• Volume 24,Issue 5,2015 Table of Contents
    Select All
    Display Type: |
    • Research on Industry Knowledge Warehouse

      2015, 24(5):1-10.

      Abstract (1550) HTML (0) PDF 481.94 K (4037) Comment (0) Favorites

      Abstract:Industry knowledge warehouse is an important development direction of knowledge warehouse applications. It briefly describes the concepts and function features of industry knowledge warehouse and establishes its system architecture reference model. Based on such reference model, progress in the field associated with industry knowledge warehouse is summarized systematically and finally the research status features of industry knowledge warehouse are summarized, which aims to lay the foundation for the coming researches of industry knowledge warehouse.

    • Visible Components Automatic Recognition of Microscopic Cell Image

      2015, 24(5):11-18.

      Abstract (1443) HTML (0) PDF 2.10 M (3429) Comment (0) Favorites

      Abstract:Automatic identification of microscopic cell image is studied in this paper. Firstly, considering the status of the complicated cellular components, the corresponding method is applied to image preprocessing, the contrast and resolution of the image is significantly improved. Then, the image segmentation, feature extraction and cell identification are emphatically studied, gaining a set of algorithms process to identify cell speedy and precisely. Finally, this method is tested by using four kinds of common cells samples, the results verify the effectiveness of the method.

    • Inproved Template Matching Algorithm for Processing Test Strip Image Abstract

      2015, 24(5):19-25.

      Abstract (1434) HTML (0) PDF 630.39 K (2743) Comment (0) Favorites

      Abstract:It is practically important to develop an instrument for quantitative testing strips as the strips were widely used in areas like health, water, food, etc. and national higher demands were made on testing standard. Considering the widely use of machine vision, the test strip image can be got from the industrial camera. Taking advantage of the image processing for extracting corresponding feature can help achieve the quantitative test of the strips. In order to overcome the difficulties that rectificating the sloping test strip images and locating the region about test strip, this paper adopts the hough transform to correct the test strip image and proposes an improved template matching method based on the shape of integral projection. Compared with the traditional methods of template matching, this new method has much faster matching speed with guaranting the high matching accuracy. Moreover, the growing time of method proposed in this paper increase slowly along with enlarging the test strip image.

    • Construction Model of Cloud Center for Oil-Gas Exploration in Big-Data Era

      2015, 24(5):26-31.

      Abstract (2044) HTML (0) PDF 840.24 K (2346) Comment (0) Favorites

      Abstract:According to big data definition, the data processing of exploration of oil and gas is obviously a big data application mode. Computing center is designed to meet data processing needs of the company as the main exploration platform of oil and gas exploration cloud. Under the primise of ensuring the sharing computing power and Collaborative work,exploration cloud focus on support of data storage, data management and data applications. Compared with the general public cloud, the Construction of private exploration cloud has its unique mode. The author company combined with own company characteristics and current big data application needs to construct large data private cloud, and it achieved certain results. The support for the main business is obviously effect.

    • Exercise Intensity Monitoring System Based on Wearable Device

      2015, 24(5):32-39.

      Abstract (1397) HTML (0) PDF 1.08 M (3096) Comment (0) Favorites

      Abstract:Currently students' fitness and health status continually declines. Low and high intensity exercise will have a bad effect on students' physical fitness and health. In order to meet the needs of monitoring exercise intensity and encouraging students to do moderate exercise, a set of exercise intensity monitoring system based on wearable device is proposed and implemented. It uses three-axis acceleration sensor to capture the acceleration signal of human motion and preprocesses it, transmits it to the base station of GPRS via wireless Bluetooth and uploads it to the server automatically. An exercise intensity classification algorithm is designed to monitor exercise intensity, so teachers urge students to do moderately intense exercise. Details on hardware and software of the system are discussed, including wearable device, base station, a method of Flash storage and server software. The test results show that the system runs normally and safely. The system satisfies the needs of monitoring exercise intensity and promoting students to do moderate exercise.

    • ARP International Cooperation Management System Based on Agile Methodology

      2015, 24(5):40-46.

      Abstract (1427) HTML (0) PDF 879.96 K (2708) Comment (0) Favorites

      Abstract:Based on ARP project construction, the paper simply introduces the complex management information system which aimed at CAS' two layers of management. The system informationizes service, research, management, and converged humanity, finance, material, items and many other resource, can support decision making and analysis of top leaders. ARP system contains ten business subsystems and three supporting platforms. The papers take one of subsystems construction for example-international cooperation construction. In order to decrease response time because of requirements change, development method based on agile platform is presented. The effect of application shows that the work efficiency is improved greatly and the level of management information is promoted.

    • Embedded Electronic Map Based on Qt/Embedded and Mitab Library

      2015, 24(5):47-51.

