LI Tian-Ju , ZHANG Zheng , ZHANG Wei-Hua
2015, 24(8):1-9.
Abstract:In recent years, multimedia data has become one of the major data types transferred and processed on the Internet. K dimensional tree is one of the most popular tree structures for searches involving a multidimensional search key, which is similar to feature points extracted from multimedia data, due to its good accuracy, scalability and fast retrieval speed. However, its slow building speed limits its application area, especially with large dataset. Fortunately, Modern processors provide tremendous computing power by integrating multiple or many cores. In this paper, we explore and analyze the existing potential parallel in KD-Tree building process. Then we present ParK, a customized parallel solution that exploits multi-core CPUs to accelerate KD-Tree building process. ParK exploits different parallel models to fully utilize computation resource in modern hardware and solves data race by presenting a new memory allocation strategy. The final experimental results show ParK achieves about 21.75X speedup compared to original serial version on 16-core server.
SUN Hui-Min , ZHUANG Chun-Qing , XU Sheng-Zhong
2015, 24(8):10-17.
Abstract:To address the satellite autonomous celestial navigation system based-on star sensor/optical camera, traditional square-root unscented Kalman filter can not well solve the nonlinear filtering problem with colored noise, which leads to the navigation system accuracy decreased. So a square-root unscented Kalman filter (CSRUKF) applied to measurement system with colored noise is proposed in this paper. In addition, in order to avoid destructing the positive and symmetry of covariance matrix caused by the errors of numerical calculation during the filtering procedure, the square-root of covariance matrix is adopted throughout recursive calculation, which improves the stability of filter. The square-root of covariance matrix update is calculated by cholesky decomposition and qr decomposition. The method was applied to satellite autonomous navigation systems. The simulation results show that, compared to traditional SRUKF, this proposed SRUKF can well solve the problem of poor estimation accuracy in measurement system with colored noise.
WANG Shuo , YANG Qiu-Song , WU Tao
2015, 24(8):18-24.
Abstract:To satisfy the requirement of access verification protection level for secure operating system and development the next generation secure operating system with high security levels, we design and implement the Verification-oriented Secure Operating System prototype (VSOS) in microkernel architecture. VSOS meets the two of the principles of designing security kernel, which suggest that reference monitor must be tamper proof and always be involved, by designing and implementing the new reference monitor. However, the introducing of reference monitor causes great performance penalty on VSOS. In order to improve the performance of the VSOS, a code path-based optimization method is used to improve the way of implementing and calling reference monitor as well as implementation of the security mechanism such as trusted path. Experiment results demonstrate that both the performance and the user experience of VSOS are refined by using this method.
YANG Ting-Ting , LIN Chang-Lu , LIU Yi-Ning , ZHANG Sheng-Yuan
2015, 24(8):25-32.
Abstract:Compared with the traditional voting, electronic voting(e-voting) not only has many advantages, but also exists many security problems. The full privacy of electronic voting is an important index to evaluate the security of the voting scheme, it implies the privacy of the voters and candidates for privacy protection, especially the protection of total votes for the losers. This paper designs a secure multi-party ranking protocol via using the verifiable secret sharing. We propose a new secure electronic voting scheme based on the proposed multi-party ranking protocol. The e-voting scheme is full privacy.
CHEN Jia-Zhen , ZHENG Zi-Hua , YE Feng , LIAN Gui-Ren , XU Li
2015, 24(8):33-39.
Abstract:A watermark method on Fresnel hologram transformation and OFDM for multiple three-dimensional objects has been proposed. First, the fast convolution algorithm is used to calculate the Fresnel diffraction distribution of the single virtual three-dimensional object in the observed plane. Then, combining with OFDM principle procedures such as parallel-serial conversion, conjugate symmetry, IFFT and parallel-serial conversion are followed to design real coding computer-generated holographic watermark. Watermark signal is embedded in the horizontal and vertical detail components of the wavelet domain by changing neighbor wavelet coefficient to hide information and the watermark can be blind extracted. The simulation results show that the approach behaves good robustness on cropping, filtering, JPEG compression, etc. Especially the approach shows good performance for cropping operation.
SHU Yuan-Zhong , GONG Wen-Jing
2015, 24(8):40-46.
