that the proposed method has a good performance.

    • GrabCut Image Segmentation Based on Wavelet Transsform

      2014, 23(8):154-157.

      Abstract (1431) HTML (0) PDF 900.59 K (3126) Comment (0) Favorites

      Abstract:GrabCut is an algorithm based on the energy optimization algorithm. It uses color and texture features to extract the target from the background image. However, the processing speed of this method is slower than we expect. In order to accelerate the image segmentation, this paper presents a GrabCut image segmentation method based on wavelet transform. The proposed method compress the original image based on wavelet transform to reduce the image resolution and applies the GrabCut algorithm on it. Then identify the initial value of the original image with the convergent target area, and the algorithm applies the last GrabCut iteration on original image. Experimental results show that the algorithm improves the extraction rate of the target image, and keeps the basic characteristics of the target image unchanged.

    • Implementation of Dynamic Identity Authentication System Based on MAC Address

      2014, 23(8):158-162.

      Abstract (1899) HTML (0) PDF 860.71 K (2764) Comment (0) Favorites

      Abstract:With the development of Internet technology, the traditional static password based on authentication solutions is no longer an adequate protection scheme to serious enterprise applications. In this article, the principle of dynamic password technology is described and the pros and cons of implementing dynamic password technology by software and hardware are analyzed as well. A dynamic password authentication protocol based on MAC Address of client is designed. According to this protocol, the system architecture, authentication processes and safety measures are described and its security is analyzed as well. The analysis indicates that this system features high security and wide application. It can be conveniently used and implemented in low cost.

    • Microblog Hot Topics Discovery Method Based on Probabilistic Topic Model

      2014, 23(8):163-167.

      Abstract (1479) HTML (0) PDF 787.55 K (3622) Comment (0) Favorites

      Abstract:Microblog has the characteristic of short length, complex structure and words deformation. Therefore, traditional vector space model (VSM) and latent semantic analysis (LSA) are not suitable for modeling them. In this paper, a two stage clustering algorithm based on probabilistic latent semantic analysis (pLSA) and Kmeans clustering (Kmeans) is proposed. Besides, this paper also presents the definition of popularity and mechanism of sorting the topics. Experiments show that our method can effectively cluster topics and be applied to microblog hot topic detection.

    • Distributed Algorithm for Energy-Balance Minimum 2-Connected 2-Dominating Set

      2014, 23(8):168-172.

      Abstract (1260) HTML (0) PDF 781.91 K (3002) Comment (0) Favorites

      Abstract:In wireless sensor networks (WSN), connected dominating set (CDS) is constructed to form the virtual backbone for hierarchical routing. Existing algorithms usually only consider how to obtain a smaller dominating sets, which ignore the instability of network itself and result to the node failure or link failure. Combining the node degrees and power factor, this paper proposes a Distributed Algorithm for Energy-Balance Minimum 2-Connected 2-Dominating Set (DA-EBM) based on the tolerance of the connected dominating set. By the simulation results of Omnet, the fault-tolerant connected dominating set constructed DA-EBM balanced energy consuming of network effectively and extend the network life cycle compared with existing algorithms.

    • Weighted Iterative Node Matching Algorithm and Its Application in Language Networks

      2014, 23(8):173-177.

      Abstract (1452) HTML (0) PDF 754.71 K (3039) Comment (0) Favorites

      Abstract:Node matching between complex networks has practical significance in many areas. However, most of the traditional node matching algorithms which based on the local topological information may lose their efficiencies in many realistic networks, especially in the network with high topological symmetry. In order to overcome this shortage, recently, we proposed a new method to calculate the similarity between two nodes of different networks by utilizing both topological and link-weight information, based on which we designed a weighted iterative node matching algorithm. We test this new algorithm on pairwise artificial networks of high topological symmetry and a pair of real Chinese-English language networks. The results show that the weighted iterative node matching algorithm behaves better than the pure topology based iterative node matching algorithm on this kind of networks.

    • High Accuracy in Visualization of Tetrahedral Volume Data Based on an Adaptive Octree

      2014, 23(8):178-183.

      Abstract (1551) HTML (0) PDF 853.66 K (3282) Comment (0) Favorites

      Abstract:Converting a tetrahedral volumetric data into regular volumetric data by an octree can improve the interactivity of the system effectively. When the depth of the octree is higher, the rendering results will be better. However, memory consumption and processing time will also increase. This paper proposes an adaptive regularization reformulation algorighm to construct the octree, improving the original single sampling strategy, combining with the depth information to transfer the sampling results into an octree texture which allows for random access in GPU. Then we use ray casting algorighm to render the regular volumetric data. Because of varying characteristics of the regional depth, the sampling algorithm responds with different step-size strategy. The experimental results show that this method reduces the memory consumption and processing time of the data, and at the same time improves the rendering quality as well as the rendering efficiency.

    • Query Optimization of Database Based on Gauss Mutation Quantum Behaved Particle Swarm of Optimization Algorithm

      2014, 23(8):184-188.

