• Volume 24,Issue 3,2015 Table of Contents
    Select All
    Display Type: |
    • Decentralization Strategy Applied in Building Institutional Repository System

      2015, 24(3):1-8. CSTR:

      Abstract (1721) HTML (0) PDF 753.52 K (2437) Comment (0) Favorites

      Abstract:The center strategy of building institutional repository is difficult to meet the diverse and personalized needs of knowledge applications. It is proposed to build institutional repository based on decentralization strategy. Its system structure and working process are designed, a summary of its key technologies are elaborated. Some solutions to such critical issues are introduced and practice has proved that the decentralization strategy is feasible to build institutional repository

    • Automatic Checking and Calculation of Data Frequencies in Stream Languages

      2015, 24(3):9-17. CSTR:

      Abstract (1970) HTML (0) PDF 982.07 K (2645) Comment (0) Favorites

      Abstract:Data stream analysis and manipulation is very common in computer systems. Practical systems usually consist of data streams of different frequencies, however, dealing with data streams with different frequencies in existing programming languages has to be done explicitly and manually in programs. This paper proposes FStream–a framework for programming data streams with different frequencies, which supports automatic calculation. FStream is designed based on functional languages and dependent type systems. We also show an encoding of a discrete-time Simulink model in FStream.

    • Five Stage Pipeline CPU Based on FPGA

      2015, 24(3):18-23. CSTR:

      Abstract (1904) HTML (0) PDF 1.00 M (4057) Comment (0) Favorites

      Abstract:A five stage pipeline CPU was designed and implemented on FPGA. Referring to MIPS machine and analyzing the process of each instruction, the process was divided into five stages which are IF, ID, EXE, MEM, and WB. The design of system-level structure was placed in the first position in order to determine the architecture and the instruction set. The next work was decomposing the integrated architecture and determining the signal connection between the module and the module. The CPU was implemented with VHDL. Finally, the five stage CPU was debugged by debugging software which is called Debug-controller. The result shows that the pipeline CPU is effective.

    • Improvment of the Maximo System Performance by Using Load Balancing

      2015, 24(3):24-30. CSTR:

      Abstract (1548) HTML (0) PDF 760.40 K (2701) Comment (0) Favorites

      Abstract:After many years of informatization construction, Tianjin Branch has formed the equipment management information system with Maximo system as the core. With application system continually being evolved, custom procedures, business data and system loading increases dramatically, which leads to lower performance of the system. When access to Maximo System, the users will come across problems such as: slow access speed, non-normal exit, no responses for the new request. All of these problems will affect the normal use of the system. In order to improve the performance of the Maximo system and meet the increasing demand of the users, we conduct customized configurations depending on the application of Maximo system. Using the combination of load balancing technology and hardware cluster for the first time can greatly enhance the business management ability of Maximo system.

    • Multitoning Technology Application in the Electric Paper Books Display Optimization

      2015, 24(3):31-37. CSTR:

      Abstract (1626) HTML (0) PDF 900.86 K (4120) Comment (0) Favorites

      Abstract:In order to solve the problem that electric paper books have insufficient gray-scales, the improvement algorithm of halftone image processing technology is proposed to realize electric paper books display optimization. On the basis of halftone technology and characteristics of electronic paper, this paper introduces the dithering algorithm and error diffusion algorithm. By improving this two algorithms, the electric paper books can display more gray-scales and have better visual effect. The research is focused on threshold, filter and specific scanning mode of the error diffusion algorithm. A new improved algorithm based on dynamic error detection is put forward in the paper which can effectively improve image gray-scales and greatly improve the image display quality of the electric paper books. Finally, the simulation in the electric paper books system platform is realized and the algorithms mentioned are evaluated by objective image quality assessment.

    • Product Virtual Exhibition System for Scene Optimization on Web Environment

      2015, 24(3):38-43. CSTR:

      Abstract (2064) HTML (0) PDF 1013.36 K (2752) Comment (0) Favorites

      Abstract:Because of the slow network transmission speed and the large amount of data of the virtual exhibition system scene file on web environment, exhibition scene takes a long time to load for the first time, and it has standstill and models flashing during scene roaming. To solve these problems, this paper proposed new methods, which are Gradually Optimize Two Level of Detail and model-mapping transition display optimization technology. GOTLOD technology loads the scene file by splitting scenes and asynchronously, it uses low accuracy of the model show to build scene quickly, and it uses stadia and dynamic to switch different precision of the model. Model-mapping transition display optimization technology uses the difference size of Stadia to switch between models and textures. Experimental results shows that the initial load time reduces 71% and FPS of scene roaming value increase 3.9 times by using the GOTLOD and model-mapping transition display optimization technology. The optimization technology reduces the scene loading time effectively, and solves the high-fidelity runtime scene roaming fluency problems.