      Abstract (1561) HTML (0) PDF 681.35 K (4532) Comment (0) Favorites

      Abstract:Now, electronic map location information displays on embedded navigation terminal with low accuracy. Based on QT/Embedded and the Mitab Library, an embedded GIS navigation electronic map system is designed. The system uses Qt to develop graphics user interface. Geometry and attribute data of electronic map in MIF format is obtained through Mitab library. The extracted map data is processed using coordinates conversion algorithm. Finally the electronic map accurately and clearly displayed on the LCD screen. The experiment in embedded Linux platform indicates that the electronic map has functions such as zooming and roaming, and visualized more accurately. The system can be applied for the tourist, road planning and vehicle navigation.

    • Virtual Emergency Meeting System Based on Hall for Workshop of Meta-Synthetic Engineering

      2015, 24(5):52-56.

      Abstract (1889) HTML (0) PDF 993.42 K (2939) Comment (0) Favorites

      Abstract:Emergency meeting is a very important part of Emergency management. Aimed at the complexity and uncertainty of the management, this article analyzed the function requirement first, and then constructed a virtual emergency meeting system based on the hall for workshop of meta-synthetic engineering, and its technological frame and system structure oriented to service were given also. The proposed system is meaningful to realize efficiency emergency management of information era.

    • Vehicle Brake Lever Anti-Collision System Based on Binocular Vision

      2015, 24(5):57-61.

      Abstract (1407) HTML (0) PDF 942.92 K (2192) Comment (0) Favorites

      Abstract:The traditional method of detecting vehicle location by induction coil vehicle has a lot of problems, such as error in judgment, inconvenient of replacing the equipment and high cost. To solve these problems, this paper proposes a binocular vision method to detect vehicle location. This method adapts to all kinds of light changes. Selecting mode of day or night is determined by the different intensity of light surrounding environment. The mainly works of mode day include the median filtering of difference image, the extraction of binary image and the real-time update of partitioned background. Based on this, the paper proposes a method to detect vehicle location which combine the background subtraction and frame difference methods. This method can accurately extract the threshold value to acquire precise outline of the object. While in night mode, the infrared lamp is opened for switch to infrared CCD acquisition function. It's according to the values of RGB which in infrared lamp irradiation area to detect the vehicle location. This method has solved the problem of vehicle lights interference to video acquisition. Finally, the method is experimentally verified, and the results show that it can accurately detect the location of the vehicle and control the brake lever ups and downs.

    • Extended Multiple Serial Port and 485 Communication Based on WinCE and ARM

      2015, 24(5):62-67.

      Abstract (1356) HTML (0) PDF 880.64 K (2737) Comment (0) Favorites

      Abstract:Along with the book evaluating standards for renewable energy building's application projects implements in our country, we are in urgent need of the operational datas about the renewable energy building's application demonstration projects. The data acquisition system of the renewable energy building's application demonstration projects has one demand of multiple serial ports and a 485 bus communication. This paper uses ARM9 S3C2440 embedded microcontroller and VK3234 with four channel UART/SPI interface to extend serial. What's more, it achieves the 485 communication between the field detection device and data acquisition device with MAX3485. This paper states the interface and software and hardware between S3C2440, VK3234 and MAX3485E specifically. The practical running test in the laboratory shows that the system is stable and reliable, and it has been applied in the data monitoring system of the renewable energy demonstration projects.

    • Wireless Control System Model of Showing Powerpoint

      2015, 24(5):68-73.

      Abstract (1783) HTML (0) PDF 820.99 K (2724) Comment (0) Favorites

      Abstract:In order to make the PPT presentation of the user control the speech draft more convenient and efficient in work or study, to enhance the efficiency of work or study, this paper presents the design of the wireless control system model of showing PPT based on socket transmission, and realizes the model using a variety of popular computer technology. The working principle of the system model is that the user transmits the control information encapsulated in the socket to the server by the android mobile phone, and controls the PPT showing in the wireless way. At the same time, the design model presented in this paper can be widely used for the design and development of various mobile terminals to control the personal computers.

    • Battlefield Simulation System Based on STK/X

      2015, 24(5):74-78.

      Abstract (1507) HTML (0) PDF 945.13 K (4753) Comment (0) Favorites

      Abstract:An introduction about the major functions and application fields of STK(Satellite Tool Kit). This paper does further research on STK/X component and integrates 2D, 3D modules of STK into VC program with VC2008, making it possible for data communication in realtime mode, then applies it to the battlefield Simulation. This paper analyzes the feasibility and problems of making the situation of frontline visible to commanders in rear command center.

    • Template-Based Short Message Service Platform

      2015, 24(5):79-83.

      Abstract (2228) HTML (0) PDF 761.62 K (2570) Comment (0) Favorites

      Abstract:Short Message Service Platform can send text message in bulk, its port connected to Internet is provided by China Mobile, China Unicom, and China Telecom. The paper introduces the system structure of SMS platform. Emphasis is placed on the discussion of key technology, such as Web Service and MSMQ. Message can be changed arbitrarily from template generated by attribute and reflection technique, the latest message can be sent to every client timely.

