• Volume 24,Issue 8,2015 Table of Contents
    Select All
    Display Type: |
    • Parallelization Optimization of KD-Tree Building Algorithm

      2015, 24(8):1-9. CSTR:

      Abstract (2187) HTML (0) PDF 792.25 K (3986) Comment (0) Favorites

      Abstract:In recent years, multimedia data has become one of the major data types transferred and processed on the Internet. K dimensional tree is one of the most popular tree structures for searches involving a multidimensional search key, which is similar to feature points extracted from multimedia data, due to its good accuracy, scalability and fast retrieval speed. However, its slow building speed limits its application area, especially with large dataset. Fortunately, Modern processors provide tremendous computing power by integrating multiple or many cores. In this paper, we explore and analyze the existing potential parallel in KD-Tree building process. Then we present ParK, a customized parallel solution that exploits multi-core CPUs to accelerate KD-Tree building process. ParK exploits different parallel models to fully utilize computation resource in modern hardware and solves data race by presenting a new memory allocation strategy. The final experimental results show ParK achieves about 21.75X speedup compared to original serial version on 16-core server.

    • Square-Root Unscented Kalman Filter for Satellite Autonomous Celestial Navi-gation System with Colored Measurement Noise

      2015, 24(8):10-17. CSTR:

      Abstract (1703) HTML (0) PDF 526.84 K (2701) Comment (0) Favorites

      Abstract:To address the satellite autonomous celestial navigation system based-on star sensor/optical camera, traditional square-root unscented Kalman filter can not well solve the nonlinear filtering problem with colored noise, which leads to the navigation system accuracy decreased. So a square-root unscented Kalman filter (CSRUKF) applied to measurement system with colored noise is proposed in this paper. In addition, in order to avoid destructing the positive and symmetry of covariance matrix caused by the errors of numerical calculation during the filtering procedure, the square-root of covariance matrix is adopted throughout recursive calculation, which improves the stability of filter. The square-root of covariance matrix update is calculated by cholesky decomposition and qr decomposition. The method was applied to satellite autonomous navigation systems. The simulation results show that, compared to traditional SRUKF, this proposed SRUKF can well solve the problem of poor estimation accuracy in measurement system with colored noise.

    • Code Path-Based Optimization Method of Secure Operaing System

      2015, 24(8):18-24. CSTR:

      Abstract (1454) HTML (0) PDF 2.13 M (3135) Comment (0) Favorites

      Abstract:To satisfy the requirement of access verification protection level for secure operating system and development the next generation secure operating system with high security levels, we design and implement the Verification-oriented Secure Operating System prototype (VSOS) in microkernel architecture. VSOS meets the two of the principles of designing security kernel, which suggest that reference monitor must be tamper proof and always be involved, by designing and implementing the new reference monitor. However, the introducing of reference monitor causes great performance penalty on VSOS. In order to improve the performance of the VSOS, a code path-based optimization method is used to improve the way of implementing and calling reference monitor as well as implementation of the security mechanism such as trusted path. Experiment results demonstrate that both the performance and the user experience of VSOS are refined by using this method.

    • Secure Electronic Voting Scheme Based on Multi-party Ranking

      2015, 24(8):25-32. CSTR:

      Abstract (2234) HTML (0) PDF 514.29 K (2854) Comment (0) Favorites

      Abstract:Compared with the traditional voting, electronic voting(e-voting) not only has many advantages, but also exists many security problems. The full privacy of electronic voting is an important index to evaluate the security of the voting scheme, it implies the privacy of the voters and candidates for privacy protection, especially the protection of total votes for the losers. This paper designs a secure multi-party ranking protocol via using the verifiable secret sharing. We propose a new secure electronic voting scheme based on the proposed multi-party ranking protocol. The e-voting scheme is full privacy.

    • Method on Fresnel Holographic Watermark of Multiple Virtual Three-Dimensional Objects

      2015, 24(8):33-39. CSTR:

      Abstract (3641) HTML (0) PDF 1.46 M (2475) Comment (0) Favorites

      Abstract:A watermark method on Fresnel hologram transformation and OFDM for multiple three-dimensional objects has been proposed. First, the fast convolution algorithm is used to calculate the Fresnel diffraction distribution of the single virtual three-dimensional object in the observed plane. Then, combining with OFDM principle procedures such as parallel-serial conversion, conjugate symmetry, IFFT and parallel-serial conversion are followed to design real coding computer-generated holographic watermark. Watermark signal is embedded in the horizontal and vertical detail components of the wavelet domain by changing neighbor wavelet coefficient to hide information and the watermark can be blind extracted. The simulation results show that the approach behaves good robustness on cropping, filtering, JPEG compression, etc. Especially the approach shows good performance for cropping operation.

    • Mobile Regulatory System for Health Food Based on Android Platform

      2015, 24(8):40-46. CSTR:

      Abstract (1337) HTML (0) PDF 678.72 K (2584) Comment (0) Favorites

      Abstract:According to the inefficiency in health food supervision work and unsound management mode, this paper proposed a mobile regulatory system based on Android platform. The law enforcement officers can upload information data to the server by using 3G or 4G wireless network. In order to prevent data loss, the system introduced a data synchronization agent to probe whether user is online or offline, then using wireless Bluetooth technology to achieve backstage printing of regulatory data, simplify the law enforcement process much further. Application of this system achieves the movement pattern of supervising and office, and has practical value.