Abstract:According to the inefficiency in health food supervision work and unsound management mode, this paper proposed a mobile regulatory system based on Android platform. The law enforcement officers can upload information data to the server by using 3G or 4G wireless network. In order to prevent data loss, the system introduced a data synchronization agent to probe whether user is online or offline, then using wireless Bluetooth technology to achieve backstage printing of regulatory data, simplify the law enforcement process much further. Application of this system achieves the movement pattern of supervising and office, and has practical value.
ZHANG Kai , YAN Lan-Hai , LI Meng , LIANG Sha , LI Tian-Yi , XIAO Li
2015, 24(8):47-52.
Abstract:In the post-financial crisis Era, China's finance is facing the hitherto unknown pressure. In order to cope with the financial system problems that may arise, the financial regulation information has been put on the agenda. In 2012, the China's State Council issued the Twelve-Five-Year Plan of Chinese Government Information Construction. The financial regulation informatization projects are included in the national key construction projects. This paper aims to explore a software architecture that integrates financial regulatory system based on the Service Oriented Architecture and the ontology technology, so that it can integrate financial regulatory system of the People's Bank of China, the China Banking Regulatory Commission, the China Securities Regulatory Commission and the China Insurance Regulatory Commission, and give a technical proposal for the decision of the China's State Council. Our experiments show that the technology is feasible.
YANG Li-Yuan , SONG Yun-Kui , ZHANG Wen-Bo , ZHONG Hua
2015, 24(8):53-58.
Abstract:The failure of instances in virtual environment is always causing huge losses. This paper designs and implements a virtual-environment-oriented failure detection system. In consideration of hierarchical dependence in virtual environment, a hierarchical model is used to classify the failure of instances in different levels in order to improve the accuracy of instance failure recovery, and the mechanism of self-adaptive dynamic failure detection cycle is applied to the trade-off between the CPU resource cost and the timeliness of the virtual machine detector. This system has been implemented and verified in the OnceCloud platform.
2015, 24(8):59-64.
Abstract:The fault diagnosis expert system for logistics vehicle could diagnose and troubleshoot logistics vehicle. In order to improve the performance of the system, the fault tree had been built based on the failure mode and failure mechanism of logistics vehicle. Then, the improved CLIPS which could carry out forward and backward reasoning was used, and the knowledge base management system was established to manage the fuzzy rules and facts. The results showed that the improved CLIPS coupled with VC++ was able to enhance the capability of the fault diagnosis expert system for diagnosing fault from the logistics vehicle fuzzily (i.e. fuzzy diagnosis) and improve the intelligence level of the system.
HU Yan-Ping , HE Bin , XIE Meng , WANG Xiang
2015, 24(8):65-72.
Abstract:The master and slave configuration monitoring system based on DeviceNet is designed and implemented in this paper. The monitoring software communicates with the master station by using a custom protocol via the serial communication module. Variety information of main station such as the master/slave configuration and parameter values will be transferred from the station to the communication module. The above information is sent to the slave module by the master communication module via standard DeviceNet protocol. Monitoring software can request and obtain real-time information from the slave station, then take appropriate action. The experimental results show that the data communication satisfies the specification of DeviceNet, the configuration software can configure and monitor the communication status of DeviceNet bus.
WANG Yu-Fei , ZHU Wei , LIU Dan
2015, 24(8):73-78.
Abstract:The pressure of different functional modules in Web application system is different; the demand for resources of each module is different. The traditional way of cluster size in the cluster can only be applied for the entire cluster, rather than some internal function modules can apply for special treatment. This paper presents a distributed OSGi-based Web application structure, module size can be deployed in accordance with the actual load adjustment module deployment structure. This distributed architecture is based on the OSGi specification, the Web application into multiple modules to RFC119 standard for distributed service interactions between nodes. This structure will be more efficient use of system resources, saving application deployment costs. Experiments show that the research results can be optimized for a large Web application architecture design, and with the increasing number of application modules, the system increases the number of concurrent, distributed Web applications using the structure of the more obvious advantages.
GAO Li , WANG Xin-Fang , CHEN Xing-Hu
2015, 24(8):79-84.
Abstract:This paper has analysed the character for ontology and the function of ontology management, meanwhile, proposed the design principle for the system structure of ontology management in the semantic web surroundings. The B/S Ontology system is also developed by this policy. Finally, an original system following the ontology structure is also given in this paper.
CHEN Zhao-Cai , WU Min , WU Gui-Xing , GUO Yan
2015, 24(8):85-90.
