• Volume 25,Issue 3,2016 Table of Contents
    Select All
    Display Type: |
    • Reliability Analysis and Testing for Domestic Foundational Software

      2016, 25(3):1-7. CSTR:

      Abstract (1708) HTML (0) PDF 863.03 K (3671) Comment (0) Favorites

      Abstract:After routing testing, domestic foundational software still has a few reliability problems. As a result, based on the characteristic of domestic foundational software and its special requirement on reliability, the paper combines with Musa profile model and Markov chain model and proposes a Markov chain model with tags. A method of generating the reliability testing cases is presented. Finally, we analyze and validate the reliability testing method proposed here and the research is provided to be useful.

    • Malware Dynamic Analysis Cloud

      2016, 25(3):8-13. CSTR:

      Abstract (1818) HTML (0) PDF 670.58 K (2638) Comment (0) Favorites

      Abstract:Although traditional anti-virus software is fast, feature code based detection mode will be a restriction. Dynamic analysis based on sandbox is better at finding malware via software behavior. It can not only find malware for client but also help malware analyzer working faster. In purpose of increasing usability and efficiency of analysis based on sandbox, a malware dynamic analysis cloud is designed and implemented. Through distributed control mechanism, we can ensure the system's capability and flexibility. A malicious software can be distinguished based on the result of the analysis. Experiments show the system can effectively detect malware behavior with high efficiency.

    • Multiple Factors Addictive Model for Mid-Term Electric Load Forecasting

      2016, 25(3):14-20. CSTR:

      Abstract (1504) HTML (0) PDF 790.25 K (2642) Comment (0) Favorites

      Abstract:Accuracy forecasting of electric load is important for power system to make plan. A Multiple Factors Addictive(MFA) model is proposed to predict mid-term electric load based on Europe(EUNITE) competition dataset and North American electric dataset. Firstly, MFA considers factors such as temperature, holiday, and week separately to fit functions for electric loads. And then all these fitted functions are added together to a unified function, which is used to make prediction of the electric load. Seven other state-of-art algorithms which are popular in the field are also used to make forecasting. The performances of prediction models are evaluated by using 6 different metrics. Compared with 7 other kinds of different models prediction results, MFA has the advantages of more accurate forecasting performance and faster operational speed, and is simple and easy to understand.

    • Comparison of Membership Correction Fuzzy C-Means Clustering Algorithms

      2016, 25(3):21-27. CSTR:

      Abstract (1509) HTML (0) PDF 858.64 K (2524) Comment (0) Favorites

      Abstract:In order to study on the fuzzy C-means clustering algorithm deeply, starting from the angle of improving convergence speed of the algorithm, the membership correction fuzzy C-means clustering algorithms which are represented by RCFCM, S-FCM, PIM and FCMα algorithm etc. are summarized and the research progress is tracked. To show the panorama of the algorithms, the nature and characteristics of each algorithm are analyzed by the experiments with different parameters and different fuzzy index. According to the experimental results, the direction of further research of the algorithms is pointed out. The above work can provide a valuable reference for further research on FCM algorithm.

    • Research and Analysis of QSP Algorithm

      2016, 25(3):28-33. CSTR:

      Abstract (1412) HTML (0) PDF 720.64 K (2325) Comment (0) Favorites

      Abstract:BM algorithm is a classical single pattern matching algorithm. QS algorithm is an improved algorithm of BM algorithm. Because computing the moving distance to right position only by analyzing the character T[j+m], the overall matching efficiency of QS is not high. Therefore, an improved algorithm(QSP) accordingly to the QS algorithm is proposed. The core idea of QSP algorithm is finding all characters that appear more than once in the pattern string from left to right, calculating the jumping expectation difference value of these characters, getting the highest expectation difference value and maxPos value that is the position of it in the preprocessing phase, and changing the value of skipp2 array. During the matching phase, in order to move the pointer farthest at each time, it firstly considers the relationship between P[maxPos] and T[j+maxPos], then moves to right by using the skipp1 and skipp2 arrays. The experimental result shows that the comparison number and matching time of QSP are less than QS. Its efficiency has been improved obviously.

    • Data Mining Method for Public Buildings Energy Consumption Based on Hadoop

      2016, 25(3):34-42. CSTR:

      Abstract (1914) HTML (0) PDF 897.56 K (2347) Comment (0) Favorites

      Abstract:The utilization of building energy consumption data is still inefficient. According to this problem, in this paper, a new method based on Hadoop for data mining of public buildings energy consumption combining with building information is proposed. The paper designs the data mining system of public building energy consumption based on Hadoop, and performs designs and illustrations to the basic framework and functional modules. Apriori algorithm and C4.5 algorithm are implemented distributively using MapReduce programming model. The paper takes 100 office buildings in Shandong Province as examples to analyse the data of air conditioning system energy consumption. The experimental conclusions are the influence rules of 6 kinds of building information on air conditioning system energy consumption. Moreover, the experiment obtains the decision tree of air conditioning system energy consumption. According to the decision tree, we can distinguish the energy consumption level of air conditioning system, and offer targeted advice on energy saving renovation of sample buildings.