    • MemLoop: A Programming Framework Using In-Memory Cache for Iterative Application

      2015, 24(3):44-49. CSTR:

      Abstract (1616) HTML (0) PDF 999.39 K (2552) Comment (0) Favorites

      Abstract:The iterative computation is an important big data analysis application. While implementing iterative computation on the distributed computation framework MapReduce, the iterative program will be divided into more than one jobs which run in the order defined by the dependencies between jobs, which lead to many interactions between the program and distributed file system(DFS) that will affect the program's execution time. Caching these interaction-related data will reduce the time of interactions between the program and DFS and hence improve the overall performance of application. Considering that large amount of memory in cluster nodes is unused at most time, this paper proposes a programming framework called MemLoop using memory cache for iterative application. This system sufficiently uses the free memory in the cluster's nodes to cache data by implementing the memory caching management from three models: job submit API, task scheduling algorithm, cache management. The cached data is classified into two categories: inter-iteration resident data and intra-iteration dependent data. We compare this framework with previous related framework. The result shows that MemLoop can improve the performance of iterative program.

    • Track of Social Network Marketing

      2015, 24(3):50-56. CSTR:

      Abstract (1606) HTML (0) PDF 1.73 M (2679) Comment (0) Favorites

      Abstract:The study on social network marketing effect tracing is still in the infancy. To meet the need of social network marketing effect, a platform is designed for social network information collection and data processing. The platform uses crawler technology to obtain information. Although the speed of information collection is limited, the platform can acquire as much information as possible. The spread diagram for social network marketing tracking will be obtained by building a forwarding tree algorithm. Experiment results show that the platform can automatically acquire and process the data, and then draw an information dissemination graph. The information dissemination graph is used to find the tipping point and comment information in the information dissemination, that is, the important relationship nodes and feedback information in relationship marketing. The platform can also obtain other related statistics information of interactive users to facilitate the tracking of social network marketing effect.

    • Discrimination of False Fire Reporting Based on Internet of Things and Complex Event Processing

      2015, 24(3):57-62. CSTR:

      Abstract (1590) HTML (0) PDF 1.91 M (2824) Comment (0) Favorites

      Abstract:To solve the problems of false fire reporting caused by inefficient management or insufficient maintenance of firefighting facilities, research on internet-based real time fire monitoring and on-line data analysis is presented. The concept of Complex Event Processing is introduced into a remote firefighting security monitoring system. In the system, an event processing language, together with its engine (Esper), is used to illustrate the events of false fire reporting. As a result, the entire process including data stream processing from IOT, events and rules modeling, and on-line discrimination of false fire reporting, are demonstrated in the system.

    • Thermal Power Unit Coal Consumption Analysis System Based on GB10184-88

      2015, 24(3):63-68. CSTR:

      Abstract (1619) HTML (0) PDF 1.52 M (5145) Comment (0) Favorites

      Abstract:The main purpose of the software development is to solve the problems of practical computation and interfaces. It mainly introduces how to compile computing general program in the environment of Visual C++6.0. Adopt MFC program interface design and use ADO to connect SQL database. Meanwhile, take GB 300MW condensing unit thermoelectric generators unit integrated coal consumption computational analysis as an example, The system has several major functions such as parameter setting, comprehensive performance calculation, single parameter impact analysis, heat deviation analysis, data query and so on. The Visualization of user interface has been implemented, the precision of calculation has been improved, and the computational effort has been greatly reduced. At the same time, it provides technical support for the power plants unit in respect of safe and efficient operation and improvement of energy efficiency.

    • Flu Epidemic Visualization System Based on Twitter

      2015, 24(3):69-74. CSTR:

      Abstract (1713) HTML (0) PDF 646.23 K (3213) Comment (0) Favorites

      Abstract:This work introduces the booming development of social media and associated applications on various domains, demonstrates advantages and feasibility of applications on flu epidemic detection on the basis of Twitter data. Specifically, this paper puts emphasis on describing the detailed design and concrete implementation of corresponding visualization system. Finally, it discusses the significance and potential applications of the system.

    • Design of Energy Efficiency Analysis System for Offshore Oil Platform

      2015, 24(3):75-80. CSTR:

      Abstract (1488) HTML (0) PDF 1.02 M (2611) Comment (0) Favorites

      Abstract:To stop a gap in the aspect of monitoring and analysis of energy efficiency in China's offshore oil industry, this paper designs a comprehensive analysis software system that used in offshore oil platform to analyze the energy efficiency status of energy consumption equipment. The system based on C++ DL, breaks the drawbacks of tradition analysis method which is single, extensively, subjectively and others. It implements the energy efficiency monitoring, energy efficiency analyzing and energy efficiency assessment for energy consumption equipment. The software has a friendly interface. It can display the parameters of temperature, pressure, flow and power from acquisition terminal real-time. Moreover, it can draw the energy efficiency curve and generate reports according to the parameters. At present, this system has been put use in one offshore oil platform which in Bohai sea area, and taken one important step for China to build energy-efficient energy companies.

    • New Generation Meteorological Communication Transmission Monitoring System Based on Android

      2015, 24(3):81-85. CSTR:

      Abstract (1632) HTML (0) PDF 964.56 K (2480) Comment (0) Favorites

      Abstract:Against currently meteorological observation data transfer between cities and counties, provincial, national meteorological department, this paper designed and developed the monitoring system of meteorological communication which can run on android mobile. The data used in the system based on the collection and transmission statistics for new generation national meteorological communication system. The result proves the system can well meet the needs of using mobile monitor the data transceiver in the daily work and provide an effective way of monitoring for meteorological data on the mobile devices.

