ZHANG Ming-Bao , LI Yu , HU Yu
2015, 24(3):1-8.
Abstract:The center strategy of building institutional repository is difficult to meet the diverse and personalized needs of knowledge applications. It is proposed to build institutional repository based on decentralization strategy. Its system structure and working process are designed, a summary of its key technologies are elaborated. Some solutions to such critical issues are introduced and practice has proved that the decentralization strategy is feasible to build institutional repository
2015, 24(3):9-17.
Abstract:Data stream analysis and manipulation is very common in computer systems. Practical systems usually consist of data streams of different frequencies, however, dealing with data streams with different frequencies in existing programming languages has to be done explicitly and manually in programs. This paper proposes FStream–a framework for programming data streams with different frequencies, which supports automatic calculation. FStream is designed based on functional languages and dependent type systems. We also show an encoding of a discrete-time Simulink model in FStream.
2015, 24(3):18-23.
Abstract:A five stage pipeline CPU was designed and implemented on FPGA. Referring to MIPS machine and analyzing the process of each instruction, the process was divided into five stages which are IF, ID, EXE, MEM, and WB. The design of system-level structure was placed in the first position in order to determine the architecture and the instruction set. The next work was decomposing the integrated architecture and determining the signal connection between the module and the module. The CPU was implemented with VHDL. Finally, the five stage CPU was debugged by debugging software which is called Debug-controller. The result shows that the pipeline CPU is effective.
HUANG Cai-Rong , YU Hai , WANG Fang
2015, 24(3):24-30.
Abstract:After many years of informatization construction, Tianjin Branch has formed the equipment management information system with Maximo system as the core. With application system continually being evolved, custom procedures, business data and system loading increases dramatically, which leads to lower performance of the system. When access to Maximo System, the users will come across problems such as: slow access speed, non-normal exit, no responses for the new request. All of these problems will affect the normal use of the system. In order to improve the performance of the Maximo system and meet the increasing demand of the users, we conduct customized configurations depending on the application of Maximo system. Using the combination of load balancing technology and hardware cluster for the first time can greatly enhance the business management ability of Maximo system.
2015, 24(3):31-37.
Abstract:In order to solve the problem that electric paper books have insufficient gray-scales, the improvement algorithm of halftone image processing technology is proposed to realize electric paper books display optimization. On the basis of halftone technology and characteristics of electronic paper, this paper introduces the dithering algorithm and error diffusion algorithm. By improving this two algorithms, the electric paper books can display more gray-scales and have better visual effect. The research is focused on threshold, filter and specific scanning mode of the error diffusion algorithm. A new improved algorithm based on dynamic error detection is put forward in the paper which can effectively improve image gray-scales and greatly improve the image display quality of the electric paper books. Finally, the simulation in the electric paper books system platform is realized and the algorithms mentioned are evaluated by objective image quality assessment.
ZHANG Rui-Qiu , CHU Yuan-Feng , LI Chen , QIAO Sha-Sha
2015, 24(3):38-43.
Abstract:Because of the slow network transmission speed and the large amount of data of the virtual exhibition system scene file on web environment, exhibition scene takes a long time to load for the first time, and it has standstill and models flashing during scene roaming. To solve these problems, this paper proposed new methods, which are Gradually Optimize Two Level of Detail and model-mapping transition display optimization technology. GOTLOD technology loads the scene file by splitting scenes and asynchronously, it uses low accuracy of the model show to build scene quickly, and it uses stadia and dynamic to switch different precision of the model. Model-mapping transition display optimization technology uses the difference size of Stadia to switch between models and textures. Experimental results shows that the initial load time reduces 71% and FPS of scene roaming value increase 3.9 times by using the GOTLOD and model-mapping transition display optimization technology. The optimization technology reduces the scene loading time effectively, and solves the high-fidelity runtime scene roaming fluency problems.
LIAN Wen-Bo , WANG Mei-Ling , TAO Qiu-Ming , ZHAO Chen
2015, 24(3):44-49.