      Abstract (1389) HTML (0) PDF 948.12 K (3468) Comment (0) Favorites

      Abstract:In order to solve the defect of quantum particle swarm algorithm, mutation operator of the genetic algorithm is introduced into quantum particle swarm optimization algorithm. It produces a novel query optimization method of database(GM-QPSO). Firstly, the mathematic model is established for database query optimization problems. And then the optimal scheme of database query optimization problems is found by the sharing message of quantum particle. Finally, the simulation experiments is carried out on Matlab 2012. The results show that the proposed algorithm has solved the defect of quantum particle swarm algorithm, and improved query speed of database and can obtain better query scheme.

    • Bayesian Networks Classifier Using Approximation

      2014, 23(8):189-193.

      Abstract (1325) HTML (0) PDF 771.29 K (2819) Comment (0) Favorites

      Abstract:Bayesian networks are widely used in many fields. As a classifier, it is an effective classification method. Bayesian network classifier is one of the most challenging problems, which makes the Bayesian network classifier subject to many limitations in the application. Through the pairs of Bayesian network classifier algorithms' approximate treatment, it can effectively reduce the amount of calculation, and get satisfactory classification accuracy. This paper analyzes a way to change discriminative score function to generative score function by approximation method. This way is applied in Bayesian network classification algorithm. Finally, this paper uses the stability of new algorithm, proposes a new classifier through integration called Bagging-aCLL. It uses ensemble to improve the accuracy rate of the algorithm. The experiment test shows the classification accuracy rate of the algorithm have a good performance.

    • Hybrid Fuzzy Clustering Method Based on the Modified Artificial ImmUne Theory

      2014, 23(8):194-197.

      Abstract (1388) HTML (0) PDF 760.67 K (2749) Comment (0) Favorites

      Abstract:The fuzzy clustering algorithm is sensitive to the initial center and is easily convergence to local optimum. Inspired by the clone selection principle and memory mechanism of the vertebrate immune system, a new hybrid clustering method based on the modified artificial immune theory is presented. It not only adaptively determined the amount and the center's positions of clustering, but also avoided the local optima and the flaw about sensitive to the initialization. Also, the K-means algorithm is used as a search operator in order to improve the convergence speed. Experimental results indicate the validity and convergence of the proposed algorithm.

    • Image Retrieval Base on Dyadic Wavelet Transform and Local Binary Pattern

      2014, 23(8):198-202.

      Abstract (1394) HTML (0) PDF 898.22 K (2609) Comment (0) Favorites

      Abstract:Texture is an image feature which reflects the pixel spatial distribution property and has become important means in image analysis. In the field of image retrieval, due to the directional wavelet transformation, local characteristics and multi-scale features can make the texture feature of image get better representation. Local binary pattern is an effective tools for extract texture characteristics of images and have rotation invariance and gray scale invariance. This paper uses Bubble wavelet which has good performance to do the image dyadic wavelet transformation. Four sub-band images are got. The low frequency sub-band contains maximum art-work informations. The diagonal directional graph contains minimum informations. The other two graphs contain informations between the max and the min. Hence, low frequency, vertical and horizontal high frequency image are to be selected first. Then, by means of the uniform local binary pattern, the three texture components of image are extracted, and the image retrieval proceeded. The experimental results show that the algorithm not only effectively combines the advantages of wavelet and local binary pattern, and also has better retrieval performance.

    • Digging Principle of Asynchronous Messaging Mechanism and Analysis of Applying Field

      2014, 23(8):203-207.

      Abstract (1339) HTML (0) PDF 701.30 K (2519) Comment (0) Favorites

      Abstract:Messaging mechanism is a basic attribute of OO system & OO language. Asynchronous messaging mechanism using middleware is widely spread among heterogeneous and distributive network environment. Combined with GUI framework, a powerful study of multi-procedure asynchronous messaging mechanism was made. Then this paper explored the principle and realized the core callback technology without any framework or developing language. At last it fully analyzed the field of asynchronous messaging application, pointed out that even in single host inner-communication, asynchronous messaging can improve performance better and help to solve some basic and special questions.

    • Scheme forTransition from Mobile Packet Network to IPv6

      2014, 23(8):208-212.

      Abstract (1372) HTML (0) PDF 830.87 K (2849) Comment (0) Favorites

      Abstract:With the development of cloud computing, Internet of things, LTE and other emerging business and technology, the IPv4 address shortage problem is becoming increasingly prominent. This paper is based on the demand of address in the process of mobile packet domain to IPv6, and a construction scheme to solve the problem of address shortage is proposed. Coupled with the surrounding network situations, the demand of rebuilding some neighboring network elements is put forward accordingly. Before the widespread usage of IPv6, this paper provides an effective way to solve the conflict problem between the rapid development of telecom service and the lack of IPv4 addresses.

    • Intelligent Torque Transmitting Module Based on ADuC7061

      2014, 23(8):213-217.