    • Automatic Prescription Mixing System Based on Total Components of Non-Decocted Chinese Medicine

      2015, 24(3):86-91. CSTR:

      Abstract (1879) HTML (0) PDF 966.57 K (3336) Comment (0) Favorites

      Abstract:To solve the traditional pharmacy health care high pressure, low efficiency and other issues, an automated prescription mixing system based on boil-free granule of Traditional Chinese Medicine of total components is designed and implemented with modular design. It obtains from prescription get, prescription analysis to prescription process automatically. This paper proposes a general method for medicine depot organizations, studies different scheduling algorithms of bottle using and compares their effects to mixing efficiency. Practice shows that the system is easy to operate and human-friendly, and has high accuracy, efficiency, and practical value.

    • SMDA-Based Approach to Enterprise Systems Customization

      2015, 24(3):92-97. CSTR:

      Abstract (1550) HTML (0) PDF 720.32 K (2605) Comment (0) Favorites

      Abstract:To meet the challenges from less standardized and highly varied business processes in small-to-medium enterprises, limitations of current software customization approaches are pointed out. Based on traditional software customization techniques and methodologies, such as service-oriented architecture and model-driven architecture, the Service Model Driven Architecture (SMDA) is proposed with the concept of service model and service template. A framework of SMDA-based software customization is presented, and the processes to abstract service models and build service templates are discussed in details. An example is finally presented to demonstrate the effectiveness and practicability of the approach by quickly reconfiguring the service templates to generate enterprise systems.

    • Campus Streetlight Control System Based on Zigbee and GPRS

      2015, 24(3):98-104. CSTR:

      Abstract (1593) HTML (0) PDF 1.02 M (2814) Comment (0) Favorites

      Abstract:With the continuous development of social economy, the university campus constructions develop more intelligent, energy-saving and green. Campus streetlight control system as public communal facilities in campus constructions connects with the degree of the campus modernization construction. This paper proposes a reasonable and effective campus streetlight remote control system which combines Zigbee and GPRS. According to the actual situation of streetlight control, this system uses a chain network topology. It realizes the software control of Zigbee and GPRS through the system software design. Finally, interface design programmed by language of VB accomplishes the system long-range control. This system is simple and energy-efficient. It is available to popularize, containing a certain practical importance and significance.

    • New Microcomputer Relay Protection Platform Based on MPC8309

      2015, 24(3):105-109. CSTR:

      Abstract (1595) HTML (0) PDF 795.93 K (2702) Comment (0) Favorites

      Abstract:To improve the performance of relay protection devices, a new microcomputer relay protection platform is designed. In this platform, MPC8309 based on PowerPc architecture is the core controller of the protection unit and the communication unit which are designed respectively, and a sampling board is designed independently. Boards are interconnected with high speed ethernet interface and LVDS. The software system based on Nucleus embedded real- time operating system is designed hierarchically and modularized. Combined with a specific application case, the hardware and software design of the platform are described in detail, with the key points in the process of design and the underlying configuration. The platform with perfect function and good stability can satisfy the performance requirements for protective devices. The relay protection platform is suitable for relay protection measurement and control device of power equipment of all kinds of voltage grade, and has been successfully applied to high voltage line protection devices.

    • WANO Human Error Research Platform

      2015, 24(3):110-114. CSTR:

      Abstract (1980) HTML (0) PDF 691.06 K (2617) Comment (0) Favorites

      Abstract:In view of the inefficient and chaos of traditional WANO human error research work, the study based on actual demand of the WANO human error research work and object-oriented technology. It designed and implemented a WANO human error research platform. The article from the perspective of the WANO human error research platform construction elaborated platform realize related technical key points, such as platform framework, WANO human error database construction etc, and introduced the application effect of data ETL on WANO human error research platform.

    • Safe Operation System in Substation Job Based on the Internet of Things

      2015, 24(3):115-119. CSTR:

      Abstract (1988) HTML (0) PDF 974.73 K (2485) Comment (0) Favorites

      Abstract:To strengthen the standardization of substation inspection and safety supervision, this paper designs the substation safe operating system based on internet of things technology. This paper mainly presents the on-site acquisition system scheme. It introduces the equipment selection, installation notes, localization algorithm and detailed implementation programs. In the work area the system locates the position of staff and tracks the patrol route. It is more efficient to detect and manage the behavior as straying into the restricted area and dropping inspection, etc.

    • RF Automatic Testing System Based on VEE

      2015, 24(3):120-123. CSTR:

      Abstract (1894) HTML (0) PDF 825.46 K (3335) Comment (0) Favorites

      Abstract:The RF automatic testing technology is studied and realized based on the platform of VEE virtual instrument technology. This technology resolves the problems, such as too many testing projects, long testing time, and complicates operating. The design conception of the RF testing system is discussed by hardware platform architecture and VEE software data transmission. The working processing and concrete opetaing methods is also disserted in detail. The realization of automatic testing system provides enforcement safeguard for the working efficiency of the RF equipments on improving debugging, examine and maintaining.