    • Financial Regulation Software Architecture in China

      2015, 24(8):47-52. CSTR:

      Abstract (1367) HTML (0) PDF 721.68 K (2907) Comment (0) Favorites

      Abstract:In the post-financial crisis Era, China's finance is facing the hitherto unknown pressure. In order to cope with the financial system problems that may arise, the financial regulation information has been put on the agenda. In 2012, the China's State Council issued the Twelve-Five-Year Plan of Chinese Government Information Construction. The financial regulation informatization projects are included in the national key construction projects. This paper aims to explore a software architecture that integrates financial regulatory system based on the Service Oriented Architecture and the ontology technology, so that it can integrate financial regulatory system of the People's Bank of China, the China Banking Regulatory Commission, the China Securities Regulatory Commission and the China Insurance Regulatory Commission, and give a technical proposal for the decision of the China's State Council. Our experiments show that the technology is feasible.

    • Self-Adaptive Failure Detection System Based on Classification

      2015, 24(8):53-58. CSTR:

      Abstract (1415) HTML (0) PDF 2.09 M (2281) Comment (0) Favorites

      Abstract:The failure of instances in virtual environment is always causing huge losses. This paper designs and implements a virtual-environment-oriented failure detection system. In consideration of hierarchical dependence in virtual environment, a hierarchical model is used to classify the failure of instances in different levels in order to improve the accuracy of instance failure recovery, and the mechanism of self-adaptive dynamic failure detection cycle is applied to the trade-off between the CPU resource cost and the timeliness of the virtual machine detector. This system has been implemented and verified in the OnceCloud platform.

    • Logistics Vehicle Fault Diagnosis Expert System Based on Fuzzy Reasoning

      2015, 24(8):59-64. CSTR:

      Abstract (1412) HTML (0) PDF 751.18 K (2982) Comment (0) Favorites

      Abstract:The fault diagnosis expert system for logistics vehicle could diagnose and troubleshoot logistics vehicle. In order to improve the performance of the system, the fault tree had been built based on the failure mode and failure mechanism of logistics vehicle. Then, the improved CLIPS which could carry out forward and backward reasoning was used, and the knowledge base management system was established to manage the fuzzy rules and facts. The results showed that the improved CLIPS coupled with VC++ was able to enhance the capability of the fault diagnosis expert system for diagnosing fault from the logistics vehicle fuzzily (i.e. fuzzy diagnosis) and improve the intelligence level of the system.

    • DeviceNet Configuration Monitoring System

      2015, 24(8):65-72. CSTR:

      Abstract (1448) HTML (0) PDF 1.16 M (2904) Comment (0) Favorites

      Abstract:The master and slave configuration monitoring system based on DeviceNet is designed and implemented in this paper. The monitoring software communicates with the master station by using a custom protocol via the serial communication module. Variety information of main station such as the master/slave configuration and parameter values will be transferred from the station to the communication module. The above information is sent to the slave module by the master communication module via standard DeviceNet protocol. Monitoring software can request and obtain real-time information from the slave station, then take appropriate action. The experimental results show that the data communication satisfies the specification of DeviceNet, the configuration software can configure and monitor the communication status of DeviceNet bus.

    • Distributed Web Application Structure Based on OSGi

      2015, 24(8):73-78. CSTR:

      Abstract (1448) HTML (0) PDF 520.82 K (2300) Comment (0) Favorites

      Abstract:The pressure of different functional modules in Web application system is different; the demand for resources of each module is different. The traditional way of cluster size in the cluster can only be applied for the entire cluster, rather than some internal function modules can apply for special treatment. This paper presents a distributed OSGi-based Web application structure, module size can be deployed in accordance with the actual load adjustment module deployment structure. This distributed architecture is based on the OSGi specification, the Web application into multiple modules to RFC119 standard for distributed service interactions between nodes. This structure will be more efficient use of system resources, saving application deployment costs. Experiments show that the research results can be optimized for a large Web application architecture design, and with the increasing number of application modules, the system increases the number of concurrent, distributed Web applications using the structure of the more obvious advantages.

    • Management of Web-Based Ontology

      2015, 24(8):79-84. CSTR:

      Abstract (1859) HTML (0) PDF 794.96 K (2441) Comment (0) Favorites

      Abstract:This paper has analysed the character for ontology and the function of ontology management, meanwhile, proposed the design principle for the system structure of ontology management in the semantic web surroundings. The B/S Ontology system is also developed by this policy. Finally, an original system following the ontology structure is also given in this paper.

    • Article Error Correction System Based on Maximum Entropy Model

      2015, 24(8):85-90. CSTR:

      Abstract (1911) HTML (0) PDF 456.12 K (2414) Comment (0) Favorites

      Abstract:Computer automation correction of article errors in English grammar is been studied. First we define the categories of article errors, and missing articles is also included, by using a maximum entropy model, extracting features covering context, part of speech, noun phrase structure and so on, training the model on the training corpus, then use the model to predict and correct the article errors of an input sentence. In the experiment on NUCLE corpus, effects of corpus preprocess, model types and the size of the training corpus are discussed. We make a comparison with the popular Naive Bayes model, at last we introduce the characters of English grammar to improve the model, a F-score of 35.48% is achieved, the result is slightly better than the best result in CoNLL 2013 shared task.