Abstract:Computer automation correction of article errors in English grammar is been studied. First we define the categories of article errors, and missing articles is also included, by using a maximum entropy model, extracting features covering context, part of speech, noun phrase structure and so on, training the model on the training corpus, then use the model to predict and correct the article errors of an input sentence. In the experiment on NUCLE corpus, effects of corpus preprocess, model types and the size of the training corpus are discussed. We make a comparison with the popular Naive Bayes model, at last we introduce the characters of English grammar to improve the model, a F-score of 35.48% is achieved, the result is slightly better than the best result in CoNLL 2013 shared task.
DU Yi-Hua , CHEN Xiong , GUO Xiao-Long
2015, 24(8):91-95.
Abstract:According to high page-view, high concurrency and long utility time of the quiz system, we analyzed and optimized the work flow, data structure, program design and the deployment architecture. By using hardware and software load balance, static and dynamic resource separation, application clusters deployment and real-time data backup, we finally realized a high availability, high performance, and scalable online quiz system.
LUO Xiao-Long , YU Kai-Sen , JIN Xuan-Chen
2015, 24(8):96-101.
Abstract:In the light of too much dispersed information resources caused inconvenient management and complicated operation in water conservancy, we design and develop a compositive information portal. First, we introduce the design idea and the architecture of the systems. Then, we give a detailed exposition on various functional modules. Through the integration of instant communication resources, business application resources and user system of business application resource, the portal realizes the unified management of the resources, the message and the identity authentication and single sign on. Meanwhile, the portal realizes publishing service on-demand according to the department or position. The actual application results show that the portal can solve the problem of resource application, make use of resources more simple and convenient and make the work of the user more pleasant and efficient.
FENG Jia-Li , LIU Shun , PENG Lu , ZHANG Dai-Lan
2015, 24(8):102-106.
Abstract:A centralized management model of the cloud computing center operation index is proposed in this paper. The timed data collector and Web management platform are implemented by Quartz+MVC+Highcharts. The results proved that the informative level can be promoted by using this centralized management model.
XU Nan-Nan , LIU Jian-Ping , HU Chen-Guang
2015, 24(8):107-111.
Abstract:Human Resources become the most important strategic resources of University Development. Human Resource Management System (HRMS) in university is an integrative information system. In base of the theory of the Whole Life Cycle, the HRMS considers the staff as the main business. This paper divides the Whole Life Cycle into five different stages: before into university, come into university, in the university, leave university/retirement, pass away. At the same time, this paper analyses the data flow and the association between each stage process, realizes the dynamic management of personnel data, and puts forward a UC matrix to meet the needs of data sharing among different departments.
NIE Xiao-Xu , YU Feng-Qin , QIN Dao-Li
2015, 24(8):112-116.
Abstract:Aiming at the shortage of XML and JSON data structure in the aspect of data communication, a data transmission protocol is designed to ues the data communication between gateway and data platform. It takes full advantage of the Protobuf that is portable and uses the binary data stream to transmit data. The protocol encapsulates data transmitted in Protobuf format in a message and builds a data transmission channel using the application layer protocol defined and the confirmation mechanism designed. It also introduces the serialization method of data to achieve the transmission of message. The test results show that the data transmission protocol achieve data transmission efficiently and reliably between the gateway and data platform.
2015, 24(8):117-121.
Abstract:The rapid spread of the mobile communication technology promotes the communication operators continue to develop new value-added business such as mobile phone banking to increase profits. These operations are often completed by fast compiled code through the short message center. This paper improved traditional binary multiplication algorithm, and presents an optimized low storage NAF point compression multiplication algorithm. It greatly reduces the running time of point multiplication operation, and saves storage space. Here introduces an optimization of BCH iterative decoding algorithm for the design and realization of mobile phone short message paging decoder. The error rate of this decoder algorithm is small. That can greatly enhance the error correcting ability, and improve the quality of short message sending. Through twice compilation of NAF and BCH, it can use conic curve cryptography to encrypt fastly. The velocity of mobile phone SMS paging signal outgoing and incoming will get greatly improved. It can make sure the safety of mobile phone short message bank business transactions and implementation speed.
BAO Yi-Dong , XIA Dong-Liang , ZHAO Wei-Ting
2015, 24(8):122-127.