    • Improved Bacterial Foraging Optimization Algorithm Based on Levy Flight

      2015, 24(3):124-132. CSTR:

      Abstract (1286) HTML (0) PDF 972.81 K (2896) Comment (0) Favorites

      Abstract:The classical bacterial foraging optimization algorithm suffers from low solution accuracy and poor convergence performance due to the fixed Chemotaxis step-size. To handle these problems, an improved bacterial foraging optimization algorithm based on Levy flight is put forward. The proposed algorithm uses Levy distribution based Chemotaxis step-size for the improvement of both solution accuracy and convergence performance, and random walk strategy of Levy Flight for the improvement of bacterial migration position. Experimental results on several benchmark test functions show that the proposed algorithm achieves noticeable improvement in terms of solution quality and convergence performance in comparison with existing bacterial foraging optimization algorithms.

    • Connection Oriented Transfer Protocol in the Wireless Narrow-Band Channel

      2015, 24(3):133-138. CSTR:

      Abstract (1695) HTML (0) PDF 774.45 K (2448) Comment (0) Favorites

      Abstract:Connection-oriented transmission protocol in the wireless narrowband broadcast channel is a kind of data link layer protocol for constituting a network in the wireless narrowband broadcast channel. In the way of how to design a communication protocol, the design of wireless data network transmission protocol frame structure, the design of initialization process, the design of data transmission process and the mechanism of the time slot dynamic management are introduced. From a practical effect, since the time-division multiplexing transmission mode, the mechanism of the time slot dynamic management and the connection-oriented service are used in the protocol. The problem of the low data communication efficiency in the wireless narrowband broadcast channel is solved. Additionally, the reliable IP data transmission is transparently provided based on the TCP/IP architecture.

    • Revision Control Branch Merging Algorithm Based on AST

      2015, 24(3):139-146. CSTR:

      Abstract (1539) HTML (0) PDF 885.12 K (3965) Comment (0) Favorites

      Abstract:Software Development, where developers work together parallelly is the standard develop mode actually, needs the revision control tool to assistance the development widely. Most of the tools today could merge the code changes from different branches edited by different developers. These tools are based on code text differ comparation line by line, and the merged code isn't always the prediction of the developers. This paper presents a new branch merging algorithm which intends to provide a better result. We build an abstract syntax tree of the code block where the traditional merge gives a code confliction. Then we merge this code block of different revisions automately based on AST nodes comparative analysis. In this way, the code conflictions and manual work in branch merging could be reduced. At the same time, the development efficiency would be improved.

    • Grey Prediction Model of the Gas Emission Based on Wavelet Analysis

      2015, 24(3):147-150. CSTR:

      Abstract (1162) HTML (0) PDF 753.50 K (1860) Comment (0) Favorites

      Abstract:The predict of the gas emission is of great significance in the coal mine safety, decompose and refactoring the original data by wavelet analysis, and speed up by AFT, the data refactored predict by GM(1,1). We compare the results between wavelet - grey and GM(1,1). The results show that the prediction accuracy of the former is higher than the latter.

    • Internet of Things Intelligent Terminal Adapter Middleware Development Pattern

      2015, 24(3):151-155. CSTR:

      Abstract (1699) HTML (0) PDF 1.02 M (2650) Comment (0) Favorites

      Abstract:According to the different types of operating systems and other reasons, the most intelligent terminal applications and services development need to be customized. It leads to a long development cycle, high cost, increased the repetitive labor and resources waste problem. In this paper, the authors introduce the research and development of internet of things application adapter middleware, which can be suitable for various intelligent terminal with different data sources. This paper research the system architecture and technical architecture of the middleware. The middleware uses the object-oriented thought, applying the MVC (Model View Control), Adapter, Singleton, and other design patterns. The intelligent terminal middleware can improve the application ability of different field of Internet of things as well as expand the access channel in the field of Internet of things.

    • Access Component Based on RBAC

      2015, 24(3):156-160. CSTR:

      Abstract (1429) HTML (0) PDF 731.83 K (2482) Comment (0) Favorites

      Abstract:In this paper, based on the characteristics of information system and the need for access control, a set of permissions control component is designed and implementated using RBAC model on the platform of .Net framework. Furthermore, with the introduction of the authority commission, hierarchical authorization and UBAC features, the RBAC model is expanded in the design process, and is applied to the component of multiple EIS system development process. Finally, the results show that the component can be integrated quite well in information system. It reduces the complexity of the development, and improves the efficiency of permissions management work.