    • RTU Remote Monitoring System Based on Beidou Communication

      2015, 24(5):84-87.

      Abstract (1610) HTML (0) PDF 774.96 K (2773) Comment (0) Favorites

      Abstract:Aiming at the actual demand of Remote control center information of equipment state monitoring and evaluation, we designed a kind of based on Beidou satellite communications RTU (Remote Terminal Unit) remote monitoring system with certain missile equipment information collection recording device improvement project as the background. The system can be real-time acquisition to the equipment state information and the data collected by high speed processing, through the Beidou communication terminal time send form data to the control center, control center can also send orders status data to be obtained at any time. The test results show that the system has good stability, the characteristics of real-time, reliability, and low energy consumption. It can realize remote monitoring and data collection to meet the needs of the equipment of the remote management.

    • Reconstruction Scheme of Earthquake Information Network System Based on GAP Technology

      2015, 24(5):88-91.

      Abstract (1387) HTML (0) PDF 1.52 M (2434) Comment (0) Favorites

      Abstract:Earthquake information network system of Jiangsu province is a unified platform of regional seismic data transmission, data exchange, and data storage and information service. Aiming at the existing problems of the network system, an updating scheme is put forward. There are mainly: to physically separate the transmission system and Internet by GAP, to upgrade the key equipment and links bandwidth of the network, to increase network security equipment. Through those technical means, the network system achieves a safe, stable operation target, both to satisfy the needs of the information and data transmission, exchange, storage and diversified applications of seismic, and to meet the requirements of three level safety management of information system. The scheme can provide a useful reference for optimizing the seismic information network system.

    • Three-Dimensional Path Planning Based on Parameter Variance Adjustment Firefly Algorithm

      2015, 24(5):92-99.

      Abstract (1481) HTML (0) PDF 2.18 M (2502) Comment (0) Favorites

      Abstract:In order to improve the speed and accuracy of firefly algorithm, a parameter variance adjustment firefly algorithm is proposed. Firstly, based on the analysis of the firefly algorithm the core idea of parameter variance adjustment algorithm firefly is developed: calculate the population variance of luminance assessment of convergence and divergence of populations, and adjust parameters according to the processing, which aims to improve the firefly algorithm, and then presents the algorithm implementation steps and processes. Secondly, compare and analysis the parameter variance adjustment firefly algorithm with basic firefly algorithm, genetic algorithm and particle swarm optimization with four optimization test functions, and find that the parameter variance adjustment firefly algorithm can quickly find the solutions which meet the accuracy requirements of the test, while the success rate is 100%. Compared with other algorithms, it has a clear advantage and good stability. Finally, the parameter variance adjustment firefly algorithm is applied to a real backgrounds and geographical parameters of three-dimension path planning simulation experiments by constructing the objective function to calculate the energy and it meet the required path planning in the three-dimensional ocean environment, which shows the validity of the parameter variance adjustment firefly algorithm.

    • Collaborative Filtering Recommendation Algorithm Analysis and Optimization Applications

      2015, 24(5):100-105.

      Abstract (2534) HTML (0) PDF 863.12 K (4940) Comment (0) Favorites

      Abstract:The collaborative filtering recommendation algorithm is divided into user-based and item-based recommendation algorithms. Collaborative filtering recommendation algorithm had data-sparseness and scalability and cold-start problems. This paper mainly studied the collaborative filtering recommendation algorithm based on the users or Items and SVD, Slope-One, KNN. The optimization of SVD algorithm which considers the dimension of the feature space used dimension reduction to improve data-sparseness problem. Using the Hadoop distribution platform to improve the scalability problem. Experimental result shows that the similarity computation method based on Boolean data has better result and the optimization of Slope-One and SVD algorithm have better recommendation result based on MovieLens data set.

    • Generic Programming Based on O'Caml Language

      2015, 24(5):106-110.

      Abstract (1462) HTML (0) PDF 717.13 K (2271) Comment (0) Favorites

      Abstract:O'Caml is a popular functional programming language with a lot of advanced features, such as: simple module, clear grammar and semantci, etc. Generic programming which programs through the abstracting of algorithm, data structure and all other of the software components can avoid the repeated work of coding with similar functions. In order to combine the generic programming and O'Caml language which can improve the reuse of soft, we extend the grammar of O'Caml language to implement type-indexed function, the structure transition and isomorphism of type and generic function. The experimental result shows that the implementation of generic programming in O'Caml language has improved the efficiency and universality of programming.

    • E-Commerce Personalized Recommendation Algorithm Design Based on Hadoop: Taking Move Recommendations as an Example

      2015, 24(5):111-117.