Abstract:The iterative computation is an important big data analysis application. While implementing iterative computation on the distributed computation framework MapReduce, the iterative program will be divided into more than one jobs which run in the order defined by the dependencies between jobs, which lead to many interactions between the program and distributed file system(DFS) that will affect the program's execution time. Caching these interaction-related data will reduce the time of interactions between the program and DFS and hence improve the overall performance of application. Considering that large amount of memory in cluster nodes is unused at most time, this paper proposes a programming framework called MemLoop using memory cache for iterative application. This system sufficiently uses the free memory in the cluster's nodes to cache data by implementing the memory caching management from three models: job submit API, task scheduling algorithm, cache management. The cached data is classified into two categories: inter-iteration resident data and intra-iteration dependent data. We compare this framework with previous related framework. The result shows that MemLoop can improve the performance of iterative program.
ZHAN Huan , CHEN Zhi-De , WANG Meng
2015, 24(3):50-56.
Abstract:The study on social network marketing effect tracing is still in the infancy. To meet the need of social network marketing effect, a platform is designed for social network information collection and data processing. The platform uses crawler technology to obtain information. Although the speed of information collection is limited, the platform can acquire as much information as possible. The spread diagram for social network marketing tracking will be obtained by building a forwarding tree algorithm. Experiment results show that the platform can automatically acquire and process the data, and then draw an information dissemination graph. The information dissemination graph is used to find the tipping point and comment information in the information dissemination, that is, the important relationship nodes and feedback information in relationship marketing. The platform can also obtain other related statistics information of interactive users to facilitate the tracking of social network marketing effect.
2015, 24(3):57-62.
Abstract:To solve the problems of false fire reporting caused by inefficient management or insufficient maintenance of firefighting facilities, research on internet-based real time fire monitoring and on-line data analysis is presented. The concept of Complex Event Processing is introduced into a remote firefighting security monitoring system. In the system, an event processing language, together with its engine (Esper), is used to illustrate the events of false fire reporting. As a result, the entire process including data stream processing from IOT, events and rules modeling, and on-line discrimination of false fire reporting, are demonstrated in the system.
WANG Xiu-Zhi , JIANG Bing , LIU Rui-Yang , YU Lian-Hai
2015, 24(3):63-68.
Abstract:The main purpose of the software development is to solve the problems of practical computation and interfaces. It mainly introduces how to compile computing general program in the environment of Visual C++6.0. Adopt MFC program interface design and use ADO to connect SQL database. Meanwhile, take GB 300MW condensing unit thermoelectric generators unit integrated coal consumption computational analysis as an example, The system has several major functions such as parameter setting, comprehensive performance calculation, single parameter impact analysis, heat deviation analysis, data query and so on. The Visualization of user interface has been implemented, the precision of calculation has been improved, and the computational effort has been greatly reduced. At the same time, it provides technical support for the power plants unit in respect of safe and efficient operation and improvement of energy efficiency.
2015, 24(3):69-74.
Abstract:This work introduces the booming development of social media and associated applications on various domains, demonstrates advantages and feasibility of applications on flu epidemic detection on the basis of Twitter data. Specifically, this paper puts emphasis on describing the detailed design and concrete implementation of corresponding visualization system. Finally, it discusses the significance and potential applications of the system.
DU Zhen-Hua , LI Zhi-Yong , WANG Zhao , LIAN Mei-Rong
2015, 24(3):75-80.
Abstract:To stop a gap in the aspect of monitoring and analysis of energy efficiency in China's offshore oil industry, this paper designs a comprehensive analysis software system that used in offshore oil platform to analyze the energy efficiency status of energy consumption equipment. The system based on C++ DL, breaks the drawbacks of tradition analysis method which is single, extensively, subjectively and others. It implements the energy efficiency monitoring, energy efficiency analyzing and energy efficiency assessment for energy consumption equipment. The software has a friendly interface. It can display the parameters of temperature, pressure, flow and power from acquisition terminal real-time. Moreover, it can draw the energy efficiency curve and generate reports according to the parameters. At present, this system has been put use in one offshore oil platform which in Bohai sea area, and taken one important step for China to build energy-efficient energy companies.
YANG Xian-Dong , WANG Xiao , YUAN Xiang
2015, 24(3):81-85.
Abstract:Against currently meteorological observation data transfer between cities and counties, provincial, national meteorological department, this paper designed and developed the monitoring system of meteorological communication which can run on android mobile. The data used in the system based on the collection and transmission statistics for new generation national meteorological communication system. The result proves the system can well meet the needs of using mobile monitor the data transceiver in the daily work and provide an effective way of monitoring for meteorological data on the mobile devices.
