2015, 24(7):1-8.
Abstract:With the rapid development of computer hardware performance and virtualization technology, server virtualization technology is being used increasingly to reduce the integration cost of information center room or improve hardware utilization. However, how to choose the best server hardware to build high performance and low cost virtualization platform, especially on performance evaluation is one of the urgent problems. This paper briefly introduces four kinds evaluation methods of virtual server. Through the analysis and comparison between different methods, it assess the advantages or disadvantages of evaluation methods and its application environment. Based on the analysis above, it puts forward reference suggestions for better deploying server virtualization system.
JIA Jun-Ying , WANG Yue-Peng , WANG Shao-Hua
2015, 24(7):9-14.
Abstract:With the development and popularity of the mobile Internet and intelligent terminal, Instant Messaging once again become a hot field. However. Due to limitations of the mobile terminal device in a low power, low bandwidth and other aspects, it calls for higher requirements on Instant Messaging protocol. MQTT(Message Queuing Telemetry Transport) was designed as an extremely lightweight publish/subscribe messaging transport, and it is ideal for mobile applications. This paper introduced the basic content and features of MQTT, and gave a comparison with other instant messaging protocols such as SIMPLE and XMPP, then proposed a instant messaging solution of mobile terminal based on MQTT. Based on open source MQTT Broker Mosquitto, this paper also designed and implemented a instant messaging client for mobile terminal, and this client achieved instant message,presence,group functions and so on.
YAO Ping-Ping , ZOU Dong-Sheng , NIU Bao-Jun
2015, 24(7):15-21.
Abstract:Collaborative filter algorithm is one of the most widely used technologies of personalized recommendation. However, the existing recommendation algorithms only consider the user item rating matrix specific value while calculating the target user neighbor. User preferences and user ratings and the relationship between the project properties are ignored. Moreover, the accuracy also needs to be further improved. To solve this problem, this paper proposed a new collaborative filtering algorithm based on user preferences and project properties (UPPPCF). By using the traditional user project evaluation matrix, the algorithm synthesizes user preferences and the project properties. The project score matrix is changed into project properties score matrix based on user preference. Then the nearest neighbors of target user sets are computed according to this new score matrix. As a result, the proposed algorithm overcomes the insufficiency of existing similarity calculation methods, which only depend on user ratings value. Meanwhile, an effective measurement method for predictor decision is suggested in this paper. The experimental results on MovieLen datasets show that the proposed algorithm can effectively improve the existing traditional collaborative filtering. In addition, the recommendation accuracy has been significantly improved.
DU Xin-Yu , CHEN Li-Fang , LIU Yuan
2015, 24(7):22-28.
Abstract:A method of color image fusion is proposed based on block information entropy, concerning the spatial resolution reduction of the original artwork during the fusion process with the traditional image fusion method. The developed method generates new fusion image by blocking images, calculating the information entropy of the blocked image on the luminance component I in color space IHS, and fusing the pivot element of the corresponding block whose information entropy is more. The experiment suggests that the method proposed in this thesis is better capable of planning scenic detailed information as a whole, compared to the traditional color image fusion method. In addition, it performs exceptionally in many aspects including information entropy and average gradient. Therefore, it is indeed of some practical value.
XU Ting , CHENG Jian , XU Yi-Chun
2015, 24(7):29-34.
Abstract:In order to achieve efficient management and take full advantage of the information produced by products in the period of usage maintenance and the ends, the concept and architecture of closed-loop product lifecycle management is introduced briefly. Based on that, plasma system is taken as a specific application example. The product life cycle information flow model is summed. The C-L PLM software for intelligent products is designed and realized. At last, an application is taken as an example, displaying the running state information of the key components of the probe measuring equipment.
2015, 24(7):35-40.
Abstract:At present, the distributed computing, parallel computing and memory computing are key technologies and research spots of improving performance. In Big Data scene, the computing performance of data statistics and analysis system degrades so noticeably that it cannot satisfy user demand. To deal with the problem, this paper provides the Objectification Parallel computing Architecture. Based on the architecture, we develop the system which includes the Object Server Component, Object Manager Component and Client Proxy component. The system is applied to the Electric Asset Quality Supervision Manage System (EAQSMS) of State Grid of China. The result shows that the statistics performance of system index is improved dramatically.
