• Volume 25,Issue 12,2016 Table of Contents
    Select All
    Display Type: |
    • Hardware Resource Management for Personal Self Organizing Networks

      2016, 25(12):1-8. DOI: 10.15888/j.cnki.csa.005472

      Abstract (1414) HTML (0) PDF 1.26 M (2305) Comment (0) Favorites

      Abstract:While the popularity of all kinds of intelligent terminals,cross-device applications,such as multi-screen,are emerging,hence,higher requirements are put forward to the cross-platform and interactive extendibility of the management of hardware resources.However,most of the current applications that share hardware resources are mirror projection technology across devices which lacks interactivity,or just simple applications independent of each other.Besides,they are targeted at single platform or hardware resource,which make it difficult to deal with new requirements flexibly and effectively.Focused on this issue,the management and allocation of hardware resources (keyboard,mouse,camera,etc.) in multiple devices in personal self-organizing network is studied,and an application framework with good cross-platform and extendibility is proposed,which could make one device use others' hardware resources just like using its own,also could help users manage and control their devices.The framework is consisted of inter process communication and hardware resource management.The former provides information transmission service to insure real-time communication,while the latter is responsible for the management of access to all hardware resources and provides the functions of applying and using resource,status change notification,etc.With the framework,the development of cross-device application becomes very convenient and simple.

    • Opinion Leader Detection Method in the Communication Network of the Specific Topic

      2016, 25(12):9-15. DOI: 10.15888/j.cnki.csa.005485

      Abstract (1239) HTML (0) PDF 1.64 M (2259) Comment (0) Favorites

      Abstract:For the problems of the deficiency of existing recognition model of the Chinese weibo opinion leaders,one detection method of opinion leaders in a dissemination network of the specific topic is proposed.A recognition model based on the forward relations on the basis of information dissemination network is proposed in this paper,and the influence of users comes from their own authority and the support of forwarding user.An experiment of weibo opinion leader detection for about two weeks which is concentrated in a certain topic verifies that this method can effectively detect the opinion leader of the specific topic.

    • Parallel Computing Performance Analysis on GROMACS Software

      2016, 25(12):16-23. DOI: 10.15888/j.cnki.csa.005471

      Abstract (1532) HTML (0) PDF 1.31 M (5959) Comment (0) Favorites

      Abstract:Molecule dynamic (MD) simulation is used for simulation of atomic systems.It is a powerful tool for understanding relationships between microcosmic nature and macroscopic properties.In view of the problem of how to improve the performance of parallel MD simulations,in this paper taking the famous GROMACS software as an example,we study its implementation strategy on parallel computing performance,combining with the key principles of MD and the results of test cases,and we propose optimization strategies of performance under MPI and OpenMP parallel environment.It can provide theoretical and practical reference for optimizing performance of MD software.In addition,we also study that in the GPU heterogeneous parallel environment how to tune MPI/OpenMP and GPU to obtain the best performance.

    • Research on the Correlation between the Residential Area Housing Price and the Accessibility of the Public Service Networks

      2016, 25(12):24-29. DOI: 10.15888/j.cnki.csa.005492

      Abstract (1113) HTML (0) PDF 1.13 M (2130) Comment (0) Favorites

      Abstract:The concept of residential area public service network is proposed.Four indicators,including the shortest path,the fastest path,the second-rate shortest path and the second-rate fast path that between the residential area and public service nodes,are considered to evaluate the correlation between accessibility of public service nodes and residential area housing price by Pearson product-moment correlation coefficient,and the computation model is built finally.Accordingly the influential factors of residential area housing prices are identified.As an example,the Wuhan residential area public service network is analyzed.The results show that this method can effectively identify the factors that have important effects on residential area housing prices and provide decision supports for the residential area planning and public service optimization allocation.

    • Study on Applying Hadoop to Enhance the Retrieval Performance of Database Audit Systems

      2016, 25(12):30-34. DOI: 10.15888/j.cnki.csa.005562

      Abstract (1806) HTML (0) PDF 1001.30 K (2225) Comment (0) Favorites

      Abstract:Based on the present situation of lower retrieval performance of the single node database audit system,this paper carries out research of application of the Hadoop pseudo distribution model and the HBase column storage model to reconstruct the database audit system of the single node deployment for enhancing the retrieval performance.This paper focuses on the study of integrating HDFS storage mechanism,MapReduce computing framework and HBase data model to improve the performance of real-time retrieval and comprehensive analysis of database audit system.Reconstruction scheme can effectively improve the retrieval performance,but in view of the high reliability and large volume of the data,the application of Hadoop and HBase distributed cluster is proposed in combination with the production status.

    • Hyper-Reflectance Image Analysis System of Coke Optical Texture

      2016, 25(12):35-41. DOI: 10.15888/j.cnki.csa.005489

      Abstract (1897) HTML (0) PDF 2.22 M (2562) Comment (0) Favorites

      Abstract:Analyzing optical texture of metallurgical cokes is an important way to measure the quality of coke.Currently,these measurements have been still in the manual stage.In this paper,we present a system to improve the status quo,which can automatically capture the microscopic images of coke sections and then segment and recognize different coke optical textures in the images.The system consists of two subsystems,which are image acquisition system and image analysis system.We take advantage of multi-directional polarizing technique to capture the reflectance images of coke sections at different polarizing angles,and this special type of image is termed as hyper-reflectance image in this paper.In the image analysis system,we propose a novel analysis algorithm to analyze the hyper-reflectance image of coke,which shows excellent performance in the segmenting and recognizing of coke optical texture.