HOU Liang , ZHANG Xiao-Rong , WANG Jian-Yu , HE Xin
2015, 24(3):86-91.
Abstract:To solve the traditional pharmacy health care high pressure, low efficiency and other issues, an automated prescription mixing system based on boil-free granule of Traditional Chinese Medicine of total components is designed and implemented with modular design. It obtains from prescription get, prescription analysis to prescription process automatically. This paper proposes a general method for medicine depot organizations, studies different scheduling algorithms of bottle using and compares their effects to mixing efficiency. Practice shows that the system is easy to operate and human-friendly, and has high accuracy, efficiency, and practical value.
ZHU Xi-Yong , LI Ting , LV Mei-Dan
2015, 24(3):92-97.
Abstract:To meet the challenges from less standardized and highly varied business processes in small-to-medium enterprises, limitations of current software customization approaches are pointed out. Based on traditional software customization techniques and methodologies, such as service-oriented architecture and model-driven architecture, the Service Model Driven Architecture (SMDA) is proposed with the concept of service model and service template. A framework of SMDA-based software customization is presented, and the processes to abstract service models and build service templates are discussed in details. An example is finally presented to demonstrate the effectiveness and practicability of the approach by quickly reconfiguring the service templates to generate enterprise systems.
HAN Ying , ZHAO An-Xing , YUAN Shuai , WANG Ye-Peng
2015, 24(3):98-104.
Abstract:With the continuous development of social economy, the university campus constructions develop more intelligent, energy-saving and green. Campus streetlight control system as public communal facilities in campus constructions connects with the degree of the campus modernization construction. This paper proposes a reasonable and effective campus streetlight remote control system which combines Zigbee and GPRS. According to the actual situation of streetlight control, this system uses a chain network topology. It realizes the software control of Zigbee and GPRS through the system software design. Finally, interface design programmed by language of VB accomplishes the system long-range control. This system is simple and energy-efficient. It is available to popularize, containing a certain practical importance and significance.
SUN Zhen-Hua , GAO Chuan-Fa , REN Hua-Feng , NAN Guo-Liang
2015, 24(3):105-109.
Abstract:To improve the performance of relay protection devices, a new microcomputer relay protection platform is designed. In this platform, MPC8309 based on PowerPc architecture is the core controller of the protection unit and the communication unit which are designed respectively, and a sampling board is designed independently. Boards are interconnected with high speed ethernet interface and LVDS. The software system based on Nucleus embedded real- time operating system is designed hierarchically and modularized. Combined with a specific application case, the hardware and software design of the platform are described in detail, with the key points in the process of design and the underlying configuration. The platform with perfect function and good stability can satisfy the performance requirements for protective devices. The relay protection platform is suitable for relay protection measurement and control device of power equipment of all kinds of voltage grade, and has been successfully applied to high voltage line protection devices.
2015, 24(3):110-114.
Abstract:In view of the inefficient and chaos of traditional WANO human error research work, the study based on actual demand of the WANO human error research work and object-oriented technology. It designed and implemented a WANO human error research platform. The article from the perspective of the WANO human error research platform construction elaborated platform realize related technical key points, such as platform framework, WANO human error database construction etc, and introduced the application effect of data ETL on WANO human error research platform.
2015, 24(3):115-119.
Abstract:To strengthen the standardization of substation inspection and safety supervision, this paper designs the substation safe operating system based on internet of things technology. This paper mainly presents the on-site acquisition system scheme. It introduces the equipment selection, installation notes, localization algorithm and detailed implementation programs. In the work area the system locates the position of staff and tracks the patrol route. It is more efficient to detect and manage the behavior as straying into the restricted area and dropping inspection, etc.
2015, 24(3):120-123.
Abstract:The RF automatic testing technology is studied and realized based on the platform of VEE virtual instrument technology. This technology resolves the problems, such as too many testing projects, long testing time, and complicates operating. The design conception of the RF testing system is discussed by hardware platform architecture and VEE software data transmission. The working processing and concrete opetaing methods is also disserted in detail. The realization of automatic testing system provides enforcement safeguard for the working efficiency of the RF equipments on improving debugging, examine and maintaining.