      Abstract (1457) HTML (0) PDF 855.00 K (3663) Comment (0) Favorites

      Abstract:This paper implements recommendation algorithm based on Item collaborative filtering recommendation algorithm and content-based parallelization, and uses the hybrid recommendation algorithm based on these two complementary recommendation algorithm for project-related calculations, and accesses network of the projects' relationships, namely the correlation coefficient matrix of each project. Then we do the relevant test analysis to the improved algorithm.

    • Improved DV-HopLocalization Algorithm Based on Curving Fitting

      2015, 24(5):118-123.

      Abstract (1491) HTML (0) PDF 813.48 K (2554) Comment (0) Favorites

      Abstract:Aiming at relative inaccuracy in positioning accuracy of traditional DV-Hop (Distance Vector-Hop) localization algorithm, the improved DV-Hop localization algorithm based on curve fitting is proposed. The improved algorithm regards the error between the actual straight-line distance and the estimated distance as one of samples, and combines the corresponding hops to search the relationship between the hops and the corresponding distance error based on curving fitting. The results of curve fitting are employed to estimate and forecast the distance error between unknown nodes and the anchor nodes, then to correct the estimated distance and decrease the positioning error. The simulation results show that the improved DV-Hop algorithm can preferably estimate the vital distance, and significantly improve the positioning accuracy.

    • Lattice Reduction Aided V-BLAST Algorithm in LTE System

      2015, 24(5):124-128.

      Abstract (1213) HTML (0) PDF 712.61 K (2332) Comment (0) Favorites

      Abstract:LTE is the fourth generation mobile communication dominated by OFDM-MIMO technical features. Signal detection in the terminal of it needs a kind of detection algorithm with lower complexity and better performance to achieve. A lattice reduction aided algorithm is a preprocessing technique that it enables the columns of channels matrix to be approximately orthogonal. It can eliminate the interference among these Sub-channels and reduce the effect of the enhancement of noise. On the basis of ELLL, a weaker reduction criterion, called diagonal reduction with potentially lower computational cost than the ELLL, is proposed, and we further put forward a new lattice reduction aided detection algorithm which associated K-best with V-BLAST on the basis of DR. As depicted in our simulation, the performance of the algorithm which is proposed is close to that of ML with a lower computational complexity.

    • Examinee Behavior Automatic Recognition Based on ABC-SVM

      2015, 24(5):129-134.

      Abstract (1094) HTML (0) PDF 884.74 K (2149) Comment (0) Favorites

      Abstract:According to the parameter optimization of support vector machine in the examinee behavior automatic recognition, an examinee behavior automatic recognition method based on artificial bee colony algorithm optimized parameters of support vector machine is proposed in this paper. Firstly, the parameters of support vector machine are encoded into artificial bee colony nectar and examinee behavior recognition correct rate is taken as searching target, and then the parameters of support vector machine is selected by exchange and sharing of information of artificial bee colony to establish the optimal examinee behavior recognition model, finally the performance is tested by simulation experiments. The experimental results show that, the proposed method not only improves the recognition correct rate of the examinee behavior, but also accelerate recognition speed, so it can meet the real-time requirements of examinee behavior recognition.

    • Application of Ant Colony Algorithm to Power Cable Patrol Route Planning

      2015, 24(5):135-139.

      Abstract (1861) HTML (0) PDF 713.40 K (2963) Comment (0) Favorites

      Abstract:In order to improve the level of inspection efficiency, a scientific and rational inspection route planning should be designed. By analyzing the contents and the characteristics of the power cable patrol, we have established the foundation of inspection path planning model based on the VRP(Vehicle routing problem). And the ant colony algorithm can be applied to solve this issue. The experimental results show that optimization of the inspection path with this method improves the scientificity and rationality of the inspection program, meanwhile the efficiency of electric inspection department has been improved.

    • Collaborative Filtering Recommendation Algorithm Based on Cloud Model

      2015, 24(5):140-146.

      Abstract (1162) HTML (0) PDF 818.77 K (2241) Comment (0) Favorites

      Abstract:The traditional collaborative filtering recommendation algorithms face the dilemma of severe data sparsity and real time of recommendation, their recommendation quality is not obviously high. To improve recommendation efficiency, firstly, user rating items and similarity measurement method based on cloud model were researched. Then the definition of recommendation system trust constraint based on cloud model was given, and improved the constraint function of subjective trust cloud model and trust change function of trust change cloud model. Finally, a collaborative filtering recommendation algorithm based on cloud model was put forword. The experimental results show that the algorithm still obtains good recommendation efficiency on situation of user rating data sparsity compared to the traditional algorithms, it has high utility.

    • Three Cascaded Fast Front Face Detection Algorithm in Complex Background

      2015, 24(5):147-151.