CAO Zhan-Feng , LIU Hai-Tao , ZHANG Qi-Wei
2015, 24(7):41-45.
Abstract:Statistics work is the fundamental to achieve the enterprise information. With the increase of the requirement to statistics work, technology reformation of statistics is faced with the big challenge. In this paper, it is in allusion to the problem which is not satisfied by client in electric power statistics process to transform, with uniform data platform as centre. The statistics information management system is established which is combined with business intelligence and data statistics. In this system, it can unify data storage and standardize index management. Through the user interface, it can accomplish operation, like forms report, data examination and application analysis. It is proved availability of this research result with this system coming into service to statistics work that work pressure is lightened, work efficiency and quality is enhanced.
LI Yao-Fang , PENG Hui-Qing , LI Bao-Qing , NIE Ju-Ke
2015, 24(7):46-50.
Abstract:This paper implements a lightweight workflow engine system which is flexible and can be configured. The system uses tools of JaWE for visual modeling, then it generats XPDL format process definition file. It designs an engine executive mechanism based on Token, which makes the control of engine system with the business process implementation more accurate and efficient. It adopts appropriate process definition management strategy that gives the modification definition support during process operation. At the same time, the engine forms business system by using the way based on components configuration, which makes application engine business system have great flexibility. The engine system has been successfully applied in a pharmaceutical enterprise project management platform, and has obtained a good application effect.
XIE Bao-Chuan , FAN Yi-Sheng , ZENG Ming , LI Xue-Qing , CHEN Lei
2015, 24(7):51-56.
Abstract:The function of flight-refuel training simulator was proposed for requirement of flight-refuel training. The architecture of simulator was designed. The implement of simulator components were explained, which include simulation cabin, flight simulating, umbrella movement, movement platform, signal collecting control, manipulating loading, visual sign, instruction console, computing net and sound communication. The combination of object and picture was adopted in the simulator. The sense of arriving area is strong and the effect is vivid in the process of through the umbrella. The simulation training helped the flight of fighter plane, so a better apprise was given by training aviator. The simulator can improve the simulation training and promote the fighting capacity.
2015, 24(7):57-62.
Abstract:A kind of modern agricultural data acquisition system based on STM32 and 3rd Generation (3G) was introduced in this paper. The system could achieve the long-distance agricultural field for unattended monitoring, the collection of temperature, humidity, light intensity and other aspects data. By using the nRF24l01 wireless network was connected to a temperature and humidity sensor DHT11 and BH1750FVI light sensor. The data collected by nodes were transmitted to the control center. The RT-Thread embedded operating system was the software platform, which used light TCP/IP protocol stack LwIP Point to Point Protocol (PPP) dial of 3G module MC509 to connect to the Internet. It could carry out remote monitoring and management of the farm by the use of mobile phone Application (APP) or computer environment when the data was transmitted to the LEWEI Internet. Experiments showed that the system was stable. This paper provided a solution for wireless remote data monitoring. It had positive significance to improve agricultural management benefit.
2015, 24(7):63-68.
Abstract:It is difficult to analyze students' score because of lacking recorded data, which will cause high costs in practical hands-on training of education. To address this problem, an intelligent tutoring system based on wireless sensor networks with ZigBee is designed. Firstly, nodes of WSN based on embedded operating system TinyOS are designed. Then, collector and coordinator are designed. Finally, experiments are done on 80 students with designed system in this paper. Experimental and analysis results show that a learning environment where wireless sensor networks provide a significant degree of support during laboratory sessions, student performance had significantly improved, and this has been proven evidently for the students in the low-achievement group when being compared to the results delivered by the students in the high-achievement group.
LI Cong , YE Meng , JIANG Zhou , GAO Ming
2015, 24(7):69-73.
Abstract:Rainbow table is the most commonly used tool in password cracking field. Rainbow table constructed by CPU occupies huge memory space and time, which is the biggest problem in rainbow table application. This paper concentrates on the research of the bottleneck problems of rainbow table: search time, construction time and memory space. By building a model of rainbow table parameters and time-space to analyze parameter values that can be used in application, high speed GPU was adopted to optimize construction method of rainbow table. A rainbow table password attacking system based on distributed GPU was designed and realized, including cipher extraction module, cipher distribution module, GPU managing module and rainbow table module. Test results in actual password attacking system show that the method can effectively develop password cracking efficiency, reduce rainbow table utilization of space and time and increase actual password length that rainbow table can attack.