    • Fault-Tolerant Design of MiniCore Operating System Based on Servent/Exe-Flow Model

      2016, 25(3):43-49. CSTR:

      Abstract (1272) HTML (0) PDF 675.55 K (2190) Comment (0) Favorites

      Abstract:Computer systems require high reliability in space environment. Contrary to limited storage space for embedded real-time systems, considering the memory reliability and Fault-tolerant task, we propose a two level of fault-tolerant solution. The program consists of a periodic memory detecting and an error correcting mechanism of system-level and an improved master/slave version scheduling mechanisms of task-level. The experimental verification of the program is carried out in an embedded operating system named MiniCore which based on a service body/execution flow model(SEFM). The introduction of fault-tolerant mechanism increases the code size of MiniCore kernel by 33% and ensures the accuracy of the memory data, with the system's time performance declining slightly and the success rate and scheduling performance of task execution improving significantly.

    • Visualization Method of City Public Bicycle Rental Data

      2016, 25(3):50-55. CSTR:

      Abstract (1442) HTML (0) PDF 1.01 M (2639) Comment (0) Favorites

      Abstract:Bicycle has become a common transport means of the general public in public travel. The distribution range of Hangzhou public bicycle system has covered the whole Hangzhou. Visualization and analysis method of study of public bicycle system includes gaining each station's rental data by query, and historical statistic data including that of last week, yesterday and today. Furthermore, the users can select some stations and this system will show their statistic data in one graph in order to realize the trend of an area by interactive analysis to help people fully understand and analyze data and forecast each station's rental trend.

    • Mobile Remote Supervisory Control Systems for Wind Turbines Based on OPC XML-DA

      2016, 25(3):56-60. CSTR:

      Abstract (1411) HTML (0) PDF 661.15 K (2078) Comment (0) Favorites

      Abstract:In view of the problem of the Remote Supervisory Control System of wind turbines, we design a solution based on the mobile Internet technology and implement it. The mobile client based on the Android operating system for the mobile remote supervisory control of wind turbines is developed. We create the state and fault monitoring software based on XML-DA OPC which exchanges data via Internet, resolving the problems of the interface protocols compatibility of hardware equipment and multi-platform supporting requirements. In this paper, the overall framework of the monitoring scheme is introduced, the design idea of OPC XML-DA server and mobile client is described, and the function is realized. The test results show that this system can accomplish the real-time monitoring of the wind turbines efficiently. In addition, this system can be applied in the field of smart home and various industrial control areas.

    • Design and Implementation of Hospital Information Analysis Algorithms Library Based on Web Service

      2016, 25(3):61-66. CSTR:

      Abstract (1751) HTML (0) PDF 930.09 K (2306) Comment (0) Favorites

      Abstract:The paper discussed the main problems about the complex data sources and customization, sharing and dynamic maintenance of information analysis algorithms in the field of HIS information analysis. The meta-data description of information analysis algorithms was given. The information analysis algorithm management module and information analysis algorithms library system based on Web Service were built. The paper realized the loose coupling of the data and the algorithm and the dynamic management of information analysis algorithms library compared with the traditional information analysis algorithms library. Experiment results show that the system can improve the maintainability and generality of information analysis in HIS.

    • Standard Documents Resources Visual Analysis Systems Based on Solr

      2016, 25(3):67-71. CSTR:

      Abstract (1572) HTML (0) PDF 717.49 K (2208) Comment (0) Favorites

      Abstract:China National Institute of Standardization currently has large bibliographic databases and full-text databases. Facing the massive data, researchers without computer-related knowledge are difficult to conduct a comprehensive understanding of the relevant data. Thus this paper proposes the standard documents resources analysis system based on Solr. This paper designed and implemented the customized statistical features and relation analysis of the drafters and organizations of the standard documents. The system allows researchers to freely analyze the standard documents data, which greatly enhances the efficiency of the data analysis and promotes the development of related research.

    • Construction of Docker-Based PaaS

      2016, 25(3):72-77. CSTR:

      Abstract (1885) HTML (0) PDF 710.94 K (3424) Comment (0) Favorites

      Abstract:The enterprise system becomes huger and more complicated with the increase of information building. And the developers must face this challenge. There are many difficulties to overcome with the work of design, development and testing. This paper provides a solution with PaaS based on Docker to solve this problem. There are many technologies in this solution, such as the VM technology with docker, SOA, service discovery technology with docker and configuration work base on private cloud. Using these technologies, we can manage the development and testing environment more smoothly, and also manage the architecture of the system and deployment more effectively.

    • TO Focal Length Test and Automatic Laser Welding System

      2016, 25(3):78-82. CSTR:

      Abstract (1974) HTML (0) PDF 1.06 M (3194) Comment (0) Favorites

      Abstract:An image analysis based TO focal length test and automatic laser welding method is proposed through BOSA device structure analysis. TO moves every single step up from an initial point driven by a stepper motor. An image acquisition system is utilized to collect spots images of TO focal point. The optimal position of TO focal point, which is located on the bonding surface of mortise and round square tube, is obtained through OpenCV based image analysis methodology. TO is then fixed by laser welding. Experiment results show that the system has high accuracy and good practicality.