      Abstract (1215) HTML (0) PDF 926.33 K (2581) Comment (0) Favorites

      Abstract:According to the problem of fast front face detection in complex background, a three cascaded fast front face detection algorithm. was proposed. At the first stage, non face regions were excluded through analysis of the maximum color connected regions using the HSV color model. During the second stage, the face areas were further accurately detected with Haar-like features and Adaboost classification algorithm. At last, an improved active shape model algorithm based on the local feature weighting (W-ASM) was proposed to match face feature points coordinates. Whether the current face image is front face can be judged by the locations of 68 feature points. The experimental results show that, this algorithm can accurately identify the front face perpendicular to the image rotating not more than ±5°. The average detection time of each image (640×480) is only 52ms, which can meet the real-time requirements.

    • Game Theory-Based Energy Balance Algorithm for Wireless Sensor Network

      2015, 24(5):152-155.

      Abstract (1126) HTML (0) PDF 677.76 K (2258) Comment (0) Favorites

      Abstract:This paper presents a novel energy balance algorithm based on Bayesian Game for wireless sensor network, which divides each data forwarding process into two game phases. In the first stage of the game, a node constructs a static Bayesian game model according to its own energy levels and strategies of other nodes involved in the game. Then the node takes the solution of the optimized expected revenue function as the routing and forwarding packets optimal decision probability. In the second game stage, the source node and the neighbor nodes build game model according to the energy level and the mutual strategies and the optimal he number of packets transmitted.

    • Strategy of PMSM Based on the Single Step Model Algorithm

      2015, 24(5):156-160.

      Abstract (1166) HTML (0) PDF 783.14 K (2792) Comment (0) Favorites

      Abstract:The working principle of permanent magnet synchronous motor (PMSM) vector control system is analyzed. For the disadvantages of traditional PI regulator, like the long regulation time and high degree of dependence on motor parameters, a strategy of single step model algorithm is used. A PMSM vector control system based on single step model algorithm is designed, and the system is simulated and analyzed. The simulation results demonstrate that the single step model algorithm control has advantages of low dependence of motor mathematical model, less influenced by uncertainties. In the dynamic process, the system has a better rapidity of dynamic response and a smaller overshoot, and has strong robustness to load disturbance.

    • Configurable & Knockdown Data Verification Method

      2015, 24(5):161-166.

      Abstract (1101) HTML (0) PDF 722.42 K (2681) Comment (0) Favorites

      Abstract:In the construction of some information system for oil&gas exploration and production, it's likely to result in irregularity of reported data types, disunity of data accuracy, inconsistency of data statistics and dissatisfaction of interrelated data items to business rules. This is mainly due to the coverage of exploration, development and engineering business, the large quantity of reported data items and data, as well as the variety of reported ways. In order to solve these problems, we summarize six verification methods including data item, column, row, cross multi-table, historical data, Singular Value, and also their combined verification methods. We also design some verification policy on cross-business and cross-time comparison and Singular value analysis, which is in accord with petroleum exploration and production industry. On this basis, we further develop encapsulated technology of configuration and maintenance. It promotes the implementation efficiency of verification method.

    • Augmented Reality Registration Algorithm Based on Android System

      2015, 24(5):167-171.

      Abstract (1745) HTML (0) PDF 1.36 M (2965) Comment (0) Favorites

      Abstract:In order to obtain more ideal effect of the augmented reality, this paper puts forward an augmented reality algorithm based on Android platform. Firstly, the feature positions in the two image corner points are determined by using FAST algorithm, and SURF is used to generate feature descriptor, and then the fast approximate proximal point search algorithm is used to match, finally, implemented in the Android platform and the performance is test by simulation experiment. The simulation results show that, the proposed algorithm has the advantages of Android and can meet the augmented reality real-time requirements, but also has good robustness, overcomes the limitation of traditional augmented reality technology.

    • Research and Application of Petroleum Exploration and Development Domain-Specific Ontology Construction

      2015, 24(5):172-176.

      Abstract (1158) HTML (0) PDF 777.80 K (2897) Comment (0) Favorites

      Abstract:The domain-specific ontology is an important part of Knowledge engineering. Domain-specific ontology is an important technical knowledge representation, and support technology. This paper introduces the theory and method of constructing Petroleum exploration and development Domain-specific ontology, proposed a three-dimensional model of Petroleum exploration and development from the subject domain, knowledge domain, ontology domain.Based on the model developed ontology construction software to achieve management and application in Petroleum exploration and development domain.

    • Secure Access Control for SQLite3 Based on RBAC and Multi-Level Roles

      2015, 24(5):177-182.

      Abstract (1220) HTML (0) PDF 1.23 M (2739) Comment (0) Favorites

      Abstract:SQLite3 is an embedded database but lack of complete secure access control mechanism. To solve this problem, this paper first designs a multi-level role function, then makes an analysis of the specific methods and steps of the access control mechanism for SQLite3 based on the RBAC model and combined with the source code of the SQLite3 database. Finally, it makes a detailed design and implementation of this access control mechanism for SQLite3. It is indicated by the experimental tests that the new secure access control mechanism not only succeeds the original advantages of SQLite3, but also improves the security of SQLite3.