ZHANG Guo-Ping , ZHENG Jun-Hui , LI Ya-Li
2015, 24(7):74-78.
Abstract:For the convenience that the patient is not restricted to time and space to get the health care knowledge, this paper uses the technology based on J2ME and J2EE, designs and develops a mobile medical consultation system. The mobile client of the system can realize the functions of login for registered users, query for drugs, symptoms and disease, deployment for comments and announcement. The WEB server can manage the information of user, medical, disease, announcements and comment. The system can realize the maximization sharing of medical knowledge, and to a certain extent, alleviate the pressure of the difficult medical treatment and nervous medical resources. Experimental results show that the system has the advantages of simple operation, strong portability, fast loading speed and less resource-intensive, and thus reaching the design requirements.
ZHANG Zhi-Jun , CAO Xiu-Shuang
2015, 24(7):79-82.
Abstract:Roller system management is related to the iron and steel company production efficiency. Establishing roller management information system could not only give a good guidance of an economic and reasonable way of using the rolls in the plant, in which the roller system management is regulated horizontally and vertically in the company, it could also waste the complicated and cumbersome manual recording and reduce the roller system failure rate and miss-operating and improve products quality. The system adopts the Asp language and combines Sqlserver 2008 powerful database system. Using LAN connects IE browser to operate, and realizes the management of tracking roll status, inventory and roll consumption, the detection of the roll system, scrap, exchange, inspection and fault searching. Recording to the historical trends, generates reports and prints and exports Excel files using Flash curve. Finally, it realizes the whole process network and whole life management of the rolls.
2015, 24(7):83-87.
Abstract:This article proposes an automated test framework for MVC GUI module, based on Robot Framework. The GUI automation test framework is divided into four aspects: user interface function testing, information set function testing, information query function testing, and special items testing. The whole framework, making the GUI test and the Database test combined together, fully completes the coverage of GUI automation test. According to different system environment, by writing Python scripts, the underlying data can be flexibly called. The combination of black-box and white-box test makes the tester quickly focus the code defect, and guarantees the correctness and completeness of the development program effectively. At the same time, the applicability of this test framework has been verified, as OpenWRT LuCI module specifically addressed.
CHEN Yan-Sheng , ZHANG Zan-Bo , REN Jiang-Tao
2015, 24(7):88-92.
Abstract:In case of limited resources, FTP service resource sharing platform cannot afford the rapid growth of visits, data capacity and network traffic required for computing needs with single server. This paper adopts a minimum connection scheduling policy design, achieves improved minimum link load balancing scheduling algorithm and evaluates the performance of the transmission speed, loading users number and disk read speed and other aspects in the redundant resource sharing platform of scheduling server designed by increasing the backup scheduling servers. The results shows that the performance of the resource sharing platform designed in this paper has significantly improved, which has practical significance in promoting the technology of building efficient resource sharing platform under conditions of limited resources.
2015, 24(7):93-98.
Abstract:Ontology mapping is the key technology to solve the heterogeneous problem among ontology, and concept similarity computation is a crucial step in ontology mapping process. In view of the problems existed in ontology mapping, an improved multi-strategy ontology mapping model is proposed. The most related concepts are filtered based on similarity of concept names. Then we calculate concept similarity by combining property-based similarity, structure-based similarity and instance-based similarity. Finally, we use the test set called benchmark provided by OAEI to test the performance of our mapping algorithm. The experimental results show that this method improves the recall and precision of ontology mapping while maintaining mapping efficiency and currency.
YANG Shu , WANG Ye , WU Erkexi , YOU Xiang-Ru
2015, 24(7):99-103.
Abstract:Software cost estimation technology has become an important measure of software project management aspects of the control software schedule, reducing software risks and ensure software quality. In this paper, we use the model of C&S-PSO and weighted analogy estimates characteristic attributes to the weights. According to both MMRE and Pred (0.25) standards, we compare un-weighted analogy model, SRV, FNN and CART to estimate accuracy. Additionally, we use the non-parametric bootstrap method for raw data sampling, analysis PSO weighted analogy estimation model of stability. The results show that from the view of estimation accuracy the model of PSO has higher precision in weighted analogy estimates, and the model has also better stability.
LIN Chuan-Luan , PAN Ri-Jing , CHEN Qing , HUANG Li-Qin
2015, 24(7):104-110.