    • SOA-Based New Generation Banking System Architecture for Banking Group

      2016, 25(12):42-52. DOI: 10.15888/j.cnki.csa.005542

      Abstract (1917) HTML (0) PDF 2.13 M (4688) Comment (0) Favorites

      Abstract:Large commercial banking group encounters many problems in the process of informatization,such as large number of internal systems,existence of many non-uniform platforms,low usage of resources and high cost,long cycle of demand response and other defects.With the rapid growth of China's banking industry,commercial banking group's system architecture innovation is imperative.This article focuses on the SOA-based framework and component-based design method which are employed in the construction of the new generation banking system.By 7+1 levels and 12P overall framework design,we ensure the application components loosely coupled and uniform the domestic and overseas application to realize the enterprise-wide integration of resources and quick response to business requirements.Accordingly,we achieve the purpose of enhancing the service reliability and availability.We introduce in enterprise level business model to standardize our business process and use structured modelling language to describe our business capability.We use process model,product model,data model and user experience model to provide methods and basis for enterprise level analysis and design.

    • Collaborative Decision for Departure Sequencing

      2016, 25(12):53-59. DOI: 10.15888/j.cnki.csa.005494

      Abstract (1762) HTML (0) PDF 1.29 M (2322) Comment (0) Favorites

      Abstract:This paper proposes a collaborative decision framework for departure sequencing,which can remedy the defect of air transportation automation system and make it come true that scheduling departure aircraft automatically under air transportation departments' collaborative decision-making of flight data,assisting controllers for take-off scheduling decision.A general framework of collaborative decision taking off scheduling system is proposed.The details of framework that include the flow work of system,core module structure design,the constraint conditions of flight departure and the scheduling algorithm of the automatic take-off are described.User permissions are determined by their roles and responsibilities,who can participate in information sharing and flight data collaborative decision making.In addition,the framework adopts automatical departure scheduling algorithm with wake stream and air flow constrains which is designed by rolling horizon procedure,getting the optimized flight sequence to take off,the time slot table being used to display the flight sequence to the user directly.Finally,the actual operation situation of the system shows that the system can complete the multi-user cooperative decision-making,realize the automation of flight management and provide the basis for ATC decision.

    • Integrated Evaluation System of Oilfield Adjustment Potential

      2016, 25(12):60-65. DOI: 10.15888/j.cnki.csa.005484

      Abstract (1748) HTML (0) PDF 1.03 M (2568) Comment (0) Favorites

      Abstract:As to the general issues of adjustment in waterflooding oilfield development,we develop an integrated evaluation system of the oilfield's development and adjustment potential based on.NET technology.By combing the working experience of the reservoir engineers and the study results from numerical simulation,the quick and integrated evaluation of the producing performance is realized,the remaining oil potential and the adjustment potential in the waterflooding oilfield,which improves the efficiency of the planning of adjustment measures greatly.It has been used in the evaluation of the adjustment potential in SZ development area of Daqing Oilfield,which shows a good result.The system has the characteristics of easy-to-use,high-efficiency of running,good universality,etc.,which guarantees a very good application prospects in the oilfields.

    • Construction of Seismic Data Backup System

      2016, 25(12):66-71. DOI: 10.15888/j.cnki.csa.005508

      Abstract (1301) HTML (0) PDF 1.08 M (2147) Comment (0) Favorites

      Abstract:Seismic data security has become a key factor for determining the location and scale of oil and gas reservoirs in the field of oil and gas exploration.Data backup is an important part of data security,this paper analyses the seismic exploration business requirement,combines with the actual situation of the existing seismic data processing and interpretation application system,a solution based on hierarchical data backup system is put forward.The solution can effectively solve all kinds of centralized backup and restoration of seismic data,expansion of storage subsystem of seismic data processing and interpretation application system and data migration for different hierarchical storage,ensuring the data security of oil and gas exploration.

    • Abandoned Bill Handling System Based on Stream Computing Model

      2016, 25(12):72-77. DOI: 10.15888/j.cnki.csa.005488

      Abstract (1339) HTML (0) PDF 958.27 K (2245) Comment (0) Favorites

      Abstract:Managing abandoned bills effectively is an important part to guarantee the accounting reliability of communication systems.However,for the distinctive features of the abandoned bills such as real time and burstiness,etc.,the existing big data computing models can not deal with them well.In order to meet the challenges of real time and burstiness of abandoned bill system,this paper presents a dynamic routing strategy to realize the run time lightweight scaling of the computing system.On this basis,this paper gives an implementation of the abandoned bill system based on the stream computing model.Finally,the results demonstrate that the proposed dynamic routing strategy is an effective way on handling burstiness of data.

    • Gigabit Ethernet High-Speed Data Communication Recording System

      2016, 25(12):78-82. DOI: 10.15888/j.cnki.csa.005557

      Abstract (1346) HTML (0) PDF 934.14 K (2173) Comment (0) Favorites

      Abstract:For the special experiment data acquire and analysis of aviation and spaceflight,this paper puts forward a design of a gigabit Ethernet interface based on FPGA of high speed data communication recording system,which describes function design,hardware design,interface design,embedded software design detailly,communicating with the system through the communication interface.The system can record data to the nonvolatile memory in the process of communication,afterwards,through the data interface output data to PC to complete the data processing and analysis.