    • Design of Human Machine Interaction and Communication Systems Based on WEINVIEW Touch Screen and MODBUS Protocol

      2016, 25(3):83-87. CSTR:

      Abstract (1557) HTML (0) PDF 815.20 K (2510) Comment (0) Favorites

      Abstract:Human machine interface development of rapid configuration has become a current trends in the field of touch screen PC interface display. A standard industrial communication protocol can realize standardized equipment access of multiple areas. Combined with the design of electronic products demand, this paper realizes the host computer interface development of WEINVIEW touch screen as human computer interaction platform and software system framework of the standard MODBUS RTU protocol as data transmission under RS232C electrical interfaces. The supporting EB8000 software has been used to design human machine interaction, which has friendly interface and rich modeling resources and can be learned easily and operated conveniently, reducing the developer quantities of interface design. MODBUS RTU protocol frame format is used, which is simple, compact, easily to use and interact with the console computer, meeting developer & users' product development. Finally, an instrument product software system including host computer, communication module and console computer is demonstrated.

    • CIS Image Acquisition System Based on CPLD

      2016, 25(3):88-92. CSTR:

      Abstract (1713) HTML (0) PDF 718.60 K (3567) Comment (0) Favorites

      Abstract:CIS(contact image sensor) is the conventional sensor in the field of image scanning. In the application of concrete engineering, the image acquisition schemes of CIS sensor have many differences, and the performance is also uneven. Aiming at solving the problem of CIS high-speed acquisition, this paper proposes a new way, which has advantages compared with traditional solutions, such as good generality, high acquisition speed, easily expanded, low cost, and so on. This paper discusses in detail design plan of CIS high-speed image acquisition based on CPLD, and has full analysis on experimental results.

    • Classification System of Random Texture Ceramic Tiles Based on Machine Vision

      2016, 25(3):93-100. CSTR:

      Abstract (1626) HTML (0) PDF 906.00 K (3041) Comment (0) Favorites

      Abstract:Aiming at the problem of poor efficiency of ceramic tile production caused by the mismatch between higher and higher speed of production and slow speed of artificial classification, the paper presented an algorithm about extracting the features of color and texture of ceramic tiles and an algorithm about improved multilayer perceptron neural network(MLPNN) aiming at the problem of multi-classification based on machine vision software, HALCON 11.0, as the development platform. Firstly, the images of ceramic tiles were denoised as pretreatment. Then the system extracted the hue features of ceramic tiles in HSI color space, calculated the gray level co-occurrence matrix(GLCM) and gray level characteristics of amplitude distribution to reflect the texture feature of ceramic tiles, and put the features as input layer neurons of multilayer perceptron neural network. Next, the paper designed the multilayer perceptron neural network with putting softmax function as the activation for pattern matching, and compared with the pattern matching method of BP neural network. Finally, an experimental prototype of classification system was built with simple user interface. The experimental results show that, the classification accuracy for all kinds of ceramic tiles in the experiments are over 90%. The system has high classification accuracy for the random texture ceramic tiles and can be applied to production of ceramic tiles.

    • Forest Fire Smoke Recognition Based on Color and Texture Features

      2016, 25(3):101-106. CSTR:

      Abstract (1512) HTML (0) PDF 767.92 K (3396) Comment (0) Favorites

      Abstract:Aiming to implement the intelligent early warning of forest fire, a method based on color and texture features was proposed for forest fire smoke recognition. First, the color features were used to determine the smoke suspected area. Besides, the local binary pattern variance(LBPV) was utilized to extract the irregular feature of texture in the suspected area, and the LBP images was got. Wavelet transform was then used to extract the fuzzy, complex and correlative features from LBP images. At last, the fire smoke was identified by support vector machine(SVM). The result demonstrated that the method based on color and texture features has good recognition of forest fire smoke, which provides an effective solution for the study of forest fire smoke recognition.

    • Image Mosaic Technology Based on Feature Point Match

      2016, 25(3):107-112. CSTR:

      Abstract (1743) HTML (0) PDF 1.17 M (2940) Comment (0) Favorites

      Abstract:This paper proposes a panoramic image mosaic method based on feature points matching. This method firstly uses the sift algorithm to extract the image feature points and uses Harris algorithm to optimize the image feature extraction. Then the BBF algorithm based on K-d tree is used to find and determine the initial matching points and complete the coarse matching of the feature points. Then according to the result of image registration, robust RANSAC algorithm is utilized to filter coarse matching feature points and calculate the transformation matrix H. Finally, the gradually fading out fusion algorithm of the weighted average is used in the seamless Mosaic of two images, form a complete panoramic view picture. Experimental results verify the effectiveness of the proposed method and the splicing effect is better.