    • Completion and Optimization of Quiz System on History of the Chinese Academy of Sciences

      2015, 24(8):91-95. CSTR:

      Abstract (1455) HTML (0) PDF 496.23 K (2991) Comment (0) Favorites

      Abstract:According to high page-view, high concurrency and long utility time of the quiz system, we analyzed and optimized the work flow, data structure, program design and the deployment architecture. By using hardware and software load balance, static and dynamic resource separation, application clusters deployment and real-time data backup, we finally realized a high availability, high performance, and scalable online quiz system.

    • Water Resources Information Portal Based on Unified Communication

      2015, 24(8):96-101. CSTR:

      Abstract (1373) HTML (0) PDF 540.43 K (2255) Comment (0) Favorites

      Abstract:In the light of too much dispersed information resources caused inconvenient management and complicated operation in water conservancy, we design and develop a compositive information portal. First, we introduce the design idea and the architecture of the systems. Then, we give a detailed exposition on various functional modules. Through the integration of instant communication resources, business application resources and user system of business application resource, the portal realizes the unified management of the resources, the message and the identity authentication and single sign on. Meanwhile, the portal realizes publishing service on-demand according to the department or position. The actual application results show that the portal can solve the problem of resource application, make use of resources more simple and convenient and make the work of the user more pleasant and efficient.

    • Centralized Management for Cloud Computing Center Operation Index

      2015, 24(8):102-106. CSTR:

      Abstract (1281) HTML (0) PDF 1.96 M (2545) Comment (0) Favorites

      Abstract:A centralized management model of the cloud computing center operation index is proposed in this paper. The timed data collector and Web management platform are implemented by Quartz+MVC+Highcharts. The results proved that the informative level can be promoted by using this centralized management model.

    • Construction of University Human Resource Management Information System Based on Whole Life Cycle

      2015, 24(8):107-111. CSTR:

      Abstract (1439) HTML (0) PDF 748.55 K (2624) Comment (0) Favorites

      Abstract:Human Resources become the most important strategic resources of University Development. Human Resource Management System (HRMS) in university is an integrative information system. In base of the theory of the Whole Life Cycle, the HRMS considers the staff as the main business. This paper divides the Whole Life Cycle into five different stages: before into university, come into university, in the university, leave university/retirement, pass away. At the same time, this paper analyses the data flow and the association between each stage process, realizes the dynamic management of personnel data, and puts forward a UC matrix to meet the needs of data sharing among different departments.

    • Data Transmission Protocol Based on Protobuf

      2015, 24(8):112-116. CSTR:

      Abstract (2166) HTML (0) PDF 515.05 K (4635) Comment (0) Favorites

      Abstract:Aiming at the shortage of XML and JSON data structure in the aspect of data communication, a data transmission protocol is designed to ues the data communication between gateway and data platform. It takes full advantage of the Protobuf that is portable and uses the binary data stream to transmit data. The protocol encapsulates data transmitted in Protobuf format in a message and builds a data transmission channel using the application layer protocol defined and the confirmation mechanism designed. It also introduces the serialization method of data to achieve the transmission of message. The test results show that the data transmission protocol achieve data transmission efficiently and reliably between the gateway and data platform.

    • Mobile Banking Short Message BCH-NAF-RSA Fast Compilation and Encryption and Security Implementation

      2015, 24(8):117-121. CSTR:

      Abstract (1534) HTML (0) PDF 546.70 K (2908) Comment (0) Favorites

      Abstract:The rapid spread of the mobile communication technology promotes the communication operators continue to develop new value-added business such as mobile phone banking to increase profits. These operations are often completed by fast compiled code through the short message center. This paper improved traditional binary multiplication algorithm, and presents an optimized low storage NAF point compression multiplication algorithm. It greatly reduces the running time of point multiplication operation, and saves storage space. Here introduces an optimization of BCH iterative decoding algorithm for the design and realization of mobile phone short message paging decoder. The error rate of this decoder algorithm is small. That can greatly enhance the error correcting ability, and improve the quality of short message sending. Through twice compilation of NAF and BCH, it can use conic curve cryptography to encrypt fastly. The velocity of mobile phone SMS paging signal outgoing and incoming will get greatly improved. It can make sure the safety of mobile phone short message bank business transactions and implementation speed.

    • Robot Path Planning Based on Ant Colony Optimization Convex Fittest Strategy

      2015, 24(8):122-127. CSTR:

      Abstract (1510) HTML (0) PDF 509.72 K (2395) Comment (0) Favorites

      Abstract:An improved ant colony optimization based on convex policy and the survival of the fittest strategy for robot path planning is proposed in this paper. This algorithm first use convex policy to process the robot's static workspace, and it can reduce the blindness of searching and the possibility of falling into the trap in environment. In addition, a survival of the fittest strategy is added in the ant colony optimization to further improve the performance of the algorithm time, optimum performance and robustness. Experimental results show that the improved ant colony optimization not only can overcome the defect of easy to fall into local optimal solution, but also can improve the operation efficiency.