    • Mountain Landslide Remote Monitoring System Based on ZigBee

      2016, 25(12):83-86. DOI: 10.15888/j.cnki.csa.005574

      Abstract (1869) HTML (0) PDF 1.00 M (2665) Comment (0) Favorites

      Abstract:In order to overcome the disadvantages such as wired transmission and manual notification in conventional pre-warning systems for mountain landslide,this paper proposes a low-power and high-accuracy remote monitoring system for mountain landslide,which is designed with a three-axis acceleration sensor MPU6050.The system uses ZigBee wireless network to collect sensor data and utilizes Kalman filtering algorithm to reduce deviation in the result to improve higher accuracy.After being tested with physical prototype,the system runs stably and meets the design requirements well.

    • Construction and Analysis of Yangzhou Urban Public Transport Database Based on GIS

      2016, 25(12):87-91. DOI: 10.15888/j.cnki.csa.005559

      Abstract (1677) HTML (0) PDF 14.44 M (2207) Comment (0) Favorites

      Abstract:Based on GIS as a platform,this paper realizes the construction and analysis of the Geo-database of urban public transport in Yangzhou.Based on the ArcGIS,the design process and construction process of public transport database are analyzed deeply.And the calculation and analysis scheme of the public transport index in the Geo-database are presented,reflecting the structure rationality of database itself and the strong support for the planning work.It also provides a more complete data support and technical basis for the future development of intelligent public transportation system.

    • Compilation Optimization of Address and Data Predicated Execution on BWDSP10x

      2016, 25(12):92-99. DOI: 10.15888/j.cnki.csa.005573

      Abstract (1433) HTML (0) PDF 1.11 M (1874) Comment (0) Favorites

      Abstract:The traditional predicate optimization technique is based on the Von Neumann architecture,which considers the data flow optimization only.However,BWDSP10x is based on the Harvard architecture,which data and instructions are physically separated.It provides VLIW and supports not only data predicated execution but also address predicated execution.Hence,we present an optimization method for the two predicated execution technology based on the region.In this method,types of the two operands of comparison operation will be identified before the two kinds of operations are executed,and when addresses are compared,the two operands don't need to transfer to general registers.Experimental result shows that the optimization method can highly reduce the time and bandwidth of CPU,and reduce large numbers of branch instructions.The performance of programs tested is increased by 28.4 percent after the optimization.

    • Clinical Diagnosis Model Based on Visual Analysis for Electronic Medical Record

      2016, 25(12):100-107. DOI: 10.15888/j.cnki.csa.005465

      Abstract (1600) HTML (0) PDF 1.61 M (3322) Comment (0) Favorites

      Abstract:To help doctors better diagnose diseases,overcome the lack of systematic and effective means in the process of clinical diagnosis and treatment and make the best of the medical knowledge in electronic medical records,a diagnosis model is proposed based on visual analysis and data mining for electronic medical record.Firstly,electronic medical records of fever of unknown origin are preprocessed into structured data by extracting patients'symptoms.Secondly,the structured data is organized and visualized based on specific requirements.Finally,a diagnosis model is trained to discover the relationship between symptoms and causes,helping doctors find the potential medical knowledge in medical records and assisting doctors to diagnose.A visual analysis and auxiliary diagnosis framework for clinical diagnosis and treatment is designed based on the above analysis.Experiments show that the system could help doctors analyze the knowledge of electronic medical records of unknown cause,which could help doctors diagnose diseases in a shorter period of time.

    • Frame Copy and Paste Tampering Detection Based on Dynamic Threshold

      2016, 25(12):108-116. DOI: 10.15888/j.cnki.csa.005499

      Abstract (1212) HTML (0) PDF 1.29 M (1972) Comment (0) Favorites

      Abstract:Frame duplication forgery is a very common operation for video tampering in the temporal domain.By removing some frames which contain a crime scene or crime evidence,the forger can change the video content.A lot of solutions have been proposed for detecting this type of tempering operation.However,there are two disadvantages.The first one is fixed threshold;the other is huge computation.In general,frame duplication forgery and re-compression would be performed on a video at the same time.Since re-compression will cause data lost,the fixed thresholds may lose their effects.Therefore,an algorithm based on dynamic threshold is proposed in this paper,which can improve the robustness.Additionally,the proposed method adopts dictionary order algorithm to reduce the search scope of frame matching and the time complexity.Three performance indices:precision,recall and average computation time per frame are employed to evaluate our algorithm.The results demonstrate that the proposed method outperforms the existing methods in terms of precision,recall and computation time.

    • Image Inpainting Based on Net Function Interpolation and TV Model

      2016, 25(12):117-125. DOI: 10.15888/j.cnki.csa.005495

      Abstract (1263) HTML (0) PDF 2.77 M (2146) Comment (0) Favorites

      Abstract:TV (Total Variation) model is used for image inpainting without taking the direction of damaged areas into account,while its slow convergent rate and low inpainting quality are either not as good as expected.To handle these problems,Additional Direction Total Variation (ADTV) algorithm is proposed,which aims at the strip damaged areas with obvious direction characteristic in the image.In this algorithm,discrete formats of TV model are improved in corresponding four directions (0°,45°,90°,135°).The damaged areas will be inpainted in the four types by judging their directions.The experimental results show that the method makes full use of the direction information of the strip damaged areas,and effectively improves the inpainting quality.Finally,in order to improve the efficiency of inpainting,Net-TV algorithm and Net-ADTV algorithm are proposed by combining net function interpolation with TV model and ADTV algorithm respectively.The experimental results show that the combined algorithm not only effectively reduces the number of iterations and time cost,speeds up the convergence rate,but also improves the quality of image inpainting.