    • Mining for Hot Topics in Online Forum Based on Improved BP Network

      2016, 25(3):113-118. CSTR:

      Abstract (1917) HTML (0) PDF 801.57 K (2286) Comment (0) Favorites

      Abstract:To solve the problem of slow convergence speed of BP network, a method is proposed to improve BP network by combining ameliorating learning rate and adding momentum factor. This paper developed a prototype system with improved BP network as the core of hot topics mining by Java programming language. Experimental results show that the system could acquire the classification results of hot topics according with the real public opinions quickly and exactly. The research result can help inform residents with instant hot spots as well as track public opinions so as to respond accordingly for governments and public enterprises.

    • Split Counting Bloom Filter and its Application in Hbase Secondary Index

      2016, 25(3):119-123. CSTR:

      Abstract (1584) HTML (0) PDF 695.90 K (2722) Comment (0) Favorites

      Abstract:A new variant of Counting Bloom Filter was set up to build Hbase secondary index to support the retrieval of non-primary key data, which solved the problem that Hbase only supported the main index structure and retrieve data through the primary key and the primary key range. The new variant, Split Counting Bloom Filter(SCBF), was proposed according to the high overflow probability problem of Counting Bloom Filter(CBF) after analyzing existing CBF technology. SCBF divided standard CBF into multiple independent regions, which stored elements' fingerprint by all these areas. Comparing SCBF with CBF, the experimental result shows that, SCBF contributes to much lower overflow probability, which improves the performance of filter, and can be used to build the Hbase secondary index.

    • Particle Filter Fault Prediction Based on Dynamic Time Warping Match

      2016, 25(3):124-130. CSTR:

      Abstract (1233) HTML (0) PDF 783.59 K (2023) Comment (0) Favorites

      Abstract:The existing particle filter fault prediction methods give the predictive value of the corresponding time by the particle filter algorithm, and then compare the distance between forecasting sequence and observation sequence to predict the fault. However, this fault prediction method can not handle the condition that the length of forecasting sequence is different from that of observation sequence. Dynamic Time Warping is a pattern matching algorithm based on nonlinear, which is suitable for the time sequence of different lengths. This paper is from the new perspective of using the Dynamic Time Warping algorithm to measure the similarity between normal working equipment's time sequence and abnormal sequence caused by potential faults, and design the system normal degree and abnormal degree to distinguish whether the device is operating properly or not, thus predict potential faults. Experimental results demonstrate the feasibility of this method, which can predict the system faults timely and accurately.

    • Latency Reduction of EAST PCS

      2016, 25(3):131-135. CSTR:

      Abstract (1657) HTML (0) PDF 649.17 K (1920) Comment (0) Favorites

      Abstract:The control cycle of the Plasma Control System(PCS)currently is 100μs and the delay could reach to 80μs due to the data transfer and the inadequate cooperation among different CPUs. However, the delay in theory is within 15μs, so the loads of all the CPUs need to be balanced in order to reduce the delay and improve the performance of this control system. In addition, with the multi-thread parallel technique and shared memory, the time-consuming process of reading data from RFM can run in parallel with the main process, which could shorten the control cycle to 50μs and the delay to 30μs or less. Therefore, the efficiency of PCS could be highly promoted and the reduction of unnecessary delay could prevent PCS from becoming the bottleneck of the whole TOKAMAK control system.

    • Mine Based Motor Fault Detection Model Based on PSO-SVM

      2016, 25(3):136-141. CSTR:

      Abstract (1232) HTML (0) PDF 720.51 K (2772) Comment (0) Favorites

      Abstract:Traditional intelligent fault detection model such as neural network has some faults such as lacking of self-learning and self-organization, weak generalization ability, easy to fall into local minimum value and single. Intelligent detection algorithm of combination application can integrate advantages of different algorithms and avoid the disadvantages of single algorithm. Therefore, this paper proposes a mine based motor fault detection model based on combination of vector machine(SVM) algorithm and improved particle swarm optimization(PSO) algorithm. Firstly, the optimal parameters for SVM is got by using improved particle swarm optimization(PSO) algorithm, which has better inspiration performance and relapses into local optimal solution less. Secondly, the optimal parameters are used by SVM algorithm to train sample data for data classification, because SVM algorithm is good at pattern recognition. At last, a fault diagnosis model has built up. The experimental results show that the method can improve the accuracy of fault detection by 3.33%-17%.

    • Identification Technology of Unknown Shortwave Protocol for Bit Stream

      2016, 25(3):142-146. CSTR:

      Abstract (1814) HTML (0) PDF 790.57 K (2428) Comment (0) Favorites

      Abstract:As the foundation of further signal decoding, protocol identification technique plays a very important role in the information countermeasures. Furthermore, it is a key step for information countermeasures to evolve from signal layer to signal layer combined with information layer. The basic approach of unknown protocols identificated from massive bit-stream data is the bit stream data mining, and looking for information which can determine the type of protocol. In the case of lacking of prior knowledge, frequent pattern sequence appearing in the bit stream data needs to be extracted, and sequence that can identify the type of protocol should be screened out. In order to adapt to the environment of the bit stream, this paper makes an improvement based on the BNDM algorithm, and improves the efficiency of searching the frequent sequences in the binary environment. The experimental results show that unknown protocol identification, protocol data frame alignment and segmentation from massive bit-stream data are realized through the research results of this thesis.