    • Resources Allocation in Cloud Computing Based on Improved Bat Algorithm

      2015, 24(8):128-132. CSTR:

      Abstract (1326) HTML (0) PDF 631.15 K (2808) Comment (0) Favorites

      Abstract:Resource allocation in cloud computing has always been the focus of research, and in this paper, a resource allocation in cloud computing based on improved bat algorithm has been proposed. Differential genetic algorithm is introduced into bat algorithm and mutation, crossover and selection, etc. are employed to avoid individuals from falling into local optimum, and premature of the optimal solution. The improved bat algorithm can effectively improve the convergence speed and precision of the algorithm. Simulation experiments have shown that algorithm in this paper can not only greatly improve performance of the algorithm, but also optimize the resource scheduling capability in cloud computing system and improve utilization rate of resources in could computing.

    • Association Mining on Massive Text under Full Confidence Based on Incremental Queue

      2015, 24(8):133-136. CSTR:

      Abstract (1245) HTML (0) PDF 771.54 K (2232) Comment (0) Favorites

      Abstract:Association mining is an important data analysis method, this article proposes an incremental queue association mining algorithm model under full confidence,using the full confidence rules in the traditional FP-Growth and PF-Tree association mining algorithm can improve the algorithm adaptability. Thus, the article proposes FP4W-Growth algorithm, and applies this algotithm to the association calculation of text data and association mining of incremental data. Then this paper conducted verification experiment. The experimental results show the feasibility of this algorithm and model. The article provides a scientific approach to finding hidden but useful information and patterns from large amount of text data.

    • Vehicle-Mounted Terminal Software Architecture and its Implementation

      2015, 24(8):137-140. CSTR:

      Abstract (1786) HTML (0) PDF 494.95 K (3214) Comment (0) Favorites

      Abstract:Vehicle Terminal is an important part of the IOV(Internet of Vehicle). To improve the reliability and development efficiency of the Terminal software architecture, we designed, referring to NGTP (Next Generation Telematics Pattern), an opening software architecture for the vehicle terminal, in which the IOV system consists of several parts, mobile terminal, background support system, vehicle terminal and background process system. Every part of the IOV system exchange data according to the standard data protocol to complete some typical applications of the IOV, such as remote data acquisition and diagnosis, emergency treatment,remote query and control, etc. The terminal software is decomposed into two parts,function system and guardian system, to improve the reliability. Real-time monitored by the guardian system, the function system will be rebooted upon it breaking down. And the feasibility was verified by the vehicle terminal designed according to this architecture.

    • RBLDA Model and Interaction Relation Algorithm for User Tags Recommendation in Microblog

      2015, 24(8):141-148. CSTR:

      Abstract (1281) HTML (0) PDF 768.81 K (2543) Comment (0) Favorites

      Abstract:With the development of internet technology, the personalized tag recommendation system plays an important role in information or resources filtering. In Sina microblog website, an user can freely tag himself to indicate his interests. Meanwhile, users can also search other users who have the similar interests through tags. For the issue that there are no tags or few tags for the most users in Sina microblog website, an algorithm based on RBLDA model and users' interaction graph for tags recommendation is proposed in this paper. The algorithm utilizes the RBLDA model to produce the intial list of tags, and combines with users' interaction graph generated from actions of interaction between users to predict the final tags. The experimental results carried on some real data sets show that the proposed method performs better than traditional tag recommendation algorithms in comparison.

    • Improved Weighted Naive Bayes Classification Algorithm Based on Attribute Selection

      2015, 24(8):149-154. CSTR:

      Abstract (1379) HTML (0) PDF 446.42 K (3796) Comment (0) Favorites

      Abstract:Naive Bayes Classification is simple and effective, but its strong attribute independency assumption limits its application scope. Concerning this problem, an improved WNBC algorithm is proposed based on attribute selection. This algorithm combines CFS algorithm with WNBC algorithm, it firstly uses CFS algorithm to get an attribute subset so that the simplified attribute subset can meet conditional independency; meanwhile, the algorithm's weighting coefficient is designed on that different attribute values have different influences on the classification result. Finally, it uses ASWNBC algorithm to classify datasets. The experimental results show that the proposed algorithm improves the classification accuracy with lower time consumption, therefore heightens the performance of NBC algorithm.

    • Moving Target Detection Based on Improved Three Frame Difference and Background Difference

      2015, 24(8):155-159. CSTR:

      Abstract (1213) HTML (0) PDF 563.46 K (2937) Comment (0) Favorites

      Abstract:For the problems that moving target detection is affected by the background and inter-frame difference is easy to produce hollow. An improved algorithm is proposed for moving target detection. It is based on modular improved three frame difference with background difference. The initial background is established by edge detection and averaging method, then the video images are divided into multiple sub-block, detecting the video images sub-blocks which achieved in the use of improved three frame difference and background difference with adaptive threshold. To obtain the moving target in the image, the background image is updated by self-adaptive method. The experimental results show that the algorithm can extract the moving object completely, has high accuracy and efficiency, and the background has strong adaptability.