    • Fast Image Retrieval Method Using Improved Bag of Visual Words Model

      2016, 25(12):126-131. DOI: 10.15888/j.cnki.csa.005464

      Abstract (1471) HTML (0) PDF 1.13 M (3542) Comment (0) Favorites

      Abstract:Bag of visual words model based on content-based image retrieval has been widely used,traditional bag of visual words model generally uses the SIFT descriptors for feature extraction.In view of the high complexity of SIFT descriptors and the long time of feature extraction,this paper proposes to use a faster binary feature descriptor ORB for the image feature extraction,creating visual dictionary,using the distance between two vectors to compare the image similarity,so as to achieve fast image retrieval.Experimental results show that the method proposed in this paper can improve the efficiency of image retrieval obviously,while maintains a relatively high robustness.

    • Collaborative Filtering Algorithm Combined with the User Clustering and Item Types

      2016, 25(12):132-137. DOI: 10.15888/j.cnki.csa.005478

      Abstract (1360) HTML (0) PDF 1.04 M (3371) Comment (0) Favorites

      Abstract:In this paper,in order to solve the problem of data sparseness and improve the effect of recommendation,an improved collaborative filtering algorithm is put forward.Firstly,this algorithm calculates the item-types similarities through a new calculation method and the items whose similarities are greater than a certain threshold value will be considered as neighbors of the target-item.Secondly,the system predicts target-user's score values for the target-item according to the scores for the neighbors of target-item,and the predicted values will be filled in the sparse score matrix.Finally,this algorithm clusters the new matrix (K-means clustering) based on the users,to predict target-user's score values and make recommendations.The experimental results on the Movielens dataset show that this algorithm can effectively alleviate the data sparseness,reduce the computational complexity and improve recommendation accuracy.

    • Highly Precise Transcriptome Sequence Alignment Algorithm Independent From Splice Site Signals

      2016, 25(12):138-142. DOI: 10.15888/j.cnki.csa.005443

      Abstract (1704) HTML (0) PDF 954.99 K (2224) Comment (0) Favorites

      Abstract:RNA-seq has become the most effective method of analyzing alternative splicing events in different types of cells.The first step of processing data of RNA-seq is to exactly align millions of sequencing fragments against the reference sequence,which is called transcriptome sequence alignment.The existing sequence alignment tools for RNA-seq almost rely on canonical splice site signals,which,to some extent,limits the ability to identify novel splice sites.Therefore,we design a method independent from splice site signals,named RNAMap.It divides the sequencing fragments according to overlapping seeds method and scans the reference sequence via sliding windows with left and right anchors.In this way,splice sites within seeds can be identified.The computational experiments indicate that RNAMap not only reaches a precision of over 95%,but also outperforms the existing softwares in recall rate.

    • Solution Space Distance Clustering-Variable Neighborhood Search Particle Swarm Optimization for Flexible Job Shop Scheduling Problem

      2016, 25(12):143-148. DOI: 10.15888/j.cnki.csa.005482

      Abstract (1336) HTML (0) PDF 1.08 M (2294) Comment (0) Favorites

      Abstract:Based on the Flexible Job-Shop Scheduling Problem (FJSP),an improved particle swarm optimization algorithm is proposed,which is based on solution space distance clustering and variable neighborhood search.In this algorithm,a better solution to the problem is that the greedy strategy is adopted to introduce a variable neighborhood search method,adjusting machine location of the biggest key processes on the critical path,adjusting the relative position changes which is on the critical path.According to the space distance of the machining process,the K-means clustering is used to get the "excellent individuals" of machine processing,increasing the local search performance.At the same time,the speed of the particle swarm optimization is updated with the local self-adaptive stagnation strategy,and the relative position of the local segment could be kept unchanged.Through the experimental simulation,the optimization algorithm achieves good effectiveness,and the convergence speed is rapider and the performance is better compared with the general PSO algorithm.

    • Distributed Cache Coherency Strategy Based on Change Data Capture Mechanism

      2016, 25(12):149-154. DOI: 10.15888/j.cnki.csa.005450

      Abstract (2433) HTML (0) PDF 1015.95 K (2442) Comment (0) Favorites

      Abstract:Distributed cache is widely used to solve the performance bottleneck problem in traditional relational database,but when third-party applications that are not cache-aware update the back-end database,the distributed cache will end up in an inconsistent state,which has the problem of stale cache data.This paper proposes a distributed cache consistency strategy based on change data capture mechanism.The work integrates trigger-based and log-based change data capture mechanism that can get the real-time data from backend database,and implements data model transformation and SQL translation engine,which can update cache in real-time to guarantee distributed cache coherence.The experiment simulates the key operation in TPC-W benchmark,which verifies that the change data capture based on log has the better database performance and cache consistency effects compared with the change data capture based on trigger.

    • Code Reviewer Recommendation Based on Time and Impact Factor for Pull Request in Github

      2016, 25(12):155-161. DOI: 10.15888/j.cnki.csa.5455

      Abstract (1373) HTML (0) PDF 1.23 M (1985) Comment (0) Favorites

      Abstract:The pull request mechanism is widely used for integrating developers' code in github,so that developers can make contribution for open source projects.The code review of pull request is an essential method to maintain the high quality of code in github.Assigning appropriate reviewers for a newly coming pull request can effectively reduce the delay between the submission of a pull request and the actual review of it.At present,the pull request is assigned manually by core developers in the project.To reduce this cost,we propose a reviewer recommender system based on information retrieval.This method can automatically recommend highly relevant reviewers for a newly coming pull request.Our method has also taken the impact factor and time decaying factor into consideration,and has received good performance that the top 1 precision can reach 68% and top 10 recall rate can reach 78%.