Abstract:An improved ant colony optimization based on convex policy and the survival of the fittest strategy for robot path planning is proposed in this paper. This algorithm first use convex policy to process the robot's static workspace, and it can reduce the blindness of searching and the possibility of falling into the trap in environment. In addition, a survival of the fittest strategy is added in the ant colony optimization to further improve the performance of the algorithm time, optimum performance and robustness. Experimental results show that the improved ant colony optimization not only can overcome the defect of easy to fall into local optimal solution, but also can improve the operation efficiency.
2015, 24(8):128-132.
Abstract:Resource allocation in cloud computing has always been the focus of research, and in this paper, a resource allocation in cloud computing based on improved bat algorithm has been proposed. Differential genetic algorithm is introduced into bat algorithm and mutation, crossover and selection, etc. are employed to avoid individuals from falling into local optimum, and premature of the optimal solution. The improved bat algorithm can effectively improve the convergence speed and precision of the algorithm. Simulation experiments have shown that algorithm in this paper can not only greatly improve performance of the algorithm, but also optimize the resource scheduling capability in cloud computing system and improve utilization rate of resources in could computing.
2015, 24(8):133-136.
Abstract:Association mining is an important data analysis method, this article proposes an incremental queue association mining algorithm model under full confidence,using the full confidence rules in the traditional FP-Growth and PF-Tree association mining algorithm can improve the algorithm adaptability. Thus, the article proposes FP4W-Growth algorithm, and applies this algotithm to the association calculation of text data and association mining of incremental data. Then this paper conducted verification experiment. The experimental results show the feasibility of this algorithm and model. The article provides a scientific approach to finding hidden but useful information and patterns from large amount of text data.
ZHANG Yuan , HE Yuan-Quan , ZHANG Ning
2015, 24(8):137-140.
Abstract:Vehicle Terminal is an important part of the IOV(Internet of Vehicle). To improve the reliability and development efficiency of the Terminal software architecture, we designed, referring to NGTP (Next Generation Telematics Pattern), an opening software architecture for the vehicle terminal, in which the IOV system consists of several parts, mobile terminal, background support system, vehicle terminal and background process system. Every part of the IOV system exchange data according to the standard data protocol to complete some typical applications of the IOV, such as remote data acquisition and diagnosis, emergency treatment,remote query and control, etc. The terminal software is decomposed into two parts,function system and guardian system, to improve the reliability. Real-time monitored by the guardian system, the function system will be rebooted upon it breaking down. And the feasibility was verified by the vehicle terminal designed according to this architecture.
2015, 24(8):141-148.
Abstract:With the development of internet technology, the personalized tag recommendation system plays an important role in information or resources filtering. In Sina microblog website, an user can freely tag himself to indicate his interests. Meanwhile, users can also search other users who have the similar interests through tags. For the issue that there are no tags or few tags for the most users in Sina microblog website, an algorithm based on RBLDA model and users' interaction graph for tags recommendation is proposed in this paper. The algorithm utilizes the RBLDA model to produce the intial list of tags, and combines with users' interaction graph generated from actions of interaction between users to predict the final tags. The experimental results carried on some real data sets show that the proposed method performs better than traditional tag recommendation algorithms in comparison.
2015, 24(8):149-154.
Abstract:Naive Bayes Classification is simple and effective, but its strong attribute independency assumption limits its application scope. Concerning this problem, an improved WNBC algorithm is proposed based on attribute selection. This algorithm combines CFS algorithm with WNBC algorithm, it firstly uses CFS algorithm to get an attribute subset so that the simplified attribute subset can meet conditional independency; meanwhile, the algorithm's weighting coefficient is designed on that different attribute values have different influences on the classification result. Finally, it uses ASWNBC algorithm to classify datasets. The experimental results show that the proposed algorithm improves the classification accuracy with lower time consumption, therefore heightens the performance of NBC algorithm.
WANG Bin , MA Yong-Jie , LI Peng-Fei
2015, 24(8):155-159.
Abstract:For the problems that moving target detection is affected by the background and inter-frame difference is easy to produce hollow. An improved algorithm is proposed for moving target detection. It is based on modular improved three frame difference with background difference. The initial background is established by edge detection and averaging method, then the video images are divided into multiple sub-block, detecting the video images sub-blocks which achieved in the use of improved three frame difference and background difference with adaptive threshold. To obtain the moving target in the image, the background image is updated by self-adaptive method. The experimental results show that the algorithm can extract the moving object completely, has high accuracy and efficiency, and the background has strong adaptability.