    • Method of Kernel Transplantation and its Protection

      2015, 24(3):161-165. CSTR:

      Abstract (1769) HTML (0) PDF 747.57 K (2066) Comment (0) Favorites

      Abstract:The work of kernel transplantation has practical application value and the configuration more complex tasks. So this paper comes up with a new method of kernel updates on the basis of the kernel itself characteristics. Most of the existing kernel transplantation methods need to complete with the module init-tools, mkinitrd, lvm2 and device mapper and other tools, external tools are abandoned in this paper. It is to achieve the new kernel updates and its strategy is on the basis of the kernel protection characteristics. First of all, for kernel configuration, we analyze the necessary module configuration. Then it uses the command interface to the kernel of modularization compile and grub analysis. Again, in view of the robustness requirements for the kernel, the kernel is realized with the MD5 algorithm which can improve the mechanism of protection. Finally experimental research show that the kernel transplantation method is convenient and practical, and the improved protection mechanism of the kernel has important application value.

    • Research on College Students to Buy Mobile Phones by Analytic Hierarchy Process

      2015, 24(3):166-170. CSTR:

      Abstract (1738) HTML (0) PDF 771.92 K (4040) Comment (0) Favorites

      Abstract:Smartphone life provides great convenience for people, it is very common essentials, it is a symbol of fashion, and also a symbol of identity. Therefore, reasonably choosing and buying a smartphone is very necessary for college students. In this paper, we use the analytic hierarchy process (ahp) to buy smartphones college students conducted in-depth research. It establishes the hierarchical model, from the performance, price, appearance of mobile phones, according to the level 9 scaling analysis of mobile factors in detail. The root method computing for a variety of factors is used. It sorts and selects the optimal solution, in preparation for college students to provide some references to buy mobile phones.

    • Abandoned Objects Detection Algorithm Based on Frame Difference and Edge Difference

      2015, 24(3):171-175. CSTR:

      Abstract (2048) HTML (0) PDF 1.05 M (2771) Comment (0) Favorites

      Abstract:Abandoned objects detection is the core function of the intelligent video surveillance system. Abandoned objects are generally small and in the complex environment, the traditional moving target detection algorithms usually cannot well detect abandoned objects directly. This paper proposes an abandoned objects detection algorithm based on frame difference and edge difference. Firstly, the algorithm gets the moving target area by frame difference calculation. Then, it gets the edge of the moving target by edge difference calculation between the current frame image and the previous frame background image. It merges this two difference calculation result to get the complete moving target edge features. Finally, if the residence time of this moving target in the scene meets or exceeds the threshold set by the alarm system, this paper marks this target as an abandoned object and the intelligent video surveillance system will process this result. The experiment results show that the proposed algorithms has high realtime performance and recognition rate.

    • Label Propagation Community Detection Algorithm Based on Modularity Density Optimization

      2015, 24(3):176-182. CSTR:

      Abstract (1390) HTML (0) PDF 812.13 K (3194) Comment (0) Favorites

      Abstract:The simplicity and efficiency of the community detection algorithm based on label propagation (LPA) have been studied extensively, but when the community structure is not clear, a single community is obtained through the LPA, which is meaningless. Modularity-specialized label propagation algorithm (LPAm) tends to partition the network into communities with similar degrees and the problems of solving the limit of functions exist. Therefore, this paper points out label propagation algorithm based on modularity density optimization (LPAd), in order to avoid the formation of large communities, and the community meets the weak community definition proposed by Radicchi et al. Several real datasets and artificial network data experimental results show that, this algorithm raises the quality of the detected community without changing the algorithm complexity, and compared with the existing number of community detection algorithm based on label propagation, it has been improved effectively.

    • Improved Apriori-Based Algorithm Application to the Electric Power Business System Function Optimization

      2015, 24(3):183-187. CSTR:

      Abstract (1595) HTML (0) PDF 707.62 K (2293) Comment (0) Favorites

      Abstract:This paper proposes an algorithm for electric power business system function optimization. Firstly we extract log data from the Web server and the client user. Then, we preprocess the user log dataset, and convert transaction dataset into a sequence data. Finally, we use the improved Apriori-based algorithm to find tight coupling function modules, and make optimization combination between the functions to improve the working efficiency of the business. Experiments show that the method is effective in revealing the coupling of the business function module.

    • Harmonics Detection and Analysis Based on Kalman Filter

      2015, 24(3):188-192. CSTR:

      Abstract (1639) HTML (0) PDF 771.94 K (3284) Comment (0) Favorites

      Abstract:To solve the increasingly harmonic problem which is serious and complex, this paper presented a harmonic detection method based on Kalman filter. In this paper, the Kalman filter estimation theory was discussed, and the numerical model based on Kalman filter analysis was established. Combined with the performance of the simulation platform of Matlab, it discussed the performance of the algorithm for detecting the steady harmonic and transient harmonic signal. The comparative study shows that this algorithm is superior in accuracy, rapidity, transient harmonic analysis to the Fast Fourier Transform algorithm (FFT). The simulation and experiment results show that the algorithm is quite practical in complex electric power quality analysis.