    • Method of Implement Machine Learning Analysis with Workflow Based on Spark Platform

      2016, 25(12):162-168. DOI: 10.15888/j.cnki.csa.005454

      Abstract (2017) HTML (0) PDF 1.49 M (3181) Comment (0) Favorites

      Abstract:By using resilient distributed dataset,Spark is more adapted to iterative algorithms,which are common in data mining and machine learning jobs.However,the development of Spark applications is complicated for data analysts on account of the high threshold to learn scala,the rich experience of code optimization and system deployment,as well as multiple duplicated work due to the low reusing of code.We design and develop a machine learning tool with visible workflow style based on Spark.We design the stages of machine learning with workflow modules,including data preprocessing,feature processing,model training and validation.Meanwhile,a friendly user interface is brought forward to accelerate the design of machine learning workflow model for analysts,with the support of auto parsing from modules to Spark jobs by server end.This tool can greatly improves the efficiency of machine learning development on Spark platform.We introduce the theoretical methods and critical techniques in the paper,and prove its validity with a real instance.

    • Singularity Avoidance Planning Algorithm Based on the Identification of Singular Configurations

      2016, 25(12):169-175. DOI: 10.15888/j.cnki.csa.005505

      Abstract (1267) HTML (0) PDF 1.22 M (2458) Comment (0) Favorites

      Abstract:This paper firstly summarizes the research on the singularity in the past.One is the study of how to avoid it,the other is the study of how to pass the singular point.On the basis of previous studies,a new method is proposed to avoid the singular location based on the space region limited.The main point is to pre-plan the motion trajectory of the robot,and then give a method about how to differentiate the singular position and the adjacent singular position to ensure that a reasonable interpolation point can be planned during the Cartesian space planning.Meanwhile,based on the higher order polynomial theory,joint space planning is optimized to ensure the continuity and stability of joint and terminal motion.Taking 6 axis manipulator in wrist joint singular as an example,we use the proposed algorithm to analyze the process of the singular position.Given the parameters such as the initial point and the target point,the data obtained is simulated graphically in MATLAB,and the correctness and feasibility of the algorithm are verified.

    • SCD File Comparison Algorithm Based on Hierarchy Match and Longest Common Subsequence

      2016, 25(12):176-181. DOI: 10.15888/j.cnki.csa.005506

      Abstract (1189) HTML (0) PDF 1.04 M (2498) Comment (0) Favorites

      Abstract:IEC61850 communication has been widely used in electric power system,and SCD file is adopted to describe the Substation Communication System.Hierarchical structure of the SCD file is an XML format,making it not suitable for direct text comparison methods.Meanwhile,the levels of SCD file hierarchy are too many for pure structured comparison methods,which make them lack of time and space efficiency.Based on characteristics of the SCD file,this paper proposes a hierarchical combined approach of structured match and text comparison.Firstly,we abstract critical attribute names with hierarchy information of IED/AccessPoint/LDevice and compare the hierarchy correspondently with structured comparison method which is based on critical attributes.Secondly,we compare the content of LNode with what is based on longest common subsequence algorithm.This combined method could remove invalid differences arising by sequence modification,and could complete the comparison much faster with more accurate and straight forward comparison results.

    • Optimization of Redundant Backup Components in Complex Polymorphic System

      2016, 25(12):182-186. DOI: 10.15888/j.cnki.csa.005497

      Abstract (1199) HTML (0) PDF 1008.08 K (1824) Comment (0) Favorites

      Abstract:In the complex polymorphic system,system reliability is very important,and the most common mode to realize the system reliability is the cold and hot backup mode.In this paper we propose a hybrid redundant backup mode,to calculate the reliability of complex systems and task cost,and to solve the problems of optimization distribution and initialization of backup components in complex system.With the probability distribution of discrete mathematics,this paper mainly calculates the reliability and task cost of components in complex system.Then,use quantum genetic algorithm to solve the problem of redundancy backup element optimization distribution.Finally,simulation is implemented to calculate the reliability of the system,the expected task cost,and optimization distribution of redundant backup devices.It concludes the balance relationship between reliability and task cost of complex system.

    • Low-Cost Algorithm for Stream Data Classification

      2016, 25(12):187-192. DOI: 10.15888/j.cnki.csa.005556

      Abstract (2209) HTML (0) PDF 1.18 M (1891) Comment (0) Favorites

      Abstract:Existing classification algorithms for data stream are mainly based on supervised learning,while manual labeling instances arriving continuously at a high speed requires much effort.A low-cost learning algorithm for stream data classification named 2SDC is proposed to solve the problem mentioned above.With few labeled instances and a large number of unlabeled instances,2SDC trains the classification model and then updates it.The proposed algorithm can also detect the potential concept drift of the data stream and adjust the classification model to the current concept.Experimental results show that the accuracy of 2SDC is comparable to that of state-of-the-art supervised algorithm.