2015, 24(8):160-164.
Abstract:The traditional wavelet threshold denoising method can cause the loss of useful speech signal, and the improvement of signal to noise ratio is not ideal. By analyzing the principle of wavelet denoising, an improved speech enhancement method of wavelet threshold function is proposed. The method combining the advantages of wavelet denoising for soft and hard threshold function, which can overcome disadvantage of discontinuous and bias for hard threshold function and soft threshold function respectively. The method makes judgment for voiced signal in the first place, then uses changed threshold to the wavelet coefficients of voiced and unvoiced signal in processing. The simulation experimental results show that the improved method is very suitable for speech enhancement under strong noise background, no matter keeping the voiced speech information in the noise speech signal or improving signal-to-noise ratio index, the improved method is better than traditional soft threshold method, the spectrum subtraction and the wavelet transform of auditory sensation.
2015, 24(8):165-170.
Abstract:To solve the problems of long registration time and many wrong registrations in using the infrared image stitching algorithm. This paper improves the infrared image stitching algorithm which based on SIFT algorithm. Firstly, the improved algorithm uses the Gaussian difference pyramid to establish the scale space. Secondly, this algorithm uses FAST algorithm to extract the feature points from the Gaussian pyramid difference images. In order to find the initial matching point pairs, the method of this paper calculates the feature vectors distance to measure the similarity of feature points. Thirdly, RANSAC algorithm and direction consistency method are used to remove the wrong matching point pairs. Finally, this algorithm uses weighted average method to mosaic images. The result of the infrared image mosaic experiments shows that the improved method is more stable and more rapid.
XU Biao , JIANG Zhao-Yang , ZHU Jian-Ming , CHEN Zhen-Cheng
2015, 24(8):171-175.
Abstract:The smart wheelchair improve the quality of life and give more freedom for people who lose the ability to walk. Path planning for smart wheelchair technology is one of an important Technology. Research method The degree of difficulty walking in the actual environment is difference. A new path planning algorithm for a kind of navigation methods to find the optimal path has been proved. Firstly the grid modeling has been established for indoor environment, and the adjacent relation with the improved A* algorithm has been used to optimal planning of global path between the two positions, then the virtual force field algorithm can be implemented for the local path planning on the way. Results and Conclusions This algorithm just needs to gather the information where you want to reach, then the smart wheelchair can automatically navigate to the destination. The experiments show that the algorithm is applied to the smart wheelchair indoor navigation system to reach the expectations and has the advantages of quick response, stable performance, easy to use and strong extensibility.
2015, 24(8):176-180.
Abstract:In order to improve the prediction precision, a novel electricity consumption prediction model is proposed based on combination optimization theory. Firstly, the learning samples is obtained by phase space reconstruction. Then the learning samples are input into least square support vector machine and train, which the parameters of model are optimized by artificial fish swarm algorithm, and electricity consumption prediction model is established. Finally, the performance of model is test by simulation experiment. The results show that the proposed model can describe electricity consumption change rule, and improve the prediction precision.
2015, 24(8):181-185.
Abstract:In order to improve the security of traditional digital image watermarking algorithm, and solve the problem of digital watermark is sensitive to signal processing and geometric distortion. A new digital watermarking algorithm combined with singular value decomposition and wavelet transform is proposed. Unlike the common wavelet based watermarking techniques, the proposed scheme lies essentially on marking the approximation and diagonal bands of the discrete wavelet transform (DWT) of the cover image achieving a better compromise between fidelity and robustness. The examination algorithm of watermark used the double watermark comparison examination. Experiments show that our contributions provide the multiple watermarking schemes with robustness to a wide variety of attacks.
SHI Hong-Hua , ZHONG Jun , YE You-Ming
2015, 24(8):186-190.
Abstract:In order to solve the shortcoming that centroid algorithm is affected by the node distribution uniformity and a few anchor nodes will lead to large localization error in wireless sensor network, a circle centroid algorithm is proposed. In this algorithm, the unknown node communication region is divided into different circles which center is the unknown node itself, using the circle to exclude the anchor nodes which easy to increase the localization error and select the appropriate anchor nodes, the localization error will be further reduced if the approximate equilateral triangle is be found on circle. At the same time the method of using RSSI form circles is put forward. The simulation shows that the circle centroid algorithm compares with the centroid algorithm, location precision is improved by 11%, in the condition that 100 sensor nodes which radius is 20m are deployed randomly confined to the area of 100m×100m and the anchor node number is 20.