      Abstract (1390) HTML (0) PDF 887.67 K (2841) Comment (0) Favorites

      Abstract:An intelligent torque transmitting module based on ADuC7061 chip which own the ARM kernel was designed, which is aiming at solving the series of problems existed in the current torque module, such as low accuracy, poor universality, single function etc. This paper presented circuit and characteristics of the major components of the module. This module not only can realize range automatic switching and zero automatic calibration, but also can communicate via RS-485. In the working process of the module, each sampling period of the input analog signal could be independently modulated and converted by the ADuC7061 chip. The measured data by least-squares method determines the compensated sampled value for the torque cycle. The paper also gave the test specific data and correction effect diagram. Design of the whole system was concise, performance stability, only use such ADuC7061 a chip can complete the above a variety of functions, greatly reduce the cost.

    • Design of Digital Acquisition System Based on CAN-BUS

      2014, 23(8):218-221.

      Abstract (1594) HTML (0) PDF 841.84 K (2626) Comment (0) Favorites

      Abstract:The CAN-BUS is a kind of field BUS which have been widely applied at home and abroad. This paper describea a digital acquisition system based on CAN-BUS. The hardware includes an MCU (STC90C52RC) as the core, combining with CAN controller SJF1000 and CAN transceiver PCA82C251 t. The main program of the software circularly scans for collecting, processing and sending digital signal to the control PC. The design has been put into practical application in industry and it works well.

    • Personalization Access Authentication Mechanism Based on 802.1X/EAP-PEAP

      2014, 23(8):222-227.

      Abstract (2293) HTML (0) PDF 957.87 K (5164) Comment (0) Favorites

      Abstract:This paper studied a convenient and efficient network situations personalized access authentication mechanisms. It uses the tripartite framework of requester, authenticator and authentication server based on IEEE802.1X standards. It analyzes the EAP protocol, compares the EAP-MD5, EAP-TLS, EAP-SIM, EAP-PEAP and chooses the EAP-PEAP authentication method. Then it gives the detailed design of the authentication process with system and user personalization.

    • Gesture Tracking and Recognization Based on Motion Sensing Technology

      2014, 23(8):228-232.

      Abstract (2142) HTML (0) PDF 859.18 K (4639) Comment (0) Favorites

      Abstract:Motion Sensing Technology makes people interact with computer more directly and reduces the constraints of mouse and keyboard. This paper studies the key technology of Motion Sensing Technology and Kalman filtering algorithm deeply. At the same time it presents a gesture recognization algorithm based on skeleton coordinates. At last this paper expounds the design and implementation of Gesture Tracking and Recognization System based on Kinect.

    • Real-Time Programming Application Development Technology Clouda

      2014, 23(8):233-236.

      Abstract (2315) HTML (0) PDF 723.13 K (2477) Comment (0) Favorites

      Abstract:When developing native applications on mobile terminal, developers are faced the data fragmentation, terminal fragmentation and user surge problems. A new open source technology framework--Clouda is emerged. This paper briefly describes Node.js, highlights Clouda, and analyzes its five major technical advantages. This work compares Clouda with similar frameworks, and sets up a development environment, develops RSS reader by Clouda. At last, the future direction of Clouda is analyzed.

    • Embedded Web Server in Meteorological Environment Monitoring System

      2014, 23(8):237-241.

      Abstract (1422) HTML (0) PDF 719.67 K (2915) Comment (0) Favorites

      Abstract:In order to improve the response speed and efficiency of meteorological environment monitoring system, and meet the requirements of getting meteorological information in real time and accuratly for the monitoring center, an embedded web server based on GoAhead and Ajax (asynchronous JavaScript and XML) is designed. In this system, environmental data is dynamicly updated by using CGI(Common Gateway Interface). The system has the advantages of simple operation, stable running, rapid respondence and long distance monitoring, which is helpful for management to know the temperature, humidity, wind direction and other information of the observation posts.

    • Six-Helix Structure of Cloud Computing Platform for Collaborative Innovation

      2014, 23(8):242-246.

      Abstract (2142) HTML (0) PDF 889.66 K (3036) Comment (0) Favorites

      Abstract:For better, faster collaborative innovation of "production, learning and research", this paper proposed a method, six-helix structure of cloud computing platform for collaborative innovation based on cloud computing, triple helix and collaborative innovation. It has designed five collaborative architecture and some functional modules. This platform can not only integrate various technological resources, human resources, service resources, but also can make "political, corporate, school, research and gold" to get the latest information, demand and supply in Autonomous, interactive environment, and cross-sectoral collaboration, interdisciplinary collaboration, collaborative innovation finally. For solid research exchanges, promote universities, research institutes and research achievements in industry, accelerate the construction and upgrading of technology of SMEs is important.

    • Design of the Auto’s Radiator Based on Artificial Immune System Optimization

      2014, 23(8):247-251.

      Abstract (1765) HTML (0) PDF 826.49 K (2309) Comment (0) Favorites

      Abstract:When the car radiator is designed by axiomatic design, the existence of the coupling function is widespreaded. Scholars put forward using artificial immune system to solve the coupled function sets. Based on the shortcomings of these algorithms in measuring antibody, this article puts forward the new measures: coupling function centralize degree, and gives the appropriate formula. At the same time, the gene optimization method is introduced to antibody generation algorithm. Thr experiments of auto engine oil radiator in Yinlun CO., LTD show that the new algorithm has higher efficiency.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063