2015, 24(3):124-132.
Abstract:The classical bacterial foraging optimization algorithm suffers from low solution accuracy and poor convergence performance due to the fixed Chemotaxis step-size. To handle these problems, an improved bacterial foraging optimization algorithm based on Levy flight is put forward. The proposed algorithm uses Levy distribution based Chemotaxis step-size for the improvement of both solution accuracy and convergence performance, and random walk strategy of Levy Flight for the improvement of bacterial migration position. Experimental results on several benchmark test functions show that the proposed algorithm achieves noticeable improvement in terms of solution quality and convergence performance in comparison with existing bacterial foraging optimization algorithms.
JIAO Rong , XU Wei-Jun , LIU Jing-Wei
2015, 24(3):133-138.
Abstract:Connection-oriented transmission protocol in the wireless narrowband broadcast channel is a kind of data link layer protocol for constituting a network in the wireless narrowband broadcast channel. In the way of how to design a communication protocol, the design of wireless data network transmission protocol frame structure, the design of initialization process, the design of data transmission process and the mechanism of the time slot dynamic management are introduced. From a practical effect, since the time-division multiplexing transmission mode, the mechanism of the time slot dynamic management and the connection-oriented service are used in the protocol. The problem of the low data communication efficiency in the wireless narrowband broadcast channel is solved. Additionally, the reliable IP data transmission is transparently provided based on the TCP/IP architecture.
LI Zheng , LI Shu , WANG Jun , LIU Shi-Jin
2015, 24(3):139-146.
Abstract:Software Development, where developers work together parallelly is the standard develop mode actually, needs the revision control tool to assistance the development widely. Most of the tools today could merge the code changes from different branches edited by different developers. These tools are based on code text differ comparation line by line, and the merged code isn't always the prediction of the developers. This paper presents a new branch merging algorithm which intends to provide a better result. We build an abstract syntax tree of the code block where the traditional merge gives a code confliction. Then we merge this code block of different revisions automately based on AST nodes comparative analysis. In this way, the code conflictions and manual work in branch merging could be reduced. At the same time, the development efficiency would be improved.
GUO Chang-Na , WANG Yang-Yang , WU Bei-Ping
2015, 24(3):147-150.
Abstract:The predict of the gas emission is of great significance in the coal mine safety, decompose and refactoring the original data by wavelet analysis, and speed up by AFT, the data refactored predict by GM(1,1). We compare the results between wavelet - grey and GM(1,1). The results show that the prediction accuracy of the former is higher than the latter.
FAN De-Hui , GAO Shan , NI Ping
2015, 24(3):151-155.
Abstract:According to the different types of operating systems and other reasons, the most intelligent terminal applications and services development need to be customized. It leads to a long development cycle, high cost, increased the repetitive labor and resources waste problem. In this paper, the authors introduce the research and development of internet of things application adapter middleware, which can be suitable for various intelligent terminal with different data sources. This paper research the system architecture and technical architecture of the middleware. The middleware uses the object-oriented thought, applying the MVC (Model View Control), Adapter, Singleton, and other design patterns. The intelligent terminal middleware can improve the application ability of different field of Internet of things as well as expand the access channel in the field of Internet of things.
WANG Zhi-Rui , GU Wen , LIU Zheng-Tao
2015, 24(3):156-160.
Abstract:In this paper, based on the characteristics of information system and the need for access control, a set of permissions control component is designed and implementated using RBAC model on the platform of .Net framework. Furthermore, with the introduction of the authority commission, hierarchical authorization and UBAC features, the RBAC model is expanded in the design process, and is applied to the component of multiple EIS system development process. Finally, the results show that the component can be integrated quite well in information system. It reduces the complexity of the development, and improves the efficiency of permissions management work.
WANG Jun-Jie , DUAN Jun-Rui , ZHU Yao-Lin
2015, 24(3):161-165.
Abstract:The work of kernel transplantation has practical application value and the configuration more complex tasks. So this paper comes up with a new method of kernel updates on the basis of the kernel itself characteristics. Most of the existing kernel transplantation methods need to complete with the module init-tools, mkinitrd, lvm2 and device mapper and other tools, external tools are abandoned in this paper. It is to achieve the new kernel updates and its strategy is on the basis of the kernel protection characteristics. First of all, for kernel configuration, we analyze the necessary module configuration. Then it uses the command interface to the kernel of modularization compile and grub analysis. Again, in view of the robustness requirements for the kernel, the kernel is realized with the MD5 algorithm which can improve the mechanism of protection. Finally experimental research show that the kernel transplantation method is convenient and practical, and the improved protection mechanism of the kernel has important application value.