    • Improved Speech Enhancement Method Based on Wavelet Threshold Function

      2015, 24(8):160-164. CSTR:

      Abstract (1259) HTML (0) PDF 462.69 K (2702) Comment (0) Favorites

      Abstract:The traditional wavelet threshold denoising method can cause the loss of useful speech signal, and the improvement of signal to noise ratio is not ideal. By analyzing the principle of wavelet denoising, an improved speech enhancement method of wavelet threshold function is proposed. The method combining the advantages of wavelet denoising for soft and hard threshold function, which can overcome disadvantage of discontinuous and bias for hard threshold function and soft threshold function respectively. The method makes judgment for voiced signal in the first place, then uses changed threshold to the wavelet coefficients of voiced and unvoiced signal in processing. The simulation experimental results show that the improved method is very suitable for speech enhancement under strong noise background, no matter keeping the voiced speech information in the noise speech signal or improving signal-to-noise ratio index, the improved method is better than traditional soft threshold method, the spectrum subtraction and the wavelet transform of auditory sensation.

    • Improved Algorithm Based on SIFT Infrared Image Stitching Algorithm

      2015, 24(8):165-170. CSTR:

      Abstract (1238) HTML (0) PDF 1.42 M (2925) Comment (0) Favorites

      Abstract:To solve the problems of long registration time and many wrong registrations in using the infrared image stitching algorithm. This paper improves the infrared image stitching algorithm which based on SIFT algorithm. Firstly, the improved algorithm uses the Gaussian difference pyramid to establish the scale space. Secondly, this algorithm uses FAST algorithm to extract the feature points from the Gaussian pyramid difference images. In order to find the initial matching point pairs, the method of this paper calculates the feature vectors distance to measure the similarity of feature points. Thirdly, RANSAC algorithm and direction consistency method are used to remove the wrong matching point pairs. Finally, this algorithm uses weighted average method to mosaic images. The result of the infrared image mosaic experiments shows that the improved method is more stable and more rapid.

    • Path Planning Algorithm for Smart Wheelchair Indoor Navigation

      2015, 24(8):171-175. CSTR:

      Abstract (1323) HTML (0) PDF 1.43 M (2987) Comment (0) Favorites

      Abstract:The smart wheelchair improve the quality of life and give more freedom for people who lose the ability to walk. Path planning for smart wheelchair technology is one of an important Technology. Research method The degree of difficulty walking in the actual environment is difference. A new path planning algorithm for a kind of navigation methods to find the optimal path has been proved. Firstly the grid modeling has been established for indoor environment, and the adjacent relation with the improved A* algorithm has been used to optimal planning of global path between the two positions, then the virtual force field algorithm can be implemented for the local path planning on the way. Results and Conclusions This algorithm just needs to gather the information where you want to reach, then the smart wheelchair can automatically navigate to the destination. The experiments show that the algorithm is applied to the smart wheelchair indoor navigation system to reach the expectations and has the advantages of quick response, stable performance, easy to use and strong extensibility.

    • Electricity Consumption Prediction Based on Combination Optimization Theory

      2015, 24(8):176-180. CSTR:

      Abstract (1350) HTML (0) PDF 476.39 K (2375) Comment (0) Favorites

      Abstract:In order to improve the prediction precision, a novel electricity consumption prediction model is proposed based on combination optimization theory. Firstly, the learning samples is obtained by phase space reconstruction. Then the learning samples are input into least square support vector machine and train, which the parameters of model are optimized by artificial fish swarm algorithm, and electricity consumption prediction model is established. Finally, the performance of model is test by simulation experiment. The results show that the proposed model can describe electricity consumption change rule, and improve the prediction precision.

    • Multiple Watermarking Scheme Based on the DWT—SVD

      2015, 24(8):181-185. CSTR:

      Abstract (1458) HTML (0) PDF 764.93 K (2720) Comment (0) Favorites

      Abstract:In order to improve the security of traditional digital image watermarking algorithm, and solve the problem of digital watermark is sensitive to signal processing and geometric distortion. A new digital watermarking algorithm combined with singular value decomposition and wavelet transform is proposed. Unlike the common wavelet based watermarking techniques, the proposed scheme lies essentially on marking the approximation and diagonal bands of the discrete wavelet transform (DWT) of the cover image achieving a better compromise between fidelity and robustness. The examination algorithm of watermark used the double watermark comparison examination. Experiments show that our contributions provide the multiple watermarking schemes with robustness to a wide variety of attacks.

    • Circle Centroid Localization Algorithm for Wireless Sensor Network Based on RSSI

      2015, 24(8):186-190. CSTR:

      Abstract (1362) HTML (0) PDF 627.17 K (2871) Comment (0) Favorites

      Abstract:In order to solve the shortcoming that centroid algorithm is affected by the node distribution uniformity and a few anchor nodes will lead to large localization error in wireless sensor network, a circle centroid algorithm is proposed. In this algorithm, the unknown node communication region is divided into different circles which center is the unknown node itself, using the circle to exclude the anchor nodes which easy to increase the localization error and select the appropriate anchor nodes, the localization error will be further reduced if the approximate equilateral triangle is be found on circle. At the same time the method of using RSSI form circles is put forward. The simulation shows that the circle centroid algorithm compares with the centroid algorithm, location precision is improved by 11%, in the condition that 100 sensor nodes which radius is 20m are deployed randomly confined to the area of 100m×100m and the anchor node number is 20.