    • Significant Feature Extraction for the Dental Point Cloud Data

      2016, 25(12):193-198. DOI: 10.15888/j.cnki.csa.005625

      Abstract (1272) HTML (0) PDF 1.13 M (2470) Comment (0) Favorites

      Abstract:With the development of laser scanning measurement technology,the detailed information about the surface point cloud data of the geometric model is more abundant due to the more efficient data detection accuracy,make it more precise to show the surface features of objects.However,the corresponding technical challenges may appear at the same time because of such a large amount of point cloud data,which can be used in the computer file storage,data post-processing and software visualization inconveniently and inefficiently.A new algorithm is introduced in this paper.Firstly,we make a space division for point cloud data and establish the domain relationship using the grid method.Secondly,we estimate the point cloud normal vector by means of local surface fitting.Thirdly,we find out the significant value of the coordinate points using the point cloud K field method.Finally,we achieve the point cloud octree according to the significant value.In a word,this algorithm realizes the goal that the significant features of the point cloud can be extracted and the amount of the point cloud data can be simplified.Not only does it retain the advantages of the detail characteristics of the point cloud,but also make it more effective.

    • Multi-Threshold Image Segmentation Method Based on Improved Differential Evolution Algorithm

      2016, 25(12):199-203. DOI: 10.15888/j.cnki.csa.005537

      Abstract (1151) HTML (0) PDF 1.12 M (2749) Comment (0) Favorites

      Abstract:The threshold method is a simple and effective image segmentation technique.However,the threshold method also has obvious disadvantage,the amount of calculation for solving threshold appears to be exponential amplification with the increase of threshold.In order to overcome the shortcomings of large computation load and long computation time for multi-threshold image segmentation,we introduce an improved differential evolution algorithm,which proposes a new mutation strategy,adopts self-adaption scaling factor and cross factor,and newly adds Perturbation strategy.In order to achieve multi-threshold segmentation,the improved algorithm considers multi-threshold segmentation as an optimization problem whose objective function is formulated according to Otsu.Experimental results show that compared with other algorithms,the improved algorithm not only can achieve an accurate image segmentation result,but also has a faster speed.

    • Design Feature Reconstruction for B-Rep Solid Models

      2016, 25(12):204-209. DOI: 10.15888/j.cnki.csa.005468

      Abstract (1700) HTML (0) PDF 1.32 M (2427) Comment (0) Favorites

      Abstract:Solid models only provide low-level geometry information of products and do not have high-level feature information.As a result,it is very difficult to modify the solid model.It is necessary to reconstruct design features from the solid model and transform a solid model to a feature model.The cutting loop can be identified by a cutting loop search algorithm and then the relation graph of cutting loop is built.According to the relation graph,design feature can be identified and the feature model can be built.Finally,a reconstruction example is provided,which demonstrates the effectiveness of the presented method.

    • Uniform Spatio-Temporal Power-Grid Data Model and Access Technology

      2016, 25(12):210-214. DOI: 10.15888/j.cnki.csa.005566

      Abstract (1314) HTML (0) PDF 1.17 M (2931) Comment (0) Favorites

      Abstract:In the development of power-grid GIS,there are varieties of files and many types of spatial database formats,and also a large number of grid spatio-temporal data are produced.In order to solve the problem of heterogeneous data and the application of spatio-temporal data in data exchange between different systems,data model and access technology of unified spatio-temporal power grid are proposed.Based on practical applications,this paper solves the use of heterogeneous data and temporal data from the data and access level by using the metadata concept and software plug-in model.It is proved by the application that the unified spatial data model and access technology can effectively reduce the workload of data preparation and system development,and can integrate the advantages of different data sources.

    • Branching Bisimulation with Explicit Divergence in Concurrent Systems

      2016, 25(12):215-220. DOI: 10.15888/j.cnki.csa.005431

      Abstract (1331) HTML (0) PDF 1.10 M (1929) Comment (0) Favorites

      Abstract:The notion of branching bisimulation with explicit divergence was introduced by van Glabbeek and Weijland.It is used to define an equivalence relation ≈b,which means to be the weakest equivalence with the property of branching bisimulation and divergence preservation.However,in that paper it only claims that ≈b is an equivalence with such properties without proofs,and as it turns out that the proving is not obvious.In this paper we introduce an equivalence relation called coloured complete trace equivalence,and prove that it is the weakest equivalence which has the property of branching bisimulation equivalence and is also divergence preserving.We then prove that the coloured complete trace equivalence coincides with ≈b,thus supplementing the work of van Glabbeek and Weijland.

    • Methodology of Capturing and Using DevOps Knowledge for Cloud Services

      2016, 25(12):221-226. DOI: 10.15888/j.cnki.csa.005318

      Abstract (1382) HTML (0) PDF 1.25 M (2042) Comment (0) Favorites

      Abstract:DevOps is an emerging paradigm to achieve the highly collaboration between system development and operations in order to enable high frequency of software deployment and improve the reliability,stability,elastic and security of production environment.DevOps is typically combined with Cloud computing to realize rapid,on-demand provisioning of underlying resources.Today,an ever-growing amount of DevOps tools,reusable artifacts and Cloud services are available to implement DevOps automation,and a huge number of DevOps knowledge scatters between different communities and sources.As a result,how to make an appropriate decision and select the most suitable method and tools during application design and deployment has become a big challenge.To address this issue,we propose an approach to manage and utilize DevOps knowledge systematically.The approach firstly captures,links,transforms and stores DevOps knowledge from multiple resources in various ways.Then the approach proposes a set of DevOps knowledge taxonomy and implements a knowledgebase prototype.Finally,the approach describes application of DevOps requirements based on predicate logic,and shows how this knowledgebase is utilized.