2015, 24(3):166-170.
Abstract:Smartphone life provides great convenience for people, it is very common essentials, it is a symbol of fashion, and also a symbol of identity. Therefore, reasonably choosing and buying a smartphone is very necessary for college students. In this paper, we use the analytic hierarchy process (ahp) to buy smartphones college students conducted in-depth research. It establishes the hierarchical model, from the performance, price, appearance of mobile phones, according to the level 9 scaling analysis of mobile factors in detail. The root method computing for a variety of factors is used. It sorts and selects the optimal solution, in preparation for college students to provide some references to buy mobile phones.
2015, 24(3):171-175.
Abstract:Abandoned objects detection is the core function of the intelligent video surveillance system. Abandoned objects are generally small and in the complex environment, the traditional moving target detection algorithms usually cannot well detect abandoned objects directly. This paper proposes an abandoned objects detection algorithm based on frame difference and edge difference. Firstly, the algorithm gets the moving target area by frame difference calculation. Then, it gets the edge of the moving target by edge difference calculation between the current frame image and the previous frame background image. It merges this two difference calculation result to get the complete moving target edge features. Finally, if the residence time of this moving target in the scene meets or exceeds the threshold set by the alarm system, this paper marks this target as an abandoned object and the intelligent video surveillance system will process this result. The experiment results show that the proposed algorithms has high realtime performance and recognition rate.
2015, 24(3):176-182.
Abstract:The simplicity and efficiency of the community detection algorithm based on label propagation (LPA) have been studied extensively, but when the community structure is not clear, a single community is obtained through the LPA, which is meaningless. Modularity-specialized label propagation algorithm (LPAm) tends to partition the network into communities with similar degrees and the problems of solving the limit of functions exist. Therefore, this paper points out label propagation algorithm based on modularity density optimization (LPAd), in order to avoid the formation of large communities, and the community meets the weak community definition proposed by Radicchi et al. Several real datasets and artificial network data experimental results show that, this algorithm raises the quality of the detected community without changing the algorithm complexity, and compared with the existing number of community detection algorithm based on label propagation, it has been improved effectively.
WANG Cheng-Xian , HU Yang-Bo , TAN Jing
2015, 24(3):183-187.
Abstract:This paper proposes an algorithm for electric power business system function optimization. Firstly we extract log data from the Web server and the client user. Then, we preprocess the user log dataset, and convert transaction dataset into a sequence data. Finally, we use the improved Apriori-based algorithm to find tight coupling function modules, and make optimization combination between the functions to improve the working efficiency of the business. Experiments show that the method is effective in revealing the coupling of the business function module.
WANG Kang-Ning , WANG Jin-Hao , XU Long , Xiang Jie , QIU Ze-Jing
2015, 24(3):188-192.
Abstract:To solve the increasingly harmonic problem which is serious and complex, this paper presented a harmonic detection method based on Kalman filter. In this paper, the Kalman filter estimation theory was discussed, and the numerical model based on Kalman filter analysis was established. Combined with the performance of the simulation platform of Matlab, it discussed the performance of the algorithm for detecting the steady harmonic and transient harmonic signal. The comparative study shows that this algorithm is superior in accuracy, rapidity, transient harmonic analysis to the Fast Fourier Transform algorithm (FFT). The simulation and experiment results show that the algorithm is quite practical in complex electric power quality analysis.
HUO Juan-Juan , WU Min , WU Gui-Xing , GUO Yan , CHEN Zhao-Cai , DU Yi-Min
2015, 24(3):193-196.
Abstract:This paper introduces the method of collocation of confusion words and prepositions based on Winnow algorithm. Firstly, we obtain training sets by confusion sets. After preprocessing the training sets, we use the text feature extracted method to obtain feature sets. Secondly, we get the feature sets with weights by training on the feature sets based on Winnow and extract the prepositions which appear after the confusion words to generate the preposition vectors. Finally, we extract features from the test sets and the test sets and get the real-word errors checking results by the test which combines Winnow algorithm and the method of collocation of confusion words and prepositions. The correct rate, recall rate and F1 measure of some confusion words are improved by 10% ~ 20% when we join the method of collocation of confusion words and prepositions, some even up to 100%.