    • Resource Allocation in Clouding Computing Based on Monkey Algorithm

      2015, 24(8):191-196. CSTR:

      Abstract (1486) HTML (0) PDF 516.83 K (2626) Comment (0) Favorites

      Abstract:It has always been the focus of research as how to solve the resource distribution problem in cloud computing, and aiming at the weakness emerging in the monkey algorithm, i.e. too quick convergence speed and being easy to fall into local optimal, etc. the monkey algorithm is introduced in this paper. First, chaos algorithm and inverse learning are introduced into monkey algorithm to initialize the initial position of monkey swarm. Second, the improvement of climbing, watching and jumping in monkey algorithm has improved the convergence precision of this algorithm. After the test of classic function, algorithm in this paper has improved noticeably in performance compared with other intelligent algorithms. Cloudsim platform has proved that by applying algorithm in this paper to cloud computing, resource consumption has been greatly improved during completing tasks.

    • Improved Hough Algorithm for Circle Detection

      2015, 24(8):197-201. CSTR:

      Abstract (1606) HTML (0) PDF 478.77 K (5654) Comment (0) Favorites

      Abstract:Computer vision has already been widely used in engineering. The circle detection using image processing means significantly in engineering. In order to auto-detect the circle and accurately extract the centre and radius, an improved Hough transform algorithm for circle detection is proposed. The image border is filtered to get the continuous borders. And then the continuous borders are sequenced and equal divided. Only three points are chose for computation and three dimension parameters will be reduced to one dimension, which saves the computational time, memory sources and improves the accuracy. Experiments show the proposed method can realize real time detection and meet the reality needs.

    • Space Target Recognition Method Based on Improved Adaboost Algorithm

      2015, 24(8):202-205. CSTR:

      Abstract (1781) HTML (0) PDF 370.97 K (2381) Comment (0) Favorites

      Abstract:Due to the non-cooperative character of space target and the overfitting of adaboost algorithm under high noises, an space target recognition method based on combined features and improved adaboost is proposed. The combined features which consist of the geometric features and transform features are extracted to describe target information precisely from different aspects. Furthermore, an improved adaboost algorithm is presented, which adopts a new weights updating method piecewisely in the light of the weights distribution of samples. Thus the proposed method can avoid the overfitting problem and improve the robustness of classification. Experiments on space target images showed that the proposed method has better classification capability and obtains higher classification accuracy.

    • Duplicate Removal Method of Large Data under Two Level Fingerprins Flow Based on Multi CPU Calculation

      2015, 24(8):206-211. CSTR:

      Abstract (1385) HTML (0) PDF 453.36 K (2556) Comment (0) Favorites

      Abstract:This paper analyzes the importance of data removal. According to the existing data of the removal techniques and algorithms, it improves MD5 code fingerprint algorithm to calculate and optimize it, analyzes and recombines the fingerprint calculation of water level. Using the cache group to replace the single cache, we propose a new method to calculate the two water level fingerprints based on multi CPU to study and analyze the method. At the same time, it supports effectiveness of the method through the relevant tests and test data.

    • Network Resource Scheduling Mechanism Based on SDN in Data Center

      2015, 24(8):212-218. CSTR:

      Abstract (1405) HTML (0) PDF 602.66 K (4277) Comment (0) Favorites

      Abstract:With the emergence of Big Data applications in recent years, nowadays data centers are usually deployed with various kinds of Big Data applications and managed by resource manager such as Mesos. Mesos mainly focuses on computing resource and storage resource (CPU and memory), while ignoring network management. But research shows that efficient network resource management is crucial to optimize performance. In this work we present a network management mechanism based on SDN(Software Defined Network). This mechanism can allocate weighted network resource to different jobs based on preconfigured policy. It can allocate more bandwidth to high-priority job to optimize performance while keep the network performance isolation at the same time. We have implemented a prototype system based on SDN controller, floodlight and the experiments show that this prototype has strong usability and high expansibility.

    • Realization of Virtual Honeynet on the Network Security in Campus Network

      2015, 24(8):219-223. CSTR:

      Abstract (1370) HTML (0) PDF 733.84 K (2642) Comment (0) Favorites

      Abstract:The Honeynet is a kind of active defense mechanism, provides an effective method to solve the problem of network security. In this paper, we deploy virtual honeynet in campus network by using the honeypot technology, so that we can control, capture and analysis the honeynet data. We gather information about the attacker much better by accessing the Honeynet. We also study and analyze the attack tactics, attack motivation and the corresponding attack strategy, reducing the probability of attack by hackers or Trojans for the campus network.