    • Well Completion Business Data Synchronization Model Research Based on Operation Log

      2015, 24(5):183-187.

      Abstract (1312) HTML (0) PDF 671.13 K (2260) Comment (0) Favorites

      Abstract:Synchronization technology is one of the key techniques to promote the performance of mobile database systems. This paper which relied on the well completion mobile platform and integrated the well completion business data proposed a mobile data synchronization model which is based on operation log. In this model, the generation of log sequences, and the resolution of conflicts are discussed in detail, and the implementation algorithm is proposed. In this model, mobile devices are allowed to access the local copy data and locally commit the mobile transactions when the system is disconnected, meanwhile the user behavior can also be recorded in the mobile transaction log. According to the log sequence which is returned by the synchronous server, the mobile devices can update the local data when the system is reconnected to ensure the consistency of data. Besides, by introducing the merger of log and time-stamp into the model, the model can reduce the resource consumption, and improve the efficiency of the synchronization. The experiments proved that the algorithm can exchange the well completion business data between mobile devices and synchronization server rapidly and efficiently.

    • Analysis of High-Speed Trains Passing Each Other in the Open Air Based on Overset Mesh

      2015, 24(5):188-192.

      Abstract (1857) HTML (0) PDF 769.70 K (2599) Comment (0) Favorites

      Abstract:The transient pressure waves and pneumatic force of high-speed trains passing each other in the open air will adversely affect the safety of train operation. Using the numerical method of three-dimensional, unsteady, compressible fluid control equation and two-equation turbulence model unsteady, compressible fluid control equation and two-equation turbulence model, the pressure changed for 300km/h high-speed rains passing each other in the open air based on overset mesh. The results show that the method of overset mesh can solve the problem of the pressure wave changed for the high-speed trains passing each other, and the grid transmission accurate between master zone and salve zone. There are 70m away from the high-speed trains, when the high-speed trains start rendezvous in 0.42s, the pressure wave “head waves” of front nose is appearing, the pressure of the front nose is maximum. The front of the train traveling through the rear of the train in 0.95s, two cars vertical coincidence, making a “trail wave”.

    • Sentence Similarity Computing Based on Abstract Knowledge Model

      2015, 24(5):193-197.

      Abstract (1212) HTML (0) PDF 847.64 K (2031) Comment (0) Favorites

      Abstract:User consultation questions are carefully analyzed and the new calculate of the text similarity model are pointed out—Abstract Knowledge Model. Using this model, the user's problem is decomposed into two parts: the Key-words and the Abstract Knowledge. Thus, the text similarity computing of user consult is transformed into Key-words and Abstract Knowledge similarity calculation. In addition, the paper has been improved the algorithm of the text similarity calculate in the past. Experimental results show that the proposed Abstract Knowledge Model plays a greatly role in text similarity calculation accuracy and the results closer to human judgment results.

    • Application of Wavelet Neural Network in Educational Grid Downlink Traffic Prediction

      2015, 24(5):198-204.

      Abstract (1157) HTML (0) PDF 1.65 M (2227) Comment (0) Favorites

      Abstract:Accurate predicted the downlink traffic contributes to traffic load balancing and information security management in educational resources grid. Wavelet neural network is suitable for modeling and nonlinear prediction in grid downlink traffic which has the randomness and uncertainty characteristic. General wavelet neural network prediction model had some defects such as convergence slower, larger error and poor stability. In order to eliminate or improve the existing defects, a momentum was added in the scheme which was used to adjust the network weights and parameters based on gradient descent algorithm, meanwhile, an improved algorithm with random sample replacement mechanism in temporarily prediction results was proposed. Experimental results show that the proposed algorithm can reduce the convergence time in network training and improve the prediction accuracy and stability.

    • Visual Control of Vega Observer Under the MFC Framework

      2015, 24(5):205-209.

      Abstract (1580) HTML (0) PDF 793.52 K (2562) Comment (0) Favorites

      Abstract:In a wide range of visual simulation battlefield environment, the motion state of simulation entities are complicated and changeable. In order to solve this visual simulation of fidelity problems, this paper analyzes the geometry correspondence relationship between the observer and the target, gives three control modes: equidistant mode, uniform speed mode, uniform acceleration mode, the basic algorithm of observer controlling in virtual scene is designed. Under the MFC framework, applying of Vega API function achieves the C language calling Vega visual simulation platform, achieving the observer servo control method for the target, solving the problem of observer automatic controlling in visual simulation system. In the visual simulation experiments, a flexible controlling to viewpoint way is achieved, with a strong practical intuitive property, while enhancing the realism and interactivity of viewpoints.