2015, 24(8):191-196.
Abstract:It has always been the focus of research as how to solve the resource distribution problem in cloud computing, and aiming at the weakness emerging in the monkey algorithm, i.e. too quick convergence speed and being easy to fall into local optimal, etc. the monkey algorithm is introduced in this paper. First, chaos algorithm and inverse learning are introduced into monkey algorithm to initialize the initial position of monkey swarm. Second, the improvement of climbing, watching and jumping in monkey algorithm has improved the convergence precision of this algorithm. After the test of classic function, algorithm in this paper has improved noticeably in performance compared with other intelligent algorithms. Cloudsim platform has proved that by applying algorithm in this paper to cloud computing, resource consumption has been greatly improved during completing tasks.
CHEN Xiao-Yan , WANG Qiang , LI Bo-Lin
2015, 24(8):197-201.
Abstract:Computer vision has already been widely used in engineering. The circle detection using image processing means significantly in engineering. In order to auto-detect the circle and accurately extract the centre and radius, an improved Hough transform algorithm for circle detection is proposed. The image border is filtered to get the continuous borders. And then the continuous borders are sequenced and equal divided. Only three points are chose for computation and three dimension parameters will be reduced to one dimension, which saves the computational time, memory sources and improves the accuracy. Experiments show the proposed method can realize real time detection and meet the reality needs.
2015, 24(8):202-205.
Abstract:Due to the non-cooperative character of space target and the overfitting of adaboost algorithm under high noises, an space target recognition method based on combined features and improved adaboost is proposed. The combined features which consist of the geometric features and transform features are extracted to describe target information precisely from different aspects. Furthermore, an improved adaboost algorithm is presented, which adopts a new weights updating method piecewisely in the light of the weights distribution of samples. Thus the proposed method can avoid the overfitting problem and improve the robustness of classification. Experiments on space target images showed that the proposed method has better classification capability and obtains higher classification accuracy.
HE Jian-Ying , YUAN Xiao-Yan , TANG Qing-Song
2015, 24(8):206-211.
Abstract:This paper analyzes the importance of data removal. According to the existing data of the removal techniques and algorithms, it improves MD5 code fingerprint algorithm to calculate and optimize it, analyzes and recombines the fingerprint calculation of water level. Using the cache group to replace the single cache, we propose a new method to calculate the two water level fingerprints based on multi CPU to study and analyze the method. At the same time, it supports effectiveness of the method through the relevant tests and test data.
WANG Zheng-Kang , ZHOU Peng , XIAO Jun-Chao , WU Yan-Jun
2015, 24(8):212-218.
Abstract:With the emergence of Big Data applications in recent years, nowadays data centers are usually deployed with various kinds of Big Data applications and managed by resource manager such as Mesos. Mesos mainly focuses on computing resource and storage resource (CPU and memory), while ignoring network management. But research shows that efficient network resource management is crucial to optimize performance. In this work we present a network management mechanism based on SDN(Software Defined Network). This mechanism can allocate weighted network resource to different jobs based on preconfigured policy. It can allocate more bandwidth to high-priority job to optimize performance while keep the network performance isolation at the same time. We have implemented a prototype system based on SDN controller, floodlight and the experiments show that this prototype has strong usability and high expansibility.
2015, 24(8):219-223.
Abstract:The Honeynet is a kind of active defense mechanism, provides an effective method to solve the problem of network security. In this paper, we deploy virtual honeynet in campus network by using the honeypot technology, so that we can control, capture and analysis the honeynet data. We gather information about the attacker much better by accessing the Honeynet. We also study and analyze the attack tactics, attack motivation and the corresponding attack strategy, reducing the probability of attack by hackers or Trojans for the campus network.
2015, 24(8):224-228.