CHENG Jian-Hao , ZHU Xi-Jing , TIAN Si , LI Yong-Ping
2015, 24(3):197-201.
Abstract:To deal with the problems like artificial steak untwisting, the low work efficiency and labor intensity in printing and dyeing industry in our country, meridian skew detection method based on machine vision is proposed. It greatly improves the efficiency of untwisting and precision. By using a CCD camera to obtain images of the fabric, the system uses the obtained images for Blob analysis. The analysis of the main process includes the extraction of image, image segmentation(the initial segmentation, morphology processing, etc.), and feature extraction. Experiments show that the method can detect the warp of skew, and has very high precision, can be used for vertical untwisting of machine.
DU Shi-Jun , JI Wei-Xi , SUN Bin , QIAN De-Cheng
2015, 24(3):202-206.
Abstract:The advantages and disadvantages of the polytypic BOM storage structure are analyzed. It also gives out a practical storage structure model of BOM. Two basic algorithms of traversal of BOM are summarized, which are recursive algorithm and hierarchical traversal algorithm. Based on the two basic algorithms of traversal of BOM, the generation strategy of product structure tree and the summary strategy of product parts needed are proposed. And the BOM of elevator components is realized for a specific example. The result shows that it is helpful for reducing the storage redundancy of database, system overhead and the complexity of product traversal algorithm by using reasonable storage structure and optimized BOM traversal algorithm.
2015, 24(3):207-213.
Abstract:Clustering analysis oriented to software defect data is dividing different software defect data to different clusters according to some criterion. The result of clustering is that defect data in the same cluster is similar while defect data in different clusters is different. It is significant to find the distribution law of software defect make testing scheme and optimize testing process. Due to that the clustering results of K-Means is dependent on distribution of samples, a data dimensionality reduction method based on PSO is proposed. Simulation experiment shows that the clustering accuracy and quality are improved to some extent.
2015, 24(3):214-219.
Abstract:Current 3D model based line rendering methods produce drawings with a large number of small lines is due to the grid structure of the underlying model, resulting in many obvious corners and isolated segments in the drawings. In this paper, we propose a new sketch style 3-dimensional model line rendering method that transforms an observed 3D model into a drawing with simple and natural lines. Firstly, the method uses Suggestive Contours to get characteristic lines of the model. Then, these small lines are connected into a few long lines by analyzing their spatial information. Finally, cubic B-spline curves are utilized to interpolate the resultant lines with some simplification processing using B-spline wavelets. The rendering results show that the proposed method can connect characteristic lines well and get smooth and simple sketch style drawings.
2015, 24(3):220-225.
Abstract:A graph-based algorithm is developed in this paper to slove the university examination timetabling problem, by transforming the classical graph model and improving the greedy algorithm. The improved algorithm can be used to meet more complicated constrain conditions in the real university credit envioronment, such as cross-major, trans-grade, minor-study and so on. The algorithm aims to slove the soft-constrain objects, which are achived by manual optimizing in the most tradition researches and cases. Firstly, the algorithm is discussed to transfer the classical graph coloring model into a clique cover problem of a weighted undirected graph. Then the greedy algorithm is impoved by the deep-first strategy, to search the solutions which satisfies both the hard-constrains and soft-constrains. The improved algorithm is proved to be better than the greedy algorithm for the solution is more reasonable, and better than the manual work for the time consumed is less. The improved algorithm can enhance the efficiency of the university timetabling, which is helpful to the academic management of our university in recent years.
XU Xu-Dong , WANG Qun , KONG Ling-Tao
2015, 24(3):226-230.