    • English Real-Word Errors Checking Algorithm Based on Preposition Vector

      2015, 24(3):193-196. CSTR:

      Abstract (1484) HTML (0) PDF 682.70 K (2532) Comment (0) Favorites

      Abstract:This paper introduces the method of collocation of confusion words and prepositions based on Winnow algorithm. Firstly, we obtain training sets by confusion sets. After preprocessing the training sets, we use the text feature extracted method to obtain feature sets. Secondly, we get the feature sets with weights by training on the feature sets based on Winnow and extract the prepositions which appear after the confusion words to generate the preposition vectors. Finally, we extract features from the test sets and the test sets and get the real-word errors checking results by the test which combines Winnow algorithm and the method of collocation of confusion words and prepositions. The correct rate, recall rate and F1 measure of some confusion words are improved by 10% ~ 20% when we join the method of collocation of confusion words and prepositions, some even up to 100%.

    • Fabric Meridian Offset Detection Method Based on Machine Vision

      2015, 24(3):197-201. CSTR:

      Abstract (1271) HTML (0) PDF 890.86 K (2027) Comment (0) Favorites

      Abstract:To deal with the problems like artificial steak untwisting, the low work efficiency and labor intensity in printing and dyeing industry in our country, meridian skew detection method based on machine vision is proposed. It greatly improves the efficiency of untwisting and precision. By using a CCD camera to obtain images of the fabric, the system uses the obtained images for Blob analysis. The analysis of the main process includes the extraction of image, image segmentation(the initial segmentation, morphology processing, etc.), and feature extraction. Experiments show that the method can detect the warp of skew, and has very high precision, can be used for vertical untwisting of machine.

    • Optimization and Realization of Storage Structure and Traversal Algorithm of BOM

      2015, 24(3):202-206. CSTR:

      Abstract (1627) HTML (0) PDF 747.51 K (3960) Comment (0) Favorites

      Abstract:The advantages and disadvantages of the polytypic BOM storage structure are analyzed. It also gives out a practical storage structure model of BOM. Two basic algorithms of traversal of BOM are summarized, which are recursive algorithm and hierarchical traversal algorithm. Based on the two basic algorithms of traversal of BOM, the generation strategy of product structure tree and the summary strategy of product parts needed are proposed. And the BOM of elevator components is realized for a specific example. The result shows that it is helpful for reducing the storage redundancy of database, system overhead and the complexity of product traversal algorithm by using reasonable storage structure and optimized BOM traversal algorithm.

    • Data Dimensionality Reduction Method Oriented to Software Defect Data Clustering Analysis

      2015, 24(3):207-213. CSTR:

      Abstract (1337) HTML (0) PDF 1001.74 K (2421) Comment (0) Favorites

      Abstract:Clustering analysis oriented to software defect data is dividing different software defect data to different clusters according to some criterion. The result of clustering is that defect data in the same cluster is similar while defect data in different clusters is different. It is significant to find the distribution law of software defect make testing scheme and optimize testing process. Due to that the clustering results of K-Means is dependent on distribution of samples, a data dimensionality reduction method based on PSO is proposed. Simulation experiment shows that the clustering accuracy and quality are improved to some extent.

    • Sketch Style Three-Dimensional Model Line Rendering

      2015, 24(3):214-219. CSTR:

      Abstract (1346) HTML (0) PDF 807.26 K (2599) Comment (0) Favorites

      Abstract:Current 3D model based line rendering methods produce drawings with a large number of small lines is due to the grid structure of the underlying model, resulting in many obvious corners and isolated segments in the drawings. In this paper, we propose a new sketch style 3-dimensional model line rendering method that transforms an observed 3D model into a drawing with simple and natural lines. Firstly, the method uses Suggestive Contours to get characteristic lines of the model. Then, these small lines are connected into a few long lines by analyzing their spatial information. Finally, cubic B-spline curves are utilized to interpolate the resultant lines with some simplification processing using B-spline wavelets. The rendering results show that the proposed method can connect characteristic lines well and get smooth and simple sketch style drawings.

    • Improved Graph-Based Algorithm for the University Examination Timetabling Problem

      2015, 24(3):220-225. CSTR:

      Abstract (1266) HTML (0) PDF 701.34 K (2327) Comment (0) Favorites

      Abstract:A graph-based algorithm is developed in this paper to slove the university examination timetabling problem, by transforming the classical graph model and improving the greedy algorithm. The improved algorithm can be used to meet more complicated constrain conditions in the real university credit envioronment, such as cross-major, trans-grade, minor-study and so on. The algorithm aims to slove the soft-constrain objects, which are achived by manual optimizing in the most tradition researches and cases. Firstly, the algorithm is discussed to transfer the classical graph coloring model into a clique cover problem of a weighted undirected graph. Then the greedy algorithm is impoved by the deep-first strategy, to search the solutions which satisfies both the hard-constrains and soft-constrains. The improved algorithm is proved to be better than the greedy algorithm for the solution is more reasonable, and better than the manual work for the time consumed is less. The improved algorithm can enhance the efficiency of the university timetabling, which is helpful to the academic management of our university in recent years.