    • Efficient Mobile Sink Trajectory Planning Algorithm in Wireless Sensor Networks

      2016, 25(3):147-150. CSTR:

      Abstract (1585) HTML (0) PDF 672.99 K (2398) Comment (0) Favorites

      Abstract:For the data collection in wireless sensor network with mobile sinks, rendezvous based scheme can reduce latency significantly. Aimed at improving energy efficiency and reducing latency, this paper presents an MS trajectory planning algorithm MS-TPA. MS-TPA mainly includes RN competition and the trajectory planning of MS. The residual energy first RN competition mechanism leads to balanced energy consumption and the trajectory planning algorithm of MS reduces the latency of data collection. The simulation validates its effectiveness.

    • Modeling Semantic Query Expansion of the Foresty Domain Based on Ontology

      2016, 25(3):151-156. CSTR:

      Abstract (1707) HTML (0) PDF 678.51 K (2032) Comment (0) Favorites

      Abstract:The traditional information retrieval model only considers the matches of key words in the corpus, so it cannot recall more comprehensive and accurate results in the forestry domain. Aiming to solve the disadvantage above, the model of semantic query expansion based on ontology is presented for forestry domain. The semantic query expansion is modeled using the semantic reasoning and structure of ontology, and improves the recall and precise ratio in information retrieval finally. This model is a supplementary semantic function for the traditional information retrieval model. The experiment proves that this semantic query expansion model can increase the recall and precise ratio in information retrieval of forestry domain.

    • An Consumption Efficient Resource Discovery Approach of Mobile Cloud Computing

      2016, 25(3):157-163. CSTR:

      Abstract (3489) HTML (0) PDF 730.37 K (2122) Comment (0) Favorites

      Abstract:Aimed at the high consumption of the resource discovery of mobile cloud computing, an adaptive and efficient approach which realizes auto switch the mode is proposed. Firstly, the consumption-resource quality model for two popular resource discovery modes is set up. Secondly, a heuristic algorithm to implement the proposal is designed to adaptively switch the mobile mode to low consumption mode. Finally, mobile devices work under the lower consumption mode all the time. Extensive simulations prove that the proposal has better consumption performance than the approach which works under single mode.

    • Transplantation Method of QR Code Decoding Program Based on Embedded Platforms

      2016, 25(3):164-169. CSTR:

      Abstract (1544) HTML (0) PDF 845.83 K (1918) Comment (0) Favorites

      Abstract:A transplantation method of QR code decoding program based on embedded platform was presented. The UP-NETARM2410-S was selected as the hardware development platform. Firstly, the system hardware composition was given. Then, the whole development process of QR code decoding program using Qt-Creator was introduced in detail. In the test phase, in order to simulate the running state of QR code decoding, the qvfb visual screen was used. Finally, the program was transplanted to true embedded platform. Test results showed that the decoding program can run normally on the embedded platform and correctly decode QR code information. The proposed transplantation method may have certain reference significance for different platforms QR code decoding.

    • Application of MQTT Protocol to Instant Communicationin Mobile Internet

      2016, 25(3):170-176. CSTR:

      Abstract (1391) HTML (0) PDF 673.76 K (2903) Comment (0) Favorites

      Abstract:Instant communication applications in Mobile Internet have become an indispensable part for people's daily communication nowadays. The real-time communication protocol, which is the basis for the development of instant communication applications, however, has no unified standard. The existing real-time communication protocols are not able to perfectly adapt to mobile Internet, which has a constrained network environment with the characteristics of low-bandwidth, limited processing capabilities and high latency. MQTT is a publish/subscribe based, extremely simple and lightweight messaging protocol, whose design principle is to minimize the network bandwidth and device resource requirements. This article first introduces some existing mainstream instant communication protocols and points out their shortcomings in mobile Internet environment. The second part introduces MQTT protocol briefly and studies the format and interaction process of MQTT message. Finally, based on MQTT, the article puts forward an implementation of IM and Presence, which are the core functions of Instant Communication. As a conclusion, the experiment shows that using the MQTT protocol can provide less bandwidth cost and better user experience for instant communication in mobile Internet.

    • Fusing Infrared and Low Light Level Images by Using the Method of Neighborhood Characteristics Regionalization in Domain

      2016, 25(3):177-181. CSTR:

      Abstract (1113) HTML (0) PDF 1.16 M (2122) Comment (0) Favorites

      Abstract:A fusion algorithm for infrared and low-ligh level(visible) images based on neighborhood characteristic and regionalization in NSCT domain was proposed. Firstly, the NSCT was performed on the infrared and visible images at different scales and directions. The low-frequency coefficients were fused with a rule of an improved regional weighted fusion method based on neighborhood energy, and the high-frequency coefficients were fused with a rule of an improved neighborhood energy and regionalization coefficients options and an area variance chooses max based on a neighborhood variance regionalization rule. Finally, the fused coefficients were reconstructed to obtain the fused image. Experimental results show that the information entropy of proposed method is lower than that of the method in the reference whose luminance increases excessively. The introducing of false details of traditional methods results in spatial frequency is slightly higher compared with the proposed method. But the mutual information and edge retention(Q)index value of the proposed method are better and the fusion image is superior to other contrast methods. The proposed method presented better effects in retaining the source images information and capturing details, and fused image had better visual effects.