Abstract:Medical registration is the most basic unit of the medical profession. Generally patients don't understand the condition of their illness. So choosing the wrong department is completely common. Intelligent medical system solves this problem very well. Intelligent medical system makes use of the massive medical record texts which the medical department accumulates to train and carry on machine learning, and to analyze the characteristics of the registration patient's medical record and to classify to the right disease. The patient is recommended to the appropriate department according to getting the department to be registered. The influence on the efficiency and accuracy of the traditional support vector machine (SVM) text classification of the intelligent medical system is the feature extraction and kernel function parameters optimization. Therefore, the method of the Genetic Algorithm (GA) combining with SVM is proposed. The text feature values and kernel function parameters together is viewed as a chromosome of the genetic algorithm that is an individual to carry on the binary encoding. The optimal individual is obtained by the genetic manipulation of the selection, crossover and mutation. Finally, text classification is operated by support vector machine using the optimal features and optimal parameters. The test result shows that this model improves the accuracy of intelligent diagnosis and is a good intelligent diagnosis registration algorithm.
2015, 24(3):231-234.
Abstract:Focus on the problems of square metal sheet encasement, this paper proposes a heuristic algorithm which imitates the hominine packing process. This algorithm is able to realize tiered encasement of a wooden box, starting from the bottom layer to upper ones. And in each layer, it can intelligently fill the unevenness to improve the space utilization of the wooden box. By using this intelligent processing approach for metal sheet encasement, we conclude the encasement results which reveal that the present algorithm is both of effectiveness and certain versatility.
RAN Guo-Jing , XIA Xiu-Yu , ZHANG Feng-Yi
2015, 24(3):235-240.
Abstract:The recognition rate of the Speaker Recognition System under ideal condition can reach more than 90%, but the recognition rate will decrease rapidly under the traffic environment. In this paper, we discuss the robust speaker recognition under the channel mismatch environment. First, a speaker recognition system based on Gaussian mixture model(GMM) is set up. Then, two methods of improvement are put forward through testing and analysis of the actual communication channel. One is that we establish a general channel model to filter the clean speech which is regarded as the training speech. The other is that we put forward to abandon the first and second dimensional characteristic parameters through comparing the Mel-frequency cepstral coefficient of the measured channel, the ideal low-pass channel and the common speech. The experimental results show that the recognition rate under the channel mismatch environment is improved by 20% after processing and 9%-12% comparing with the traditional Cepstral Mean Subtraction(CMS).
2015, 24(3):241-245.
Abstract:In order to solve the problems about decentralized electronic evidence, low efficiency of forensic analysis, cooperative forensics difficultly, etc. A collaborative digital forensics model with positive feedback loop mechanism based on cloud computing are designed according to the needs of digital discovery and analyze cooperatively, which is based on the characteristics of the computer crime and related problems of the current digital forensics. Then, design idea and architecture of the model are discussed in detail. Finally, the realization method and key techniques of the model are analyzed, such as scheduling policy for cloud storage and task scheduling for electronic evidence based on locking mechanism. Experiments show that collaborative digital forensics could effectively improve the efficiency of digital forensics and the accuracy of analysis results.
2015, 24(3):246-250.
Abstract:The three-dimensional machining process planning system is a hot trend in the development of CAPP. Achieving the guide of three-dimensional process to the production process is a key for the successful application of the three-dimensional machining process planning system in the enterprise. With a focus on the pivotal technic and difficulty of information extraction of DELMIA three-dimensional machining process model which is commonly used in auto and aviation fields, this paper describes how to apply V5 Automation secondary development technology in depth to extract three-dimensional machining process information, generate a three-dimensional machining process card and use it to guide the production, eventually forming a collaborative process management system based on three- dimensional environment.
FAN Cui-Xiang , ZHANG Yuan-Yuan , XUE Peng-Song
2015, 24(3):251-255.
Abstract:Elman neural network was applied to evaluate estuarine water quality, and then the water quality and pollution levels were determined. According to the actual pollution of Fen River's estuary to Yellow River and the objective principle of factor selection, the evaluation factors were determined, and the estuarine water quality evaluation model which was based on Elman neural network was established. The trained model was used to evaluate the water quality of Hejin bridge monitoring section each month in 2010and analyse the water pollution condition of Fen River's estuary to Yellow River. Results indicated that the comprehensive water quality of Hejin bridge monitoring section at Fen River's estuary to Yellow River each month in 2010were inferior Ⅴ. Therefore, the pollution control of Fen River's estuary to Yellow River is imminent, source control of pollutants into Fen River should be strengthened. The example of water quality identify shows that the model can avoid the shortcomings of traditional neural network model, such as traditional neural network model cannot change the structure of the model in real time and it lacks of adaptability to future mutations, and make the trained network with nonlinear and dynamic characteristics. The water quality evaluation results of this model are realistic. So, the model has a good usability.