    • Forest Fire Detection System Based on Wireless Sensor Network and the Energy Saving Algorithm

      2015, 24(5):210-214.

      Abstract (1279) HTML (0) PDF 799.13 K (2372) Comment (0) Favorites

      Abstract:This paper designs a forest fire detection system based on wireless sensor network. The hardware and software circuit were designed, as well as the system architecture of sensor network was described also. Meanwhile, because of the wireless sensor networks' energy constrained, energy-saving algorithm was proposed based on grid theory in this paper. The algorithm calculates the center point instead of original four surrounding nodes and the complexity is reduced. The simulation results show that the degree of error between the calculated coverage and actual coverage is less than 11%, verify the effectiveness of the algorithm.

    • Bearing Fault Diagnosis Based on CV-GA-SVM Approach

      2015, 24(5):215-219.

      Abstract (1311) HTML (0) PDF 894.81 K (2373) Comment (0) Favorites

      Abstract:In order to effectively extract the fault characteristic signal of bearing and accurate classification, this paper uses the method of introducing the cross validation of genetic algorithm and support vector machine in combination with wavelet packet transformation, to identify the fault bearing issued by the unstable characteristic signal and diagnosis.Firstly, the fault signals of instantaneous changes using wavelet packet transform time-frequency characteristics are extracted. Then, using cross validation of genetic algorithm and support vector machine classifiers are built detection, optimization and fault pattern recognition of parameters. Finally, through the experiment to verify the rationality. The experimental results show that this method has real-time, high accuracy and reliability for the detection and classification of the finite sample fault signal.

    • Smart Books Based on Domain Ontology and Context-awareness

      2015, 24(5):220-226.

      Abstract (2050) HTML (0) PDF 810.60 K (1993) Comment (0) Favorites

      Abstract:With the all-around popularization and development of Internet, Web has become the main platform of all kinds of network information. However, tremendous information which is increased by exponent makes the valuable knowledge submerge into the information sea. Users find it more difficult to research, visit, learn and maintain information. According to this circumstance, this paper has built a smart books model based on domain ontology and context-awareness computing. Based on the field characteristics and sharing requirement of domain knowledge, ontology is selected as knowledge representation method, meet the needs of users in domain ontology modeling procedure. Context-awareness computing model are used to support the smart books model and its implementation process are proposed.

    • Optimized Fractional Soft Handover Scheme for LTE-Advanced System

      2015, 24(5):227-231.

      Abstract (1254) HTML (0) PDF 730.15 K (2419) Comment (0) Favorites

      Abstract:Radio resource management is important aspect to investigate as part of the LTE-Advanced study.And FSHO is an important handover scheme in LTE-A. FSHO sorts the service to VoIP service and non-VoIP service. Non-VoIP service are transmitted by source eNodeB or target eNodeB. VoIP services are transmitted from both source eNodeB and target eNodeB. Compared to hard handover, FSHO increases the time delay and outage probability. In this paper, we propose an optimized fractional soft handover scheme based on FSHO. The main idea is to Multi-carrier Handover Method for VoIP. The theoretical analysis and simulation results show that the optimized proposed fractional soft handover not only attains the lowest handover outage probability but also improve the reliability of VoIP service.

    • Optimization of University E-mail System Management

      2015, 24(5):232-236.

      Abstract (4184) HTML (0) PDF 895.62 K (3480) Comment (0) Favorites

      Abstract:The paper studies on the optimal management of South China Normal University E-mail system. The current campus E-mail system is introduced, including system and network deployment, reception and dispatch processes. The operation and security problems of E-mail system are analyzed, including the school mailbox and the mailbox communication abroad poor, signaling mechanism exists security vulnerabilities. Finally, from the aspects of registered reverse domain name and optimization of signaling mechanism, the overall optimization scheme and implementation steps of mail system are given. Studies have shown that optimal management of South China Normal University E-mail system, not only solved the problem of system operation and safety, enhance the user experience, but also brought convenience to administrators of maintenance and management. It has a certain reference value in college E-mail system management applications.

    • Image Preprocessing Technology Based on Improved Median Filter

      2015, 24(5):237-240.

      Abstract (1333) HTML (0) PDF 794.47 K (3287) Comment (0) Favorites

      Abstract:The development of image real-time processing system has brought a good platform of the widespread use of FPGA. Aiming at the problem that traditional median filter algorithm cannot process collected images quickly and efficiently, this paper adopts improved median filter and makes use of advantages, such as fast running speed, parallel running of inner program, to design an image preprocessing system with high real time ability and high flexibility. Using the features of median filter and Verilog hardware description language to code. And then realize simulation in Quartus II and Modelsim. At last, compared with MATLAB median filter simulation figure and multilevel median filter, it has shown that using FPGA to process and improve median filter can not only conduct median filter to images successfully, but also has the ability of fast operation speed and low energy consumption.