    • Moving Objects Detection Based on Low-Rank Matrix Decomposition

      2016, 25(12):227-233. DOI: 10.15888/j.cnki.csa.005585

      Abstract (1300) HTML (0) PDF 1.43 M (2704) Comment (0) Favorites

      Abstract:Moving objects detection is one of fundamental tasks of video surveillance.Specific to the poor identification capability and low accuracy to shadow in gray information,this paper proposes a novel moving objects detection method based on the combination of Low-Rank Matrix decomposition and HSV color information.Firstly,we convert the images from RGB space to HSV space,construct observation matrix for H,S,V channels,respectively,and optimize the observation matrix through Low-Rank Matrix decomposition to obtain H,S,V channel's foreground component and background component;combing H,S,V channels foreground component in order to get roughly moving object district.Secondly,the moving shadow should be detected and eliminated from the foreground image,after combining H,S,V channels component to get the row processing foreground objects and the column processing foreground objects,the row processing foreground image and the column processing foreground image are combined to obtain the moving objects image.Finally,by morphological processing and connectivity detection to eliminate the noise,the accurate foreground moving objects can be obtained.The experimental results demonstrate that the proposed method is much better than others in increasing accuracy of moving objects detection.

    • Optimization of BLAS Level 3 Functions on SW1600

      2016, 25(12):234-239. DOI: 10.15888/j.cnki.csa.005456

      Abstract (1453) HTML (0) PDF 1.16 M (4770) Comment (0) Favorites

      Abstract:BLAS is one of the most important basic underlying math library for scientific computing,in which the level 3 BLAS functions are most widely used.In this paper,we provide a high-performance method to implement Level 3 BLAS functions based on domestic Sunway 1600 platform.To make it clear,we take GEMM as an example.For the implementation on single-core,we apply many tuning techniques related to the specific platform,such as multiply-add instructions,loop unrolling,software pipelining and instruction rearrangement,SIMD operations,and register blocking to push up the performance.For the multi-core implementation,we propose an efficient multi-threaded method.Compared with GotoBLAS,one of the famous open-source BLAS,the experiments show that our serial single-threaded method achieves a speedup of 4.72.What's more,the average speedup of 4-threaded execution towards the single-threaded one can also reach 3.02.

    • Design of Medium-High Frequency RFID Double-Layer Antenna with Two Drive Ports

      2016, 25(12):240-244. DOI: 10.15888/j.cnki.csa.005491

      Abstract (1853) HTML (0) PDF 1.19 M (2416) Comment (0) Favorites

      Abstract:In order to enhance the magnetic field strength of antenna coil in space,this paper proposes a method of double-layer antenna with two drive ports.First of all,this paper introduces each parameter which should be considered in the view of theory.Secondly,we change the parameters of the double-layer antenna,model and simulate it with the 3D electromagnetic simulation software Ansoft HFSS.Then,the influence of the coil number,the coil spacing,radius and the relative position of two coils on the double-layer antenna is researched.Finally,the simulate results show that the optimal design of double-layer antenna is found out and it is meaningful to the actual design of the antenna in medium-high frequency RFID reader systems.

    • Research and Implementation of Rapid Loading Picture and Text Information Based on Android

      2016, 25(12):245-249. DOI: 10.15888/j.cnki.csa.005466

      Abstract (1159) HTML (0) PDF 1.08 M (1709) Comment (0) Favorites

      Abstract:This paper proposes the issue that we should speed up the loading rate of image and text information on the Android mobile terminal,and meanwhile make users convenient to fast access to relevant information by browsing interface.On the basis of the relevant technology,this paper combines the Android image open source view with smart-Image-View,Network request framework,android-async-http and paging display technology.After using a large number of textual and graphic data to do the experiment,the result shows that the combination use of the three methods made it success to improve the loading rate of image and text information.

    • Docker Resource Information Isolation Method Based on LKM

      2016, 25(12):250-254. DOI: 10.15888/j.cnki.csa.005536

      Abstract (1468) HTML (0) PDF 959.02 K (2139) Comment (0) Favorites

      Abstract:In view of the problem that the memory resource information in Docker container is not isolated,we design a resource information isolation method based on LKM technology.The method in the form of LKM uses system to call hijacking to modify the reading of the procfs file content,so as to realize the function of the Docker container resources information isolation,on which the containers run without any modification can achieve the purpose of resource information isolation.The experiments prove that the resource information isolation function is available.

    • Counterfeit Money Crimes Information Analysis System Based on Heterogeneous Information Networks

      2016, 25(12):255-261. DOI: 10.15888/j.cnki.csa.005457

      Abstract (1960) HTML (0) PDF 1.34 M (2028) Comment (0) Favorites

      Abstract:The query condition of traditional criminal query is a text,and query results are ordered documents lists.However,the way is not conducive to present the relationship of the results and help the police find clues of cases.Therefore,this paper reconstructs counterfeit crime data in the form of information network based on heterogeneous information network information,and constructs a counterfeit money crimes information network.We apply name disambiguation to build relationships of the suspects in counterfeit crime information network,and study relevancy problem of counterfeit money crimes information network using learning to rank methods.In this paper we design and implement the counterfeit money crimes information analysis system.To resolve the query problem of the criminal data,we use the entity as a query term and the network graph as the query results.