HU Yang-Bo , CHEN Yong-Qiu , ZHOU Hong-Lin
2015, 24(3):256-259.
Abstract:This paper proposes a functional recommendation service of the electric power system based on server logs mining. First of all, we get the user log data from server los, and then preprocess those log data with "dirty" data. Secondly, we calculate interest-measure of each user pairs by the processed data sets, and we divide data set of interest-measure of each user pairs into multiple classes with similar interest-measure based on improved K-means clustering algorithm. Finally, personalized functional recommendation method is provided to each user. The experimental results prove the effectiveness of our method in electric power business system.
SHANG Long-Hua , AN Yi-Sheng , ZHANG Shao-Yang , TANG Jing
2015, 24(3):260-265.
Abstract:Aiming at the prevalent problem, information silos, in the transportation information system, as well as data security, authentication in network data transmission and other issues, a generic Web Service-based traffic data exchange method is proposed, which consists of formatted data exchange packet and service interface invocation. Among the method proposed, the data exchange packet is to standardize data, while the service interface invocation is to achieve data exchange process standardization. With the help of the example of data exchange in "Vessel based information collection and exchange interface specification", which gives xml format packet and the Web service interface, it shows that the proposed method can not only improve the inadequate of data exchange method and business logic associated with weak in the information system of transportation industry, but also improve the security of data exchange.
LU Jian-Li , ZHANG Xiao-Feng , ZHANG You-Bing , JIANG Sheng-Nan , WANG Yao
2015, 24(3):266-269.
Abstract:Electric vehicles can be used as standby power on the demand side through V2G technology. In this paper, a multi-objective optimization model is established, cost of economic dispatch and charging cost of EV owners are taken as the model's objectives, and the electric vehicles are used as standby power through coordinated charging in the process of economic dispatch. After meeting all the constraints, the model is simulated by NSGA-II algorithm. Besides, the electric vehicles' load charactristics, the real load fluctuation, the real wind output and the fault outage of generators are simulated hourly by using Monte Carlo algorithm.Experimental results show that this model can save the cost of economic dispatch and the charging cost of EV owners by choosing the right result among the pareto. It can also narrow the gap between peak load and valley load.
CAI Wen-Xue , XIAO Chao-Wu , HUANG Xiao-Yu , QIU Zhu-Cheng , CHEN Kang
2015, 24(3):270-274.
Abstract:A remarkable amount of fuel consumption is due to driver's incorrect or non-optimized shift behavior. To solve the problem, a shifting guidance system based on the best fuel economy is proposed. The basic principle is to read the vehicle state parameters via OBD-Ⅱinterfaces, and then to remind the driver shift at the right time based on the optimal shift theory. The design and implementation of the system is detailed, including the system framework, missing parameter identification algorithm, the optimal shift discrimination algorithms. Finally, the system validation results show that the application of the system can bring an average fuel savings of 8.6%, and can make the fuel consumption more stable. Results of this study can be generalized in reality, and has an essential value for energy saving and emissions reduction of transportation.
CHENG Qiu-Jiang , PENG Yan-Bing
2015, 24(3):275-279.
Abstract:In order to forecast the short-term customer flow in trading area under wireless access, through analyzing of customer shopping behaviors, this paper presents an identification scheme based on staying time and activeness to distinguish the staff and customers. We use the binary linear regression method to fit the data under confidence level of 95%, and analyze the influence of different parameters to predict. Experimental results show that the staying time and activeness are reasonable and effective to distinguish the identity information, when time threshold is 3 and activeness threshold is 2, the wavelet neural network prediction effect is best.
ZHANG Wei-Juan , ZHANG Hong-Mei , CHEN Feng
2015, 24(3):280-283.
Abstract:With the rapid growth of gene sequencing, people began to study gene pathway of specific biological processes, but biological experiments restrictive make it slowly. In this paper, it proposed a gene pathway prediction technical which based on ant colony optimization, used the corresponding gene in wnt signal pathway as data and its internal relations set algorithm parameters to predict gene pathway. The results show that this program has a great reference value, it can guide the path of research and increase the speed of research.