Abstract:A new scheme for constructing a Catmull-Clark subdivision surface with shape control is proposed, which interpolates the local vertices of a quadrilateral mesh with arbitrary topology. Firstly, utilizing the local property of the progressive iterative approximation method, this subdivision scheme chooses a subset of the vertices on the control mesh to be adjusted and remains the others unchanged in the iterative process, it results the limit surface of the subdivision interoplates the corresponding subset of the vertices on the initial mesh. Secondly, the shape control for Catmull-Clark subdivision in the proposed scheme is based on a two-phase subdivision. The two-phase scheme works by applying a modified Catmull-Clark subdivision for the initial mesh to generate a new mesh firstly, and then applying the regular Catmull-Clark subdivision for the new mesh to resulting the limit surface. The modified subdivision scheme carries a parameter for each face of the initial mesh, and these parameters provide the degrees of freedom for the shape control of the interpolating subdivision surface. It is proven that the scheme based on Catmull-Clark subdivision with shape control is convergent. The experimental examples are given to show that the method is effective both in local progressive interpolation and shape control.
2015, 24(7):111-116.
Abstract:In view of the problem of recognition for the value of LCD meter under the industrial field with complex background, an algorithm based on ACSS corner localization is proposed. Firstly, according to the principle of ACSS corner detection, a method which can be suitable to detect vertices of the value area is designed to locate the area. Secondly, the gradation characteristics of the display value is used to determine the area of the string, the local threshold is used to binary the string and then split the string. Finally, three-line scanning method is used to identify the character. Experimental results for heat meter prove the robustness and adaptability of the proposed algorithm.
2015, 24(7):117-121.
Abstract:The main drawback of support vector machine (SVM) algorithm is that it needs large memory and long training time while handling large training data set. In order to speed up the training and improve classification accuracy, this paper proposes a binary classification model, which fuses the Bagging, SVM and Adaboost algorithm. And a kind of denoising algorithm is proposed. Contrast SVM, the SVM-Adaboost and classification model proposed in this paper by experiment. With the expanding of training data, this classification model has improved training speed significantly under the premise of improving accuracy.
JIA Jun-Ying , WANG Shao-Hua , WANG Yue-Peng
2015, 24(7):122-127.
Abstract:The default distributed address assignment mechanism (DAAM) of ZigBee protocol exits orphan problem without a good solution. This paper presents a mechanism called agent based address assignment mechanism (ABAAM) which can effectively reduce the orphan problem caused by the network preset parameters and nodes position. When one node cannot join the network, it selects one route node in the neighbor table as an agent and joins the network; the tree routing protocol is also improved to be compatible with the current allocation algorithm. Theoretical analysis and simulation show that the proposed algorithm has a better performance in the success rate than the default DAAM algorithm.
2015, 24(7):128-131.
Abstract:The existing search engine of massive data takes up large memory, needs much time and provides results of great duplication rate. To overcome these disadvantages, this paper proposes a duplication removal method based on the Rabin Fingerprint method, which cannot only remove the duplicated URL, but also remove the same even similar website content on different URL so that it can speed up the searching speed, save the memory capability and improve the accuracy of the research.
2015, 24(7):132-136.
Abstract:The basic theories of cuckoo search (CS) and Hopfield Neural Network (HNN) are introduced, and the application of Hopfield Network in the digit recognition is researched. Aiming at the problem that Hopfield Neural Network can easily fall into local minimum, a new method that Hopfield network combines CS is presented. The method uses the global search capability of CS for complex, multimodal, nonlinear and non-differentiable functions to make Hopfield network keep a higher success rate even if noise-to-Signal ratio is high, and a simulation was carried out. Experiment results show that this method has a better performance.
2015, 24(7):137-141.
Abstract:This paper analyzes the “distance method” that is an algorithm of language features and points out the questions of “distance method”: “Breakpoint” that be used cut into two sets will affect the accuracy of calculation. It designs a new algorithm named “clustering method” with the idea of clustering analysis. The defects of two methods can complement each other and should be used together in practical application.
2015, 24(7):142-148.