    • Design and Simulation of 13.56 MHz RFID Reader Antenna with Area Limited

      2015, 24(5):241-244.

      Abstract (1654) HTML (0) PDF 1.29 M (5667) Comment (0) Favorites

      Abstract:In a real environment, the products have certain restrictions on the size of antennae; as a result, there has the reference value in the research of antenna's magnetic field strength with area limited. This paper briefly introduces the basic working principle of the RFID system, and uses the 3D electromagnetic simulation software Ansoft HFSS and MATLAB software to make a comparison of magnetic field strength between different designs which have different track widths, track clearances and coil loops with area limited. Trying to find out specific parameters of a loop antenna with area limited that has a good magnetic field strength. This has some reference value for the design of the PCB plane antenna in 13.56MHz RFID reader systems.

    • Video Conferencing Client Information Management System

      2015, 24(5):245-248.

      Abstract (1266) HTML (0) PDF 665.95 K (2238) Comment (0) Favorites

      Abstract:For the purpose of having an efficient management platform for enterprises communication, the paper designs a video conferencing client information management system. Firstly, this paper makes a summary description on video conferencing system architecture. Then it comprehensively analyzes the requirements of the system with modules division. Last it analyzes critical technologies of the system such as multipoint control unit, computer supported cooperative work, whiteboard design, multiple screen display method.

    • Moving Vehicle Detection Based on Improved SUSAN Algorithm

      2015, 24(5):249-252.

      Abstract (1251) HTML (0) PDF 407.49 K (2381) Comment (0) Favorites

      Abstract:Focused on the intelligent vehicle safety issues under complex traffic environment, this paper presents an algorithm based on an improved SUSAN edge detection to extract the vehicle boundary characteristics. First, we introduce the principle of SUSAN edge detection operator, then present an improved SUSAN edge detection what treats crude extract of pixels and uses an adaptive threshold selection method for the candidate of edge detection to extract the edge. The experimental results indicate that the algorithm can identify in front of the vehicle in the complex image, have higher accuracy.

    • Page Storage Method of Inverted File

      2015, 24(5):253-256.

      Abstract (1275) HTML (0) PDF 611.04 K (2207) Comment (0) Favorites

      Abstract:Page is the basic unit of data exchange between disk and memory, in operating systems, database management systems, and inverted file's data organization, it occupies a very important position. To reduce the inverted index's disk I/O read and write overhead, proposing a method that the inverted file storages by pages, and achieving to read and write files by page. This method mainly contains three parts, including disk I/O layer design, page manager design, and heap file manager design, achieving variable page size's data file management using block, supporting for the fixed-length records, variable-length records storage assembly in the page and super long data record's cross-page storage. The experimental test results show that the method is effective, and it can be applied to actual vertical search engine.

    • Enhanced Security Scheme of Kerberos Protocol Based on Hybrid Cryptosystem

      2015, 24(5):257-260.

      Abstract (1266) HTML (0) PDF 599.48 K (2476) Comment (0) Favorites

      Abstract:Aiming at the vulnerability and security problem of Kerberos protocol, an enhanced scheme of Kerberos protocol based on hybrid cryptosystem is put forward. The aims of the improved scheme are able to defend the password attacks and the insider threads. Public keys and private keys are assigned to the application servers and the AS server, the session key between user and application server is generated by DH key exchanged algorithm. The improved Kerberos protocol is given by six steps and the security is analyzed. Analysis shows that the new scheme can enhance the security of Kerberos and is more efficient than Public key encryption mechanism.

    • Continuous Integration Based Study on Automated Testing for Android Platform

      2015, 24(5):261-266.

      Abstract (1477) HTML (0) PDF 2.36 M (3408) Comment (0) Favorites

      Abstract:Research on Android test mostly focused on the realization of the testing tools and frameworks, some tools and frameworks can realize automatic test case generation and test scripts execution. However, during software development, test requires human start, thus can't guarantee the quality of new or modified code timely and effectively. Based on Robotium framework, this paper researched continuous integration solution, including the code under test and the test code hosting, version controlling, building the application and test automatically, finally realized the Android automation test platform. With the test platform, the code updates can be test automatically in time, the quality of the Android applications can be intuitive and controllable.

    • Detection Abnormal Degree in Real-Time Vehicle Based on Information Fusion

      2015, 24(5):267-271.

      Abstract (1350) HTML (0) PDF 824.34 K (2364) Comment (0) Favorites

      Abstract:This paper utilizes the GA-FNN algorithms to extract the unusual problems in real-time vehicle monitoring. GA algorithm has the features of searching the global information, thus in this way a new approach is given to select the effective sensor information, and use it as the input of fuzzy neural network. The fuzzy matrix trained by fuzzy neural network can detect the degree of abnormal through real-time operation of the vehicle. The simulation examples demonstrate the validity of the application of the GA-FNN, the abnormal degree can be detected quickly.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063