    • Real-Time Monitor of Dynamic Memory Based on C++

      2016, 25(12):262-267. DOI: 10.15888/j.cnki.csa.005459

      Abstract (1460) HTML (0) PDF 1.08 M (2762) Comment (0) Favorites

      Abstract:Through the summary of the common memory errors research in the geophysical software development process,we design and implement a dynamic memory detection tool based on C/C++ by using the embedded and key function interception,which can expand and improve the compiler open interface.Through the real-time collection,classification,statistic and analysis of the heap memory usage in the running process of software,the tool achieves dynamic monitoring and detection of false memory stack.We take the NEWS software subsystem of prestack and poststack joint interpretation module process as an example to test and apply it comprehensively.The practice shows that the monitor,embedded in the software,can greatly reduce the memory leak phenomenon during the development process,and decrease the runtime memory errors caused by abnormal collapse phenomenon,and improve the stability of the application software.It also plays a strong role in the development to help tester's in rapid location and analysis of software errors.

    • Research and Application of Cross Platform Technology in Mine Monitoring Systems

      2016, 25(12):268-271. DOI: 10.15888/j.cnki.csa.005513

      Abstract (1071) HTML (0) PDF 962.42 K (1956) Comment (0) Favorites

      Abstract:Because of the diversity of classification in mobile software development platform,each platform is not compatible with each other.The developer must spend a lot of time in modification,transplantation and maintenance of software.This paper proposes an application development program of cross platform (one time code,multiple deployment),by using the Hybrid App which combines the advantages of Web App and Native App.It has the characteristics such as Web Storage function,cross platform,etc.The program is used in the mine monitoring system development.In addition,it can ensure the security of user information,for encrypting the user password.These managers of mine can check the internal operating enviornment at any time,anywhere through the app monitor.It also realizes real-time monitoring effectively and reduces the occurrence of accidents in mine.

    • Safe and Efficient Mobile Terminal Digital Signature Scheme

      2016, 25(12):272-275. DOI: 10.15888/j.cnki.csa.005515

      Abstract (1488) HTML (0) PDF 967.08 K (2313) Comment (0) Favorites

      Abstract:Digital signature technology is an important way to ensure the safety of terminal application.But due to the limited computing resources and security constraints on the mobile terminal,the mobile terminal can not guarantee the security of the private key.This paper designs a safe and efficient solution based on the digital signature technology,combining mobile terminal with signature server.The key is distributed into two parts,one part is stored in the signature server and the other is distributed to mobile terminals,the signature must include the two parts.Through this identity-based threshold signature technology,we realize the secure mobile terminal digital signature in the case of signature key can't guarantee safety.

    • Location Technology of Wireless Sensor Networks in Narrow and Long Area

      2016, 25(12):276-279. DOI: 10.15888/j.cnki.csa.005596

      Abstract (1274) HTML (0) PDF 958.65 K (2035) Comment (0) Favorites

      Abstract:Wireless sensor network (WSN) has been widely used in various fields.Node localization is one of the most important technologies.According to the characteristics of uniform deployment of nodes along the boundary of narrow and long regions,we propose a range-free localization algorithm based on RSSI——the location regions may be divided into more location sub-areas by a perpendicular bisector of any two beacon nodes next to the target node,determining which one the target node is located by comparing the value of signal strength received,finally,the centroid of which is used as the position coordinates of the target node.Simulation results show that,compared with the Approximate Point-in-Triangulation Test (APIT),it has more division areas of PB-RSSI,lower computable complexity,higher location accuracy,better robustness and lower energy consumption.

    • Multi-Tenant High Availability Parallel Task Scheduling Framework

      2016, 25(12):280-284. DOI: 10.15888/j.cnki.csa.005645

      Abstract (1575) HTML (0) PDF 958.12 K (3425) Comment (0) Favorites

      Abstract:This paper describes design ideas,architecture and implementation techniques of a kind of multi-tenant high availability parallel task scheduling framework named MTHPT.It consists of three parts:task definition and configuration,asynchronous parallel task scheduling mode,alarm messages and monitoring.Task scheduling engine and task execution components use separate deployments,asynchronous parallel scheduling and fast callback mode,quick releasing thread resource scheduling engine,which can solve such issues as:part of the task long implementation cycle,timed task that can not be performed on time and other issues that affect the business performance of the system.Task scheduling configuration provides a multi-tenant application model.Experimental analysis and assessment show that MTHPT improves the efficiency and stability of task parallel scheduling application system.

    • Pumping Unit Diagnose Based on Muli-Instance and Multi-Label

      2016, 25(12):285-288. DOI: 10.15888/j.cnki.csa.005255

      Abstract (1259) HTML (0) PDF 951.56 K (2094) Comment (0) Favorites

      Abstract:The operating condition data of pumping unit can be described from the aspects of displacement,load and electric current.If only one feature vector is used to describe the operating condition of the pumping unit,the information will be too simplified,and it will lost some effective information.In view of the above problems and polysemy which is the essential characteristics of operating condition data,the fault diagnosis of pumping unit based on multi-instance and multi-label is presented.In this study,the displacement,load and current data of the pumping unit are used as multiple instances of pumping unit working condition data bags.Using k-medoids clustering algorithm cluster the bags and convert bags into several instances.Each dimension of the new instance indicates the distance from the bags to each cluster center,and then the MLSVM algorithm is used to solve the multi label problem.Experimental results show that multi-instance and multi-label learning can diagnose the trouble of oil pumping machine timely and accurately.


Volume 第25卷, No. 12

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063