Abstract:Generally speaking, time-series data can be divided into three ingredients such as trend, random and season. Analyzing and modeling through the available time-series data, change law can find things contained. A kind of high precision data fitting method was designed for multiple periodic time-series data. Firstly, the algorithm eliminated random component of fitted time-series data. Secondly, several co-primed basic cycles were analyzed by the application of the theory of autocorrelation function. Finally, multiple periodic time-series data was fitting by using multiple sets of Fourier series based on the least squares principle. Practical application proved the effectiveness and progressiveness of the algorithm.
XIAO Ben-Hai , ZHENG Ying-Na , LONG Jian-Ming , GUO Pan-Pan
2015, 24(7):149-154.
Abstract:With the QR code technology being widely applied in electronic ticketing, bank checks, E-commerce and other fields, many safety problems have emerged, such as information leakage and data tampering. Based on Visual Studio 2008 c platform, the method with Rijndael random variable and random keys secondary Rijndael encryption protection is proposed using Rijndael encryption and SHA512 digital signature technology. This paper presents a novel design of information security before generating QR code. The encryption principle, algorithm and implementation, safety performance of the proposed method are discussed. Also corresponding testing and analysis are provided to verify the feasibility of the proposed algorithm. Results have proved that the information safety performance of QR code is greatly increased with the encryption algorithm, the efficient management and the multiple- protection to a key. This just causes a smaller increase in the content of the encryption data than those of the raw data.
2015, 24(7):155-158.
Abstract:A common method of word similarity computing is based on a semantic dictionary. This paper introduces the “HowNet” in the basic concepts and hierarchical architecture, drawing lessons from Liu Qun, Li Sujian basic theory in word similarity. It makes use of “HowNet” sememe hierarchical architecture to calculate sememe similarity, then calculates the similarity of the concept, and finally gets the similarity of the words. This paper also makes appropriate adjustment to the computing method, so that the calculated results can be more in line with the actual situation.
WEN Xiao-Qian , HUANG Fa-Liang , LI Chao-Xiong , WANG Yan
2015, 24(7):159-164.
Abstract:Cluster analysis is an important task of data mining, however, traditional biogeography-based optimization algorithm with limitations such as prematurity and poor convergence can not satisfy the demands of solving the NP (Non-deterministic Polynomial) clustering problem. A novel algorithm Mixed Biogeography-Based Optimization (MBBO) is proposed. The algorithm integrates a new migration operator, which is constructed on gradient descent local search, and uses clustering validity index as the individual fitness to optimize implicit cluster structures in datasets. Experimental results on the four benchmark datasets (Iris, Wine, Glass and Diabetes) show that MBBO algorithm outperforms the traditional optimization algorithms such as PSO, BBO, and K-means in terms of clustering validity and convergence, and can acquire the higher quality cluster structures of the datasets.
TIAN Wen-Bo , XU Hong-Zhen , LU Qun-Le
2015, 24(7):165-168.
Abstract:The reliability of search results is an important index affecting the majority of Internet users use search engines. TS algorithm is proposed based on the open source OPIC algorithm. The algorithm is based on improved indexing attribute and to create two properties includes Webpage creation time and Webpage depth added to TS algorithm to realize the diversification Webpage score. This can improve the disadvantages of the OPIC algorithm emphasis on the history of the page, to make the search results more reasonable. Finally, it is proved by experiments that the result of TS algorithm is more reliable.
2015, 24(7):169-174.
Abstract:With the rapid development of cloud computing, the number of book services based on SaaS will grow rapidly, which makes it difficult for users to decide in personalized services selection. By establishing preference tree, we have constructed user model and service model of book services based on cloud computing technology in triple-play. In order to solve the recommendation problem, an algorithm of service selection is designed. The analysis and experiment show that the algorithm can achieve service selection according to user preferences.
SHEN Yong-Zeng , ZHANG Po , ZHANG Bin-Qi , PENG Shu-Yan
2015, 24(7):175-179.
Abstract:The fixed BP (Back-Propagation) neural network structure can hardly play to its advantage when the input information become complicated and variable. So the decision- making algorithm is proposed, which combines information fusion with BP neural network. That is, using Dempster-Shafer(D-S) evidence theory to select the structure of BP neural network according to the changing input information. Simultaneously, the initial values are optimized by the Particle Swarm Optimization (PSO) algorithm to improve the problem of BP Neural Network's easily trapping into the local minimum and slow convergence rate. The simulation result shows that through the optimization of combined information fusion with BP neural network, the training time and prediction accuracy are more effective than that only using BP neural network, which has certain advantage of adapting to the complex and varied input information.