    • Design of Software for EPON Cable Online Monitoring

      2015, 24(8):224-228. CSTR:

      Abstract (1412) HTML (0) PDF 769.13 K (2721) Comment (0) Favorites

      Abstract:After analyzed the requirement of EPON (Ethernet Passive Optical Network) cable online monitoring system and the shortcoming of the present monitoring methods, a new software of B/S (browser/server)and MVC(Model View Controller) structure is proposed for EPON cable online monitoring. The designed EPON online monitoring system is implemented through Web-based central structure. This EPON cable online monitoring system is capable of monitoring the multiple lines in parallel and timely detecting the faults. The efficiency of monitoring is enhanced. In addition, the system can locate the fault by GPS as soon as the failure occurs. The warning that is created automatically is sent to the maintainer by email and short message. Compared with the present maintenance system, the presented software system reduces the complex manual operations and shortens the time of out of work in the EPON network. The operation of our software will improve the EPON network management level tremendously.

    • Selective Maintenance Decision of Elevator System Based on Particle Swarm Optimization

      2015, 24(8):229-233. CSTR:

      Abstract (1268) HTML (0) PDF 490.70 K (2563) Comment (0) Favorites

      Abstract:In order to solve the problem of deficiency and excess repair maintenance in the process of elevator system, a resource constrained maintenance of elevator system with the highest reliability is studied. Firstly it expounds the model assumption and create the reliabilty as the objection function. A discrete and nonlinear constrained programming model is established. Then, it gives a simulation based PSO to solve the problem, and it includes particle representation, fitness function, update methods and algorithm process. Finally, there is an example to show tthat the model and algorithm can effectively optimize the maintenace decsion scheme and improve the reliability. It can also provides guidance for decision makers.

    • Implementation of Smart TV Remote Sensor Control

      2015, 24(8):234-237. CSTR:

      Abstract (1602) HTML (0) PDF 525.46 K (2933) Comment (0) Favorites

      Abstract:This paper introduces a method of loading virtual sensor device drivers on a smart TV. With sensor-enabled devices as the input terminals of a smart TV, such as mobile phones/PADs or other smart terminals, a solution of sensor control for applications and games on a smart TV could be reached. The solution is to load various kinds of virtual sensor device drivers on the smart TV, including gravitational (G-sensors), linear acceleration, gyroscopes and other virtual device drivers, and to provide the data injection method of the upper layer sensors and the data of application layer sensors, so that the common interface was acquired. A network can be established via WIFI between the input terminal of the smart sensors and the smart television, then the data would be acquired and be transferred to the television. Once the data was got, it would be injected to certain devices, and to the application layer though operating system, making various sensor applications and games display on the TV. In this way, the diversity of applications and games on the smart television can be improved, and the frames from the control of games and applications can be separated. Thus a better visual experience and share would be achieved.

    • Simulation and Modeling of Specific Task-Oriented Minimum Margin System

      2015, 24(8):238-241. CSTR:

      Abstract (1370) HTML (0) PDF 502.31 K (2174) Comment (0) Favorites

      Abstract:It is a waste of resource that excess hardware is chosen to satisfy system requirement without exact evaluation of information process arithmetic, software framework and runtime during the period that weapon system information process scheme is being designed. To resolve this problem, modeling is being done using the tool software firstly, in which the ability of information processor, software flow, data interface and data structure are all simulated. Then Simulation results are analysed according to specifical requirement. At last a conclusion is given that Designing of Minimum margin system that using Simulation and Modeling can ensure the function and capability and reduce cost the at the same time.

    • Capsule Defect Detection Based on Canny Operator

      2015, 24(8):242-246. CSTR:

      Abstract (1316) HTML (0) PDF 774.60 K (3089) Comment (0) Favorites

      Abstract:This paper proposed a detecting method based on Canny operator for detecting the defect of transparent capsules correctly and effectively. To solve the problem of detecting the curved edges at both ends of transparent capsule, the algorithm set different thresholds to achieve the purpose of getting edge of the capsule. At the same time, interferences are eliminated and defects are magnified with the help of corrosion. Finally, the defect regions are detected by using the difference of the gray values between the defect regions and the surroundings. The experimental results show that the algorithm can effectively improve the efficiency and accuracy of transparent capsule detection.

    • Data Backup Mechanism Based on Virtualization

      2015, 24(8):247-251. CSTR:

      Abstract (1638) HTML (0) PDF 498.29 K (3295) Comment (0) Favorites

      Abstract:With the development of information technology, the importance of data backup becomes more important. But the traditional backup methods consume more resources and become managed difficultly. The emergence of virtualization technology breaks the traditional data backup methods. This paper describes several data backup mechanisms under the virtualization platform, and analyzes the advantage and disadvantages of each mechanism, so that the reader can choose the right backup solution according to the actual situation. Finally, the paper summarizes the virtualization backup mechanism problems and discusses the future trends.

    • Design and Realization of Plug-in-Based Test diversification

      2015, 24(8):252-256. CSTR:

      Abstract (1595) HTML (0) PDF 505.57 K (3005) Comment (0) Favorites

      Abstract:For the sake of test presentation on Online language learning platform, in this paper, the idea of plug was studied and applied to the thought of the design process. Furthermore, on the basis of the plug, we propose a test design and presentation method, which was implemented on the ASP.NET MVC environment, and was successfully applied to foreign language learning easy cubic intelligence platform. Practice has proved that this method can solve questions diversification, providing a certain reference value for the design of the current online learning platform.