    • Ga-Svm Based Feature Selection and Parameters Optimization in Intelligent Medical Systems

      2015, 24(3):226-230. CSTR:

      Abstract (1813) HTML (0) PDF 834.32 K (2662) Comment (0) Favorites

      Abstract:Medical registration is the most basic unit of the medical profession. Generally patients don't understand the condition of their illness. So choosing the wrong department is completely common. Intelligent medical system solves this problem very well. Intelligent medical system makes use of the massive medical record texts which the medical department accumulates to train and carry on machine learning, and to analyze the characteristics of the registration patient's medical record and to classify to the right disease. The patient is recommended to the appropriate department according to getting the department to be registered. The influence on the efficiency and accuracy of the traditional support vector machine (SVM) text classification of the intelligent medical system is the feature extraction and kernel function parameters optimization. Therefore, the method of the Genetic Algorithm (GA) combining with SVM is proposed. The text feature values and kernel function parameters together is viewed as a chromosome of the genetic algorithm that is an individual to carry on the binary encoding. The optimal individual is obtained by the genetic manipulation of the selection, crossover and mutation. Finally, text classification is operated by support vector machine using the optimal features and optimal parameters. The test result shows that this model improves the accuracy of intelligent diagnosis and is a good intelligent diagnosis registration algorithm.

    • Heuristic Algorithm for 3D Packing Problem of the Sheet Metal

      2015, 24(3):231-234. CSTR:

      Abstract (1504) HTML (0) PDF 764.81 K (3235) Comment (0) Favorites

      Abstract:Focus on the problems of square metal sheet encasement, this paper proposes a heuristic algorithm which imitates the hominine packing process. This algorithm is able to realize tiered encasement of a wooden box, starting from the bottom layer to upper ones. And in each layer, it can intelligently fill the unevenness to improve the space utilization of the wooden box. By using this intelligent processing approach for metal sheet encasement, we conclude the encasement results which reveal that the present algorithm is both of effectiveness and certain versatility.

    • Robust Speaker Recognition Under Channel Mismatch Environment

      2015, 24(3):235-240. CSTR:

      Abstract (1305) HTML (0) PDF 789.22 K (2555) Comment (0) Favorites

      Abstract:The recognition rate of the Speaker Recognition System under ideal condition can reach more than 90%, but the recognition rate will decrease rapidly under the traffic environment. In this paper, we discuss the robust speaker recognition under the channel mismatch environment. First, a speaker recognition system based on Gaussian mixture model(GMM) is set up. Then, two methods of improvement are put forward through testing and analysis of the actual communication channel. One is that we establish a general channel model to filter the clean speech which is regarded as the training speech. The other is that we put forward to abandon the first and second dimensional characteristic parameters through comparing the Mel-frequency cepstral coefficient of the measured channel, the ideal low-pass channel and the common speech. The experimental results show that the recognition rate under the channel mismatch environment is improved by 20% after processing and 9%-12% comparing with the traditional Cepstral Mean Subtraction(CMS).

    • Collaborative Digital Forensics System Based on Cloud Computing

      2015, 24(3):241-245. CSTR:

      Abstract (1457) HTML (0) PDF 724.07 K (2474) Comment (0) Favorites

      Abstract:In order to solve the problems about decentralized electronic evidence, low efficiency of forensic analysis, cooperative forensics difficultly, etc. A collaborative digital forensics model with positive feedback loop mechanism based on cloud computing are designed according to the needs of digital discovery and analyze cooperatively, which is based on the characteristics of the computer crime and related problems of the current digital forensics. Then, design idea and architecture of the model are discussed in detail. Finally, the realization method and key techniques of the model are analyzed, such as scheduling policy for cloud storage and task scheduling for electronic evidence based on locking mechanism. Experiments show that collaborative digital forensics could effectively improve the efficiency of digital forensics and the accuracy of analysis results.

    • Extraction and Application of DELMIA Three-Dimensional Machining Model Information Oriented to Collaborative Process

      2015, 24(3):246-250. CSTR:

      Abstract (3571) HTML (0) PDF 629.47 K (2858) Comment (0) Favorites

      Abstract:The three-dimensional machining process planning system is a hot trend in the development of CAPP. Achieving the guide of three-dimensional process to the production process is a key for the successful application of the three-dimensional machining process planning system in the enterprise. With a focus on the pivotal technic and difficulty of information extraction of DELMIA three-dimensional machining process model which is commonly used in auto and aviation fields, this paper describes how to apply V5 Automation secondary development technology in depth to extract three-dimensional machining process information, generate a three-dimensional machining process card and use it to guide the production, eventually forming a collaborative process management system based on three- dimensional environment.

    • Elman Neural Network and its Application in Estuarine Water Quality Assessment

      2015, 24(3):251-255. CSTR:

      Abstract (1664) HTML (0) PDF 923.22 K (2345) Comment (0) Favorites

      Abstract:Elman neural network was applied to evaluate estuarine water quality, and then the water quality and pollution levels were determined. According to the actual pollution of Fen River's estuary to Yellow River and the objective principle of factor selection, the evaluation factors were determined, and the estuarine water quality evaluation model which was based on Elman neural network was established. The trained model was used to evaluate the water quality of Hejin bridge monitoring section each month in 2010and analyse the water pollution condition of Fen River's estuary to Yellow River. Results indicated that the comprehensive water quality of Hejin bridge monitoring section at Fen River's estuary to Yellow River each month in 2010were inferior Ⅴ. Therefore, the pollution control of Fen River's estuary to Yellow River is imminent, source control of pollutants into Fen River should be strengthened. The example of water quality identify shows that the model can avoid the shortcomings of traditional neural network model, such as traditional neural network model cannot change the structure of the model in real time and it lacks of adaptability to future mutations, and make the trained network with nonlinear and dynamic characteristics. The water quality evaluation results of this model are realistic. So, the model has a good usability.