2015, 24(7):180-184.
Abstract:The classical rough set theory is not directly to deal with incomplete information system, therefore, the rough set model of tolerance relation, non-symmetric similarity relation, limited tolerance relation, limited non-symmetric similarity relation and limited non-symmetric similarity relation model based on object difference degree have been proposed. Through the analysis of the advantage and disadvantage of these models, the new definition of the degree difference between objects, it puts forward a new extension of rough set which is limited tolerance relation model based on degree of difference between objects, the results show that the proposed model more accurate, more practical.
XU Lan-Jing , LI Shan , YAN Zhao
2015, 24(7):185-189.
Abstract:Information overload problem in recent years makes the personalized recommendation technology arise, the collaborative filtering recommendation technology by establishing contacted between the user and the information has been widely used in every field of e-commerce. And in the field of the college entrance examination voluntary students also have the “information overload” problem, which means they cannot choose the suitable college from many colleges efficiently. Therefore, the idea of collaborative filtering is applied to this new field, take the students as users and colleges as the items in the recommendation system. By analysing students' voluntary reporting relevant data from the previous year, three processes of building user attributes matrix, finding the neighbor users and generating recommendation are described in detail. The recommendations results of the experiment show the effectiveness of recommendations systems, and it lays the foundation for further research work.
LI Ping , CUI Chao-Yuan , LI Yong-Gang
2015, 24(7):190-194.
Abstract:The virtualization technology is one of the key technologies of the cloud computing. Meanwhile, monitoring virtual machine is an important function on the virtualization platform. In order to obtain the internal information of the virtual machine better, a lightweight virtual machine kernel module detection method (KMDM) is designed and implemented on the virtualization environment of Xen. The KMDM resides in the host machine and uses the virtual machine introspection mechanism to obtain the kernel module information of the virtual machine. The experimental results show that the KMDM can detect the kernel module information of the guest virtual machine, and the detection results are accurate and reliable.
WANG Yan , CHENG Shao-Yin , JIANG Fan
2015, 24(7):195-199.
Abstract:This paper presents an automated method for detecting reflected XSS vulnerabilities of Android Apps. Through identifying and classifying Android Apps components, automatically inputting test cases, clicking on the input box-related buttons and monitoring the results, to determine whether the applications have potential reflected XSS vulnerabilities. Moreover this method implements support for WebView by image processing. Based on this method, a prototyping tool is also implemented. The experiment results demonstrate that this proposed method can detect reflected XSS vulnerabilities of Android Apps with high practicability and effectiveness.
2015, 24(7):200-204.
Abstract:Considering the limits that the Apriori algorithm produces numerous candidate itemsets during the self-joins of frequent items and scans database time after time, this paper proposed an improved algorithm. This algorithm maps the database to a boolean matrix, and then, deletes those meaningless items and records after the AND operation between matrix columns. This will greatly reduce the time and space complexities. Applying to the friend recommendation algorithm in social networks, this improved algorithm regards the interested users and information as records, takes the concerned users as deal items, builds a transaction database, computes frequent 2-item sets and recommends Top-N users ranked by supporting number as friends. The experiment proves the improved algorithm has higher precision and recall in friend recommendation algorithms of social networks.
2015, 24(7):205-210.
Abstract:In order to promote the opening and informationization management of laboratory, a set of field controller applied to open laboratory system is designed by using Zigbee and multiple sensors. The controller can collect and report the data of laboratory environmental parameters, lights and running status of curtains, and implement the remote and linkage control on the lights and curtains according to the preset strategy. Open laboratory system composition is introduced. On this basis, the controller hardware structure and realization methods of software and hardware are analyzed and the feasibility and effectiveness of the design scheme are verified by experiment.
ZHOU Yan-Qing , XUE He-Ru , JIANG Xin-Hua , SUN Hai-Xin , XUN Yan-Yan
2015, 24(7):211-215.
Abstract:According to the entrance and export of construction surveillance video, this paper discusses the low-resolution image recognition method of the safety helmet and deduces the relation of different features and classifiers with recognition rate in view of taking account of the low-resolution safety helmet recognition problem at the long distance. It first captured the head of video to obtain images of the size of 22×22, and then extracted the statistical features of each image, LBP and PCA features. Finally, the recognition rate of test sample was calculated by taking advantage of minimum distance classifier and BP artificial neural network. The experimental results show that the LBP statistical features in combination with BP artificial neural network can recognize the safety helmet effectively. The recognition rate reached 87.27%.