    • A Method Combining Hough Transformation with ASM to Locate Pupil Landmarks

      2016, 25(3):182-186. CSTR:

      Abstract (1791) HTML (0) PDF 698.31 K (2438) Comment (0) Favorites

      Abstract:The problem of landmark location is one of the key technologies of machine vision and pattern recognition. Active shape models(ASM) is a traditional method of landmark location, which has high degree of accuracy and robustness in some case. To improve the pupil landmarks accuracy of face image, we propose a method which combines Hough Transformation with ASM. The positions of the pupil are initialized by ASM algorithm, and Sobel operator is used in edge detection and Hough circle detection around the eye position. Through these steps, it can calculate the offset of initial position. The experiments on the face image which were captured in our laboratory room show this method can obviously improve the accuracy of the pupil landmarks. With the limit of Initialization the positions, computation is reduced with our control.

    • K-Hub Clustering Algorithm Based on Active Learning

      2016, 25(3):187-193. CSTR:

      Abstract (1368) HTML (0) PDF 686.38 K (2501) Comment (0) Favorites

      Abstract:K-Hub is an efficient high-dimensional data clustering algorithm, but it is sensitive to the choice of initial clustering centers and the instances which besides the class border may not be correctly clustered. In order to solve these problems, an improved method which incorporates active learning and semi-supervised clustering into K-Hub clustering algorithm is proposed. It uses active learning strategy to study pairwise constraints, and then, it uses these pairwise constraints to guide the clustering process of K-Hub. The experiment results demonstrate that the improved method can enhance the performance of K-Hub clustering algorithm.

    • Acquisition Algorithm of BeiDou B1I Signal

      2016, 25(3):194-198. CSTR:

      Abstract (1619) HTML (0) PDF 884.37 K (4283) Comment (0) Favorites

      Abstract:BeiDou B1I signal acquisition is a hard core in a BeiDou receiver and is the two-dimension process of the search about the code delay and Doppler frequency. For acquisition, parallel search algorithm of code in frequency domain are usually adopted. For the acquisition of weak signal, a method combining non-correlation integration with parallel search algorithm of code in frequency domain was introduced. The test results show that the acquisition algorithm can effectively and quickly acquire the weak signal.

    • Smoke Detection Algorithm of Single Image Based on Dark Channel And Wavelet

      2016, 25(3):199-203. CSTR:

      Abstract (1438) HTML (0) PDF 765.10 K (2695) Comment (0) Favorites

      Abstract:To solve some problems of the single image smoke detection, such as, the study of single image smoke detection is less and smoke detection method of single image based on color model is easily influenced by the color suspected smoke area, we propose a Multilevel filter algorithm of single image smoke detection. Firstly, for the dark channel transmittance chart optimized by the guide filter, the algorithm carries out binaryzation on the image according to certain threshold, which make it fast to remove the interference area of high transmittance and obtain the low transmittance area. Then it removes the smoke in the low transmittance area, extracts the Cr channel of YCbCr color space before and after smoke removal, subtracts and carries out binaryzation, further removes some static background interference area thereby obtains the suspected smoke area. Finally it extracts the Y channel of YCbCr color space on the suspected smoke area before and after smoke removal, transforms to two-dimensional discrete wavelet, and makes difference according to the wavelet energy, thereby obtains the final smoke area. Experimental results show that the proposed algorithm can effectively eliminate the interference of the color suspected smoke region in the image, and detect the smoke area accurately.

    • Application of Improved Association Rules Algorithms to Tobacco Sales Logistics in the Law

      2016, 25(3):204-208. CSTR:

      Abstract (1299) HTML (0) PDF 788.71 K (2364) Comment (0) Favorites

      Abstract:It is vital to tobacco logistical company whether you can dig the potential high valued information from the substantial historical data that create during the tobacco products selling. This article adopts a more efficient algorithm that of fp-growth to design sales of tobacco products decision and support system, and the practice indicates the improved fp-growth algorithm is able to discover the sales discipline and relationship of tobacco products in various terms. In the algorithm, memory occupied is lower and respond speed is faster, which provides valuable references for tobacco logistical company on mastering sales discipline of tobacco products timely.

    • Non-Local Similar Patch Search Algorithm Based on Random Match

      2016, 25(3):209-213. CSTR:

      Abstract (1586) HTML (0) PDF 760.13 K (3208) Comment (0) Favorites

      Abstract:A k nearest neighbor patch match algorithm based on random match was proposed to solve the non-local similar patch search problem, which is an improvement of the patch match algorithm based on jump flooding. On the basis of the origin algorithm, the improved algorithm proposed an additional way to randomly generate candidate reference patch from the local neighborhood of each query patch, which raises the possibility of matching candidate patch to query patch and improves the matching accuracy. Experimental results show that the improved algorithm is comparable with the origin algorithm in time efficiency and parallelism, and outperforms the origin algorithm in matching accuracy.