Abstract:After analyzed the requirement of EPON (Ethernet Passive Optical Network) cable online monitoring system and the shortcoming of the present monitoring methods, a new software of B/S (browser/server)and MVC(Model View Controller) structure is proposed for EPON cable online monitoring. The designed EPON online monitoring system is implemented through Web-based central structure. This EPON cable online monitoring system is capable of monitoring the multiple lines in parallel and timely detecting the faults. The efficiency of monitoring is enhanced. In addition, the system can locate the fault by GPS as soon as the failure occurs. The warning that is created automatically is sent to the maintainer by email and short message. Compared with the present maintenance system, the presented software system reduces the complex manual operations and shortens the time of out of work in the EPON network. The operation of our software will improve the EPON network management level tremendously.
CHEN Zhao-Fang , ZHANG Qi-Shan
2015, 24(8):229-233.
Abstract:In order to solve the problem of deficiency and excess repair maintenance in the process of elevator system, a resource constrained maintenance of elevator system with the highest reliability is studied. Firstly it expounds the model assumption and create the reliabilty as the objection function. A discrete and nonlinear constrained programming model is established. Then, it gives a simulation based PSO to solve the problem, and it includes particle representation, fitness function, update methods and algorithm process. Finally, there is an example to show tthat the model and algorithm can effectively optimize the maintenace decsion scheme and improve the reliability. It can also provides guidance for decision makers.
GU Shi-Meng , HU Qi-Bin , ZHANG Shun
2015, 24(8):234-237.
Abstract:This paper introduces a method of loading virtual sensor device drivers on a smart TV. With sensor-enabled devices as the input terminals of a smart TV, such as mobile phones/PADs or other smart terminals, a solution of sensor control for applications and games on a smart TV could be reached. The solution is to load various kinds of virtual sensor device drivers on the smart TV, including gravitational (G-sensors), linear acceleration, gyroscopes and other virtual device drivers, and to provide the data injection method of the upper layer sensors and the data of application layer sensors, so that the common interface was acquired. A network can be established via WIFI between the input terminal of the smart sensors and the smart television, then the data would be acquired and be transferred to the television. Once the data was got, it would be injected to certain devices, and to the application layer though operating system, making various sensor applications and games display on the TV. In this way, the diversity of applications and games on the smart television can be improved, and the frames from the control of games and applications can be separated. Thus a better visual experience and share would be achieved.
WU Zheng-Wu , FU Jian-Chuan , JIANG Hao-Dong , ZUO Jun-Tao
2015, 24(8):238-241.
Abstract:It is a waste of resource that excess hardware is chosen to satisfy system requirement without exact evaluation of information process arithmetic, software framework and runtime during the period that weapon system information process scheme is being designed. To resolve this problem, modeling is being done using the tool software firstly, in which the ability of information processor, software flow, data interface and data structure are all simulated. Then Simulation results are analysed according to specifical requirement. At last a conclusion is given that Designing of Minimum margin system that using Simulation and Modeling can ensure the function and capability and reduce cost the at the same time.
2015, 24(8):242-246.
Abstract:This paper proposed a detecting method based on Canny operator for detecting the defect of transparent capsules correctly and effectively. To solve the problem of detecting the curved edges at both ends of transparent capsule, the algorithm set different thresholds to achieve the purpose of getting edge of the capsule. At the same time, interferences are eliminated and defects are magnified with the help of corrosion. Finally, the defect regions are detected by using the difference of the gray values between the defect regions and the surroundings. The experimental results show that the algorithm can effectively improve the efficiency and accuracy of transparent capsule detection.
2015, 24(8):247-251.
Abstract:With the development of information technology, the importance of data backup becomes more important. But the traditional backup methods consume more resources and become managed difficultly. The emergence of virtualization technology breaks the traditional data backup methods. This paper describes several data backup mechanisms under the virtualization platform, and analyzes the advantage and disadvantages of each mechanism, so that the reader can choose the right backup solution according to the actual situation. Finally, the paper summarizes the virtualization backup mechanism problems and discusses the future trends.
WANG Zhi-Rui , HUANG Hui , LIU Zheng-Tao
2015, 24(8):252-256.
Abstract:For the sake of test presentation on Online language learning platform, in this paper, the idea of plug was studied and applied to the thought of the design process. Furthermore, on the basis of the plug, we propose a test design and presentation method, which was implemented on the ASP.NET MVC environment, and was successfully applied to foreign language learning easy cubic intelligence platform. Practice has proved that this method can solve questions diversification, providing a certain reference value for the design of the current online learning platform.
2015, 24(8):257-262.