2015, 24(7):216-220.
Abstract:The traditional algorithm and system designed by using the color sensitive sensors and the mechanism of changing color of the color ink is facing the complicated hardware design and constrains about the space inside the banknote counting machine in the practical aspects. In view of this, an algorithm of using the color information of the color ink image based on a single ordinary camera to effectively achieve authentication is proposed. Under the condition of the same color temperature, the color aberration between the color of the color ink themselves and the background color is treated as the principal component of features, and the other color features are combined, it can achieve whether the currency is true or false by the nearest neighbor classifier in the color ink image which is acquired by the CMOS image sensor—MT9T001. Experimental results show that the false accept rate(FAR) is high and the false alert rate is low. Compared with the existing algorithms, it did not only simplify the hardware design and space requirements, it also has a good performance of grasping the false. Now it has been applied to an embedded system.
2015, 24(7):221-225.
Abstract:In the digital telephone switching system, designing an IMS access gateway is to solve the applications of voice access to the CM-IMS network. When IP or the TDM relay failed, the IMS access gateway intelligent routing can reconnect automatically. According to the actual configuration, the routing strategy can meet the reliability of communication and lowest cost. This paper introduces the application and research of IMS access gateway and expounds the situation of Asterisk. It describes the function of IMS access gateway intelligent routing and analyzes the design in detail, including the attributes of the routing and the definition of data structure. Finally, I realize the function of intelligent routing in combination with the Asterisk open source project. Choosing relay and number transform are verified by experiments. And the intelligent routing has reached the requirement of reliability and low cost.
LIU Chun , YANG Hong-Liang , WEI Liu-Feng
2015, 24(7):226-231.
Abstract:Compared with other third-party flight simulation software development platform, XNA framework is an application of Microsoft Visual Studio integrated development environment extensions, and the flight simulation software development which has independent intellectual property rights. This paper focuses on the visualization and control issues based on XNA flight simulation model; it briefly includes loading and rendering of the key technologies of flight simulation model, and the theory and way for the control of aircraft components like the rudder, aileron and landing gears. It proved that the XNA framework can also be simple to efficiently implement the visualization and control of the flight simulation model, with independent intellectual property rights of flight simulation software development and provide a new method based instance.
XU Ke-Bao , WU Hui , WEN Yi-Cheng
2015, 24(7):232-235.
Abstract:This article analyses the principle and characteristics of I/O multiplexing models. It uses the socket's asynchronous communication to solve the problem of insufficient number of concurrent when Windows platform communicates with Linux platform. And the whole system adopts Client/Server model to build cross-platform asynchronous communication program. The server uses the epoll model provided by Linux and the client uses the AsyncCallBack provided by.NET to realize the cross-platform asynchronous communication. In addition, the program combines with the multithreading programming method to deal with the display problem of the client. From the observation of communication process, the server can receive data sent by multiple clients in the meantime and return data to them. In conclusion, with the using of the epoll interface, Linux server's concurrency is improved. For this reason, the real-time performance of the network communication between Windows and Linux platforms is also improved.
LIU Zhi-Kai , ZHANG Tai-Hong , LIU Lei , LUO Peng
2015, 24(7):236-239.
Abstract:In order to simplify the programming environment, and enhance programming experience, we propose a web-based python3 programming environment. The web environment of this application uses python-based Django framework. This application can achieve the purpose of running python3 code in the browser by convering the python3 code into browser executable JavaScript script. Compared with traditional python3 programming environment, this programming environment can achieve remote programming and code sharing without installing and deploying any development environment locally. Experimental results shows that our programming environment has strong feasibility, good stability and good concurrency.
ZOU Yi , LI Lang , HE Wei-Wei , XU Qiong-Fang
2015, 24(7):240-243.
Abstract:LBlock is a lightweight block cipher designed by Wu Wen-ling and Zhang Lei in ACNS 2011. In this paper, the optimal implementation of LBlock encryption algorithm in hardware is studied. Firstly, the same operation is realized in one module, then the main program calls several times to complete the encryption, especially 32 in Block. Secondly, the same register is used in the subcell and key transformation, the cipher round operation and key update is designed in same module, so that it can release the number of the registers and accelerate the speed of implementation. Last, the sub-modules are combined into a complete program, the correctness of Lblock is tested. It can greatly reduce the area of LBlock algorithm by the optimal method, which can meet the application requirements of smaller chip area and provide reference for the further application of IOT encryption.