    • Design of Relay Protection Hardware Platform Testing Software Integration

      2016, 25(3):214-219. CSTR:

      Abstract (1708) HTML (0) PDF 697.98 K (2844) Comment (0) Favorites

      Abstract:According to different application requirements, certain differences exist in peripherals of relay protection hardware platform. The old testing software has some problems, including poor universality and repetitive design. To solve these problems, a testing software architecture based on the configuration file is designed hierarchically and modularly. This approach improves the universality and scalability of the testing software, and realizes the integration of the testing software structure. Parts of the software architecture, including the configuration file, the embedded testing software and PC software are introduced in detail, and the use of the software is illustrated. At present the testing software has achieved good effect in the testing of MPC8309 hardware platform, and is easy to be transplanted and applied to other hardware platform testing.

    • Microscopic Cell Image Processing and Application Based on Morphology

      2016, 25(3):220-224. CSTR:

      Abstract (1399) HTML (0) PDF 865.74 K (3670) Comment (0) Favorites

      Abstract:To improve the accuracy and efficiency of medical diagnosis, an image analysis theory based on morphology of microscopic cells is proposed to complete image classification, identification and analysis. Firstly, the image edge detection algorithm and watershed segmentation algorithm are introduced in this paper. An integral image processing method of microscopic cell based on morphology is designed, which is an effective solution to the problem of uneven illumination and stained spots and other issues arising in the image processing. Then, in the image analysis stage, the morphology image analysis of microscopic cell is applied to diagnosis the hematological disease, simultaneously, the number of cells is calculated, morphological parameters are extracted and verification results are presented. Finally, a preliminary theoretical attempt about the medical diagnostic cell disease is made, and compared with actual value, the research results error is less than 3%. Experiments show that the proposed image analysis theory has a certain value in medical diagnosis on cell disease.

    • SIP Authentication Key Agreement Protocol Based on ECDLP

      2016, 25(3):225-228. CSTR:

      Abstract (1308) HTML (0) PDF 664.15 K (2175) Comment (0) Favorites

      Abstract:The SIP protocol is a controlling protocol of the application layer. In order to improve the security of SIP protocol, based on the intractability of the elliptic curve discrete logarithm problem, combining with the user's identity, password and one-way trapdoor function F(), this paper proposes an SIP authentication key agreement protocol with the basis of ECDLP. The agreement process consists of four parts:initialization, registration, login authentication, and changing password. The safety analysis shows that the proposed protocol not only provides two-way authentication and a safe session key, but also resists the password-guessing attack, man-in-the-middle attack, replay attack, masquerade attack, and Denning-Sacco attack. Compared with other protocols, the proposed SIP authentication key agreement based on ECDLP has higher security and can better meet the application demands.

    • Power Emergency Communication Network Based on Satellite

      2016, 25(3):229-232. CSTR:

      Abstract (1253) HTML (0) PDF 913.81 K (2340) Comment (0) Favorites

      Abstract:Power emergency communication network based on satellite can guarantee the reliability of the power system scheduling data network. In this paper, according to the actual network situation of power scheduling data network, a power emergency communication network architecture based on satellite is presented. When the terrestrial transmission links change, it realizes the mechanism of data traffic automatic switching or recovering between the power scheduling network and satellite network. The feasibility of this design is verified by testing in power scheduling traffic network of Guizhou.

    • Virtual Scope Software with Interchangeability

      2016, 25(3):233-237. CSTR:

      Abstract (1291) HTML (0) PDF 794.76 K (2601) Comment (0) Favorites

      Abstract:Traditional oscilloscope is unavailable in remote measurement and control also lacks of interchangeability. Some study was done on IVI(Interchangeable Virtual Instrument) technical structure and the applications on software. This virtual scope program that is based on IVI driver was designed by virtual instrument technology and LabWindows/CVI, which is a tool to develop virtual instrument. The software can implement functions of measurement, debugging, monitoring and so on. Compared with the traditional instrument, virtual instrument has great advantages on remote control and interchangeability.

    • System for Free Space MIMO Channel Measurement

      2016, 25(3):238-241. CSTR:

      Abstract (1268) HTML (0) PDF 993.24 K (2209) Comment (0) Favorites

      Abstract:In this paper, we describe the status of research of MIMO wireless channel. MIMO channel modelings on stage were analyzed and compared. We propose MIMO channel real time measurement system within free space, which uses the USRP platform and can real-time measure the communication channel transmission performance, doing simultaneously channel data storage analysis. The cost of the system is low. The paper provides the basis for real MIMO channel research.

    • Remote Laboratory of the Configuration Software Control Technology Course

      2016, 25(3):242-246. CSTR:

      Abstract (1561) HTML (0) PDF 917.99 K (2053) Comment (0) Favorites

      Abstract:Nowadays, experimental resources at universities and colleges sometimes fail to satisfy the society's soaring needs and the problems in remote management of the laboratory equipment have become big headaches. Therefore, combining with the actual situation of the laboratory, this paper proposes a novel design project about remote laboratory of the configuration software control technology course to address those difficulties, which is based on the reference and summary of the design scheme of the early remote laboratory. So, VPN(Virtual Private Network) and firewall technology are adopted to build remote experimental systems. Besides, JSP(Java Server Pages) is applied to achieve remote management in terms of the laboratory website. Finally, the evaporator remote monitoring system is designed to prove the feasibility of the scheme by using configuration software WinCC(Windows Control Center).