    • Application of Server Logs Mining to Functional Recommender Service of Electric Power Business Systems

      2015, 24(3):256-259. CSTR:

      Abstract (1352) HTML (0) PDF 654.24 K (2180) Comment (0) Favorites

      Abstract:This paper proposes a functional recommendation service of the electric power system based on server logs mining. First of all, we get the user log data from server los, and then preprocess those log data with "dirty" data. Secondly, we calculate interest-measure of each user pairs by the processed data sets, and we divide data set of interest-measure of each user pairs into multiple classes with similar interest-measure based on improved K-means clustering algorithm. Finally, personalized functional recommendation method is provided to each user. The experimental results prove the effectiveness of our method in electric power business system.

    • Traffic Data Exchange Process Based on Web Service

      2015, 24(3):260-265. CSTR:

      Abstract (1394) HTML (0) PDF 685.72 K (2322) Comment (0) Favorites

      Abstract:Aiming at the prevalent problem, information silos, in the transportation information system, as well as data security, authentication in network data transmission and other issues, a generic Web Service-based traffic data exchange method is proposed, which consists of formatted data exchange packet and service interface invocation. Among the method proposed, the data exchange packet is to standardize data, while the service interface invocation is to achieve data exchange process standardization. With the help of the example of data exchange in "Vessel based information collection and exchange interface specification", which gives xml format packet and the Web service interface, it shows that the proposed method can not only improve the inadequate of data exchange method and business logic associated with weak in the information system of transportation industry, but also improve the security of data exchange.

    • Multi-Objective Model of Economic Dispatch Incorporating Electric Vehicles

      2015, 24(3):266-269. CSTR:

      Abstract (1511) HTML (0) PDF 899.29 K (2600) Comment (0) Favorites

      Abstract:Electric vehicles can be used as standby power on the demand side through V2G technology. In this paper, a multi-objective optimization model is established, cost of economic dispatch and charging cost of EV owners are taken as the model's objectives, and the electric vehicles are used as standby power through coordinated charging in the process of economic dispatch. After meeting all the constraints, the model is simulated by NSGA-II algorithm. Besides, the electric vehicles' load charactristics, the real load fluctuation, the real wind output and the fault outage of generators are simulated hourly by using Monte Carlo algorithm.Experimental results show that this model can save the cost of economic dispatch and the charging cost of EV owners by choosing the right result among the pareto. It can also narrow the gap between peak load and valley load.

    • Optimum Fuel Saving Policy Based Assistant Gear Shift System

      2015, 24(3):270-274. CSTR:

      Abstract (1339) HTML (0) PDF 1.55 M (2766) Comment (0) Favorites

      Abstract:A remarkable amount of fuel consumption is due to driver's incorrect or non-optimized shift behavior. To solve the problem, a shifting guidance system based on the best fuel economy is proposed. The basic principle is to read the vehicle state parameters via OBD-Ⅱinterfaces, and then to remind the driver shift at the right time based on the optimal shift theory. The design and implementation of the system is detailed, including the system framework, missing parameter identification algorithm, the optimal shift discrimination algorithms. Finally, the system validation results show that the application of the system can bring an average fuel savings of 8.6%, and can make the fuel consumption more stable. Results of this study can be generalized in reality, and has an essential value for energy saving and emissions reduction of transportation.

    • Customer Traffic Analysis and Forecast Based on User's Behavior Model

      2015, 24(3):275-279. CSTR:

      Abstract (1451) HTML (0) PDF 1.28 M (2756) Comment (0) Favorites

      Abstract:In order to forecast the short-term customer flow in trading area under wireless access, through analyzing of customer shopping behaviors, this paper presents an identification scheme based on staying time and activeness to distinguish the staff and customers. We use the binary linear regression method to fit the data under confidence level of 95%, and analyze the influence of different parameters to predict. Experimental results show that the staying time and activeness are reasonable and effective to distinguish the identity information, when time threshold is 3 and activeness threshold is 2, the wavelet neural network prediction effect is best.

    • Prediction of Gene Pathway Based on Ant Colony Optimization

      2015, 24(3):280-283. CSTR:

      Abstract (1715) HTML (0) PDF 647.27 K (2260) Comment (0) Favorites

      Abstract:With the rapid growth of gene sequencing, people began to study gene pathway of specific biological processes, but biological experiments restrictive make it slowly. In this paper, it proposed a gene pathway prediction technical which based on ant colony optimization, used the corresponding gene in wnt signal pathway as data and its internal relations set algorithm parameters to predict gene pathway. The results show that this program has a great reference value, it can guide the path of research and increase the speed of research.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063