Abstract:The manual way of the traditional access control model caused complex access authorization and low accuracy in the hybrid organization enterprise. And the model of C-URTBAC was put forward. The model adopted the idea of the level-to-level management of users and transmission of permissions in the subject and object. It could realize semi-automatic way of authorization, so as to improve the efficiency and accuracy of authorization. And it refined the constraint classification, realizing fine-grained permissions management. Finally the model was introduced in the PLM system of some auto parts company, verifying the practicability of the model.
MA Guo-Guang , LIU Yuan-Hai , JIANG Mao-Qin
2015, 24(8):263-267.
Abstract:Taking virtual three-dimensional simulation technology into LNG filling station staff training system, not only improve the efficiency of new employees, but also ensure the safe operation of LNG filling stations. The article describes the composition of the simulation system, designing model of each sub-module, NURBS modeling software methods and demonstrate interactive features of simulation system.The simulation system can be used for teaching and training, skills training staff to operate the new posts and accident drills and personnel rotation. Because of its vivid, lively and infectious, it can better mobilize the enthusiasm of students, improve the efficiency and quality of staff training and provide some technical support for the safe operation of LNG filling stations. Set of nature, science, flexibility in LNG simulation training system that can be better used in teaching and training related to LNG filling stations, is an effective means of improving staff skills.
2015, 24(8):268-272.
Abstract:The identification and classification of EEG pattern features in brain-computer interface (BCI) were proposed from the angle of the intelligent processing and the uncertainty. For the uncertainty problem of the existence of EEG, two aspects of EEG processing, feature extraction and classification, were analyzed. Furthermore, we put forward the methods to solve the problem. With P300 component as an example, the channel selection, filtering and time window selection were used for feature extraction. Then the Bayes linear discriminant analysis method was used for pattern classification. Finally, the P300 data sets of the BCI competition III were used for data analysis. By comparing the classification accuracy rate of three different methods, the results demonstrated the effectiveness of our method.
SUN Er-Jie , WANG Dong-Jun , SHI Zhen , LI Wei
2015, 24(8):273-276.
Abstract:There are large numbers of blind people in our country who cannot move around freely. The designation of the guide-stick can help them have a better recognition of the road, so this will bring great convenience to their daily life. The guide-stick can detect the surrounding information and feedback to the users in other forms, when there are obstacles in front of the users it can warn them in the form of light and sound and at the same time it can remind the passers-by away from the users. Compared to conventional guide-stick, this guide-stick with high precision, ease of use, low cost and fully functional characteristics and at the same time it can broadcast the temperature with voice.
LIU Fang , WU Qiong , ZHAN Li-Li
2015, 24(8):277-280.
Abstract:The paper introduced the high performance computer cluster management situation, according to the shortages of current management, the cluster management system overall framework was designed. Using the Proc file system in Linux, MySQL database and Web technology, the function of managing data acquisition, data storage and application interface was designed. Finally the paper achieved the management in the unified Web interface of the cluster system real-time running, historical data statistics and analysis.
2015, 24(8):281-285.
Abstract:according to adaptive difference, fixed threshold, background noise suppression problem in traditional edge detection algorithms, in order to obtain more ideal result of image edge detection, a new image edge detection algorithm based on improved cuckoo search algorithm is proposed in this paper. The gradient matrix of grayscale is obtained by first-order derivative, and the maximum of image gradient is obtained by using cuckoo search algorithm. The image edge is achieved rapidly and accurately. The experimental results show that the proposed algorithm can detect the image edge accurately and quickly, and better than other traditional edge detection algorithm.
ZHANG Yao-Wen , CHEN Shao-Chang
2015, 24(8):286-289.
Abstract:With the increase of the number of antennas applied in the mobile platform, the electromagnetic compatibility problems of cars are becoming more and more serious. According to current situation of antenna layout lacking reasonable model and theoretical method, Matlab is used to control HFSS to generate different models for simulating and optimizing electromagnetic compatibility of the antenna layout by HFSS-Matlab-Api Script library. Using genetic algorithm to optimize layout. This approach can save mathematical model derivation process and reduce the work users repeatedly draw model and modify parameters of duplication. This approach can make full use of the simulation precision, reliability and convenience of HFSS, and using genetic algorithm to reduce the time and cost of blind test. In the end, the experimental results are consistent with the theory, thus verifying the feasibility of layout and optimization method.