    • C-URTBAC Model in the Permission Management

      2015, 24(8):257-262. CSTR:

      Abstract (1298) HTML (0) PDF 822.86 K (2453) Comment (0) Favorites

      Abstract:The manual way of the traditional access control model caused complex access authorization and low accuracy in the hybrid organization enterprise. And the model of C-URTBAC was put forward. The model adopted the idea of the level-to-level management of users and transmission of permissions in the subject and object. It could realize semi-automatic way of authorization, so as to improve the efficiency and accuracy of authorization. And it refined the constraint classification, realizing fine-grained permissions management. Finally the model was introduced in the PLM system of some auto parts company, verifying the practicability of the model.

    • LNG Technology Training Systems Based on Three-dimensional Virtual Simulation

      2015, 24(8):263-267. CSTR:

      Abstract (1327) HTML (0) PDF 1.04 M (2812) Comment (0) Favorites

      Abstract:Taking virtual three-dimensional simulation technology into LNG filling station staff training system, not only improve the efficiency of new employees, but also ensure the safe operation of LNG filling stations. The article describes the composition of the simulation system, designing model of each sub-module, NURBS modeling software methods and demonstrate interactive features of simulation system.The simulation system can be used for teaching and training, skills training staff to operate the new posts and accident drills and personnel rotation. Because of its vivid, lively and infectious, it can better mobilize the enthusiasm of students, improve the efficiency and quality of staff training and provide some technical support for the safe operation of LNG filling stations. Set of nature, science, flexibility in LNG simulation training system that can be better used in teaching and training related to LNG filling stations, is an effective means of improving staff skills.

    • Feature Extraction and Pattern Classification for EEG in Brain-Computer Interface

      2015, 24(8):268-272. CSTR:

      Abstract (1406) HTML (0) PDF 648.05 K (5277) Comment (0) Favorites

      Abstract:The identification and classification of EEG pattern features in brain-computer interface (BCI) were proposed from the angle of the intelligent processing and the uncertainty. For the uncertainty problem of the existence of EEG, two aspects of EEG processing, feature extraction and classification, were analyzed. Furthermore, we put forward the methods to solve the problem. With P300 component as an example, the channel selection, filtering and time window selection were used for feature extraction. Then the Bayes linear discriminant analysis method was used for pattern classification. Finally, the P300 data sets of the BCI competition III were used for data analysis. By comparing the classification accuracy rate of three different methods, the results demonstrated the effectiveness of our method.

    • Design of Intelligent Ultrasonic Guide-Stick

      2015, 24(8):273-276. CSTR:

      Abstract (1618) HTML (0) PDF 474.77 K (4190) Comment (0) Favorites

      Abstract:There are large numbers of blind people in our country who cannot move around freely. The designation of the guide-stick can help them have a better recognition of the road, so this will bring great convenience to their daily life. The guide-stick can detect the surrounding information and feedback to the users in other forms, when there are obstacles in front of the users it can warn them in the form of light and sound and at the same time it can remind the passers-by away from the users. Compared to conventional guide-stick, this guide-stick with high precision, ease of use, low cost and fully functional characteristics and at the same time it can broadcast the temperature with voice.

    • Cluster Management System Based on Web

      2015, 24(8):277-280. CSTR:

      Abstract (1230) HTML (0) PDF 740.92 K (2344) Comment (0) Favorites

      Abstract:The paper introduced the high performance computer cluster management situation, according to the shortages of current management, the cluster management system overall framework was designed. Using the Proc file system in Linux, MySQL database and Web technology, the function of managing data acquisition, data storage and application interface was designed. Finally the paper achieved the management in the unified Web interface of the cluster system real-time running, historical data statistics and analysis.

    • Image Edge Detection Based on Improved Cuckoo Search Algorithm

      2015, 24(8):281-285. CSTR:

      Abstract (1089) HTML (0) PDF 593.36 K (2290) Comment (0) Favorites

      Abstract:according to adaptive difference, fixed threshold, background noise suppression problem in traditional edge detection algorithms, in order to obtain more ideal result of image edge detection, a new image edge detection algorithm based on improved cuckoo search algorithm is proposed in this paper. The gradient matrix of grayscale is obtained by first-order derivative, and the maximum of image gradient is obtained by using cuckoo search algorithm. The image edge is achieved rapidly and accurately. The experimental results show that the proposed algorithm can detect the image edge accurately and quickly, and better than other traditional edge detection algorithm.

    • System Simulation and Optimization of Antenna Layout Based on HFSS-MATLAB-API

      2015, 24(8):286-289. CSTR:

      Abstract (1721) HTML (0) PDF 594.76 K (4299) Comment (0) Favorites

      Abstract:With the increase of the number of antennas applied in the mobile platform, the electromagnetic compatibility problems of cars are becoming more and more serious. According to current situation of antenna layout lacking reasonable model and theoretical method, Matlab is used to control HFSS to generate different models for simulating and optimizing electromagnetic compatibility of the antenna layout by HFSS-Matlab-Api Script library. Using genetic algorithm to optimize layout. This approach can save mathematical model derivation process and reduce the work users repeatedly draw model and modify parameters of duplication. This approach can make full use of the simulation precision, reliability and convenience of HFSS, and using genetic algorithm to reduce the time and cost of blind test. In the end, the experimental results are consistent with the theory, thus verifying the feasibility of layout and optimization method.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063