LIU Zhi-Xiong , ZHU Xiang-Qing
2015, 24(7):244-249.
Abstract:DHCP services are widely used in large-scale network infrastructure. In order to setup secure, reliable DHCP Server, the authors study the Failover protocol and design experiment on the application of DHCP Failover Server based on the LINUX environment. This paper describes in detail the configuration of DHCP Failover Server in the experiment, network security configuration and the verification of experimental results. The experiment shows that a disaster backup of DHCP Server effectively ensures the stability of users' network and improves the efficient in the use of IP resources.
LIN Yi-Shui , LIU Yu-Rong , HE Zhen-Wei
2015, 24(7):250-253.
Abstract:This paper proposes an improved LEACH protocol method based on analysing the LEACH protocol of WSN in operating mechanism, adapting to the scene and exiting defects. At last, the emphases is proving the improved LEACH protocal method's practical operating performance by simulating with NS2 environment. The simulation results show that the improved LEACH protocol method can extend the operating life of WSN, save the limited energy of nodes, reduce the mass extinction of nodes and keep an adequate quantity nodes to operate compared to the routine LEACH protocol.
CHEN Li , XIE Fu-Qiang , ZHANG Liang
2015, 24(7):254-258.
Abstract:Concerning the short comings of ant colony algorithm on soldering robot path optimization,we propose an algorithm to remove cross point on the welding path automaticly and fusion it with the ant colony algorithm. By increasing the link in removing cross point, we can get a better welding path, reduce the time consumption of welding circuit board. Because the link in removing cross point will increase the time cost, this paper is to analysis and research the method for fusion of remove cross point algorithm and ant colony algorithm, hoping to find a less time's cost and a fusion method of better optimization results.Simulation of the 200 solder joints, results show that the algorithm has a better effect.
WANG Xue-Fei , SHI Ying , SHEN Lai-Xin , YUAN Qin
2015, 24(7):259-263.
Abstract:Portable and efficient lossless drawing is an important function of the ADSN (Ancient Dwellings Sensor Network). Through the function of the ADSN localization sensor with node communication RSSI to complete the accurate positioning and ranging between the different roles to form a topology which distance can get to know. Using the RSSI signal divergence ranging and the point-to-point precision positioning of the infrared sensor to correct the RSSI's accuracy of the close range, and with remote ultrasonic point-to-point precision ranging to form a remote RSSI correction together, make the accuracy reach to 10cm in the range of 50 meters by the range fitting. deploy functional nodes (ID) to corresponding functional areas of residential sampling, define different functional areas; the topology formation, using the standard functions pattern library to matching, complete the real drawing of the ancient dwellings. The practical application proven the usefulness of this method.
HU Jie , XU Xue-Feng , WANG Gao-Chao
2015, 24(7):264-267.
Abstract:In order to solve the problem of the t-tube die structure parametric design, secondary development of CATIA interface based on Component Application Architecture(CAA), which applies VC++6.0 on Window XP operation system is introduced in this paper. Based on the study of parameters described method of the size, location of die structure, on how to automatically generate wing structure three-dimensional shape by CATIA secondary development, and to obtain t-tube die surface, parameters of the die model are studied. The application of CATIA secondary development technology in the Visual Studio environment on the basis of the description of the structural parameters of the t-tube die structure, combined with the C++ languages programming, parametric design of the t-tube die structure is realized.
ZHANG Xiang , LUO Zheng-Mao , CUI Jie
2015, 24(7):268-271.
Abstract:In view of the country attaches great importance to information pin fee and the needs of the enterprise two fusion, this paper builds a platform using PaaS mode of sharing the information consumption industry. The article expounds the industry operating model of sharing platform of information consumption, clears the functions of the system. Platform architecture contains multi-layer, USES the force data model and the way of two kinds of data isolation building database, vertical segmentation implementation through the server and the database cluster system extension. Through the system prototype trial, it found that the user experience is good, the system can improve the enterprise's information consumption level and reduce the threshold of the enterprise information construction.