    • Data Access to Data Sharing Platform and Presentation in Android Terminal

      2016, 25(3):247-250. CSTR:

      Abstract (1144) HTML (0) PDF 741.76 K (2100) Comment (0) Favorites

      Abstract:Realizing data sharing can make more people take full advantage of the existing data resources to create new value. CKAN(Comprehensive Knowledge Archive Network) is the world's leading open source data platform. It can manage the existing data resources and make them sharing. So this paper implements a CKAN APP based on Android development in order that the users can view the sharing data resources of CKAN anytime and anywhere. This paper mainly uses the Android client development technology to realize the access into data resources of CKAN by CKAN API, then changes the format of the obtained data resources into an appropriate format and stores them, eventually, displays the data resources at the Android terminal. The test results show that CKAN APP developed in this paper provides an available APP tool for users to view the sharing data resources of CKAN anytime and anywhere.

    • Real-Time Data Application Product Based on Hierarchical Storage Environment

      2016, 25(3):251-256. CSTR:

      Abstract (1241) HTML (0) PDF 900.90 K (2182) Comment (0) Favorites

      Abstract:Currently, many large corporations adopt secondary deployment pattern in their core business. However, when head office analyzes the company-wide data timely and fully in this model, it may cause problems of large amount of data, scattered data storage, not timely responding to the changes in requirements and handiwork statistics. In this paper, based on the above problems, a multidimensional data analysis technology and software tool which can support the end users on-demand self-service data analysis are proposed. The software can analyze data according to different requirements of users, form a data view quickly, and show data through report forms finally. Furthermore, this flexible, efficient, practical and real-time data analysis tool has been successfully applied to State Grid Corporation of China(SGCC), which shows that it has some value in theory and practical applications.

    • Hazard Identification Method of Safety Critical System Based on MUC

      2016, 25(3):257-261. CSTR:

      Abstract (1308) HTML (0) PDF 681.61 K (2281) Comment (0) Favorites

      Abstract:The Safety-critical systems are widely used in industry. The first task of Safety-critical system design is to identify system hazards. However, the commonly used methods of system potential hazards identification have limitations in expression, creativity, etc. Based on the Misuse case(MUC), this article puts forward a kind of method of system hazard identification, which is easy to use. This approach helps system engineers to acquire system potential hazards in system requirements phase. First of all, you must acquire MUC based on the system function. Then, the textual misuse cases(TMUC) template is used to analysis the hazard of each MUC. Finally, the potential hazards in the system are obtained.

    • Improved Smith-Predictors Based on IPDT Systems

      2016, 25(3):262-266. CSTR:

      Abstract (1310) HTML (0) PDF 717.34 K (2975) Comment (0) Favorites

      Abstract:Traditional Smith-Predictor fails to provide a null steady-state error in the presence of a constant load disturbance if the process exhibits an integral dynamics(IPDT), and under compensation when the model mismatches. The modified Smith-Predictor is proposed for it. Firstly, the feedback controller can transmit the error which comes from the difference between actual process and the model process to the control signal. Secondly, series controller and Feedback recourse controller are added to the input of plant, and the controllers are using different methods to design. MATLAB simulation shows that the system has better output response, and also eliminates the steady-state error.

    • Network User Trust Degree Evaluation Model by Analytic Hierarchy Process

      2016, 25(3):267-270. CSTR:

      Abstract (1353) HTML (0) PDF 720.61 K (3581) Comment (0) Favorites

      Abstract:With the development of computer technology and network, fully exploiting of the trust relationship between network users become hot spots among network operator platforms. A method of user trust degree evaluation model constructing with user attribute information as evolution index is proposed in the article. Also,the paper focuses on how to use the analytic hierarchy process(AHP) to determine the weight of each evaluation index to mitigation of human subjective factors. On the basis of introducing the AHP, the weight of the evaluation index in the user trust evaluation model is given. Also the application of AHP makes the model more scientific, simpleand effective.

    • Publicly Verifiable Secret Sharing Scheme Based on Large Numbers Factorization

      2016, 25(3):271-273. CSTR:

      Abstract (1433) HTML (0) PDF 640.97 K (1827) Comment (0) Favorites

      Abstract:Due to the existence of indeterminate equation integer solutions and the difficulty of large numbers factorization, a publicly verified secret sharing scheme was proposed based on Shamir(t, n) threshold scheme. With the difficulty of big integer factorization, the scheme established a secret share for the sharers and calculated special solution combination of equation through the existence of indeterminate equation integer solutions. Share secret was recovered common calculation of sharers' secret share and special solution combination elements. In addition, the scheme realized the effective validation of the secret share, between the participants, as well as participants and the distributors. Security analysis shows that the scheme is safe, and has certain practical value.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063