• Volume 25,Issue 5,2016 Table of Contents
    Select All
    Display Type: |
    • Performance Optimization Strategy of Batch Process Application Based on PL/SQL

      2016, 25(5):1-7.

      Abstract (1500) HTML (0) PDF 789.29 K (3069) Comment (0) Favorites

      Abstract:As large-scale RDBMS, Oracle is used most widely in enterprise application. PL/SQL is programming language based on SQL and expanded by Oracle. We could adopt PL/SQL to develop trigger, view, stored procedure, package and function to process data. In many architecture designs of enterprise application, stored procedure is utilized to achieve batch processing which does not need more user interaction, owns complex logic and often involves a large amount of data, making the database have dual roles which are data storage and business process. With the increasing amount of data, how to guarantee performance of stored procedure is very important. In this article, based on successful practice of performance tuning to oversea version of China Aviation International Passenger Revenue Accounting Solution, the author introduces Oracle's OEM and AWR report simply which are used to discover performance problem, and three technologies as optimization strategy adopted in batch processing application based on PL/SQL are summarized, they are code refactoring to decrease I/O, temporary table and simulating multi-thread. The target of this article is to provide thinking for developer and maintainer engaging in continuous optimization about the application utilizing such architecture.

    • Empirical Study of Vehicle Risk Model Based on IVDR Data

      2016, 25(5):8-12.

      Abstract (1519) HTML (0) PDF 731.61 K (2634) Comment (0) Favorites

      Abstract:As the development of computer science, the commercial applications of In-Vehicle Data Recorders (IVDR) are growing rapidly. With the real-time vehicle travelling data, the implications of IVDR facilitate the rich data base of traffic accident causal analysis. Combining IVDR data analysis with driving conditions and environmental factors of different vehicles, this paper carries out the study on vehicle risk factors. On the basis of a large amount of driving and geographic location information, this study builds multiple linear regression models to analyze the relationship between vehicle risk and traffic accident, and applies empirical test to the research results. This research indicates the interact relationship between vehicle risk factors and traffic accidents, for instance, that the nonlinear relationship between travelling distance and accident probability and etc. It is expected that this study would provide useful preference for vehicle risk quantification, transport planning, and vehicle personalized pricing.

    • Deployment and Configuration Model of Cloud-Based Applications

      2016, 25(5):13-18.

      Abstract (1474) HTML (0) PDF 628.00 K (2480) Comment (0) Favorites

      Abstract:Cloud computing has been a popular computing paradigm, and more and more large-scale distributed systems are migrating or have been migrated to cloud platforms. When deploying and managing IT systems in cloud environments, system owners have to manage the low-level details of the infrastructures, or leverage the services of platforms. Managing low-level details is time consuming and error-prone, and leveraging the services is less flexible and more difficult to tailor to user requirements. To address these issues, we propose a high-level abstraction model for cloud-based systems to specify their requirements. The requirement model describes the expected system states in a declarative way, without introducing the low-level steps and details about how to reach the states. We implemented a prototype based on open source cloud platform OpenStack and configuration management tool Puppet, and the effectiveness of the requirement model is evaluated through a case study.

    • Communication Encryption of Axis2 in Apparatus and Equipment Sharing Management System of Chinese Academy of Sciences

      2016, 25(5):19-27.

      Abstract (2054) HTML (0) PDF 924.59 K (2941) Comment (0) Favorites

      Abstract:Considering these security problems of data transmission such as some import data is transited without encryption, malicious data might be received from a third part in Apparatus And Equipment Sharing Management Platform of Chinese Academy of Sciences (SAMP), SAMP system may result these threats of data theft and data receive insecurity. To solve these problems, combined with the characteristics of SAMP System and its features of data transmission, the technologies of digital signature and encryption of WS-Security based on the Axis2 Rampart module are applied to the issue of data communication security of SAMP System. Firstly, the Axis2 framework, digital signature, encryption technology and the encryption principle of Axis Rampart module are introduced by this paper briefly. After that, encapsulate the data transmission interface of SAMP System by using a data transmission security solution, which uses a combination of digital signature + password + asymmetric encryption of WS-Security. It implements the signature, authentication, encryption and decryption process of message transmission. Finally, it also tests and analyzes the processing time of the response and CPU usage of data transmission interface in SAMP System. The experiment results show that by using the combination technology of Axis2 Rampart module + digital signature + password + encrypt, it can ensure that the security issue of data transmission of SAMP system has a high security, high scalability and high response speed, meet the demand of practical application, and be widely promoted to other Web Application of Enterprise.

    • Application of WebSocket and MQTT in Web Real-Time Communication System

      2016, 25(5):28-33.

      Abstract (2733) HTML (0) PDF 630.20 K (5107) Comment (0) Favorites

      Abstract:Polling pull strategy, which is widely used in traditional web communication system, has some problems, such as low real-time, heavy consumption of network resource and poor scalability. To solve these problems, much research about long connection technology in WebSocket has been done in the paper. Combining WebSocket with MQTT protocol, a new web instant messaging solution based on pub/sub model was proposed to replace polling strategy with push strategy. The formation design of IM and notification message was described in detail. And agent model was proposed for notification message. Meanwhile, a pre-subscription scheme was put forward to decrease net resource consumption further. Moreover, a comparative analysis on delay, bandwidth consumption between the solution and a current popular way bosh+xmpp was done to verify the advantages of the solution.

    • Application of CDP in Disaster Tolerant System for Voice Call Roaming Clearing

      2016, 25(5):34-38.

      Abstract (1330) HTML (0) PDF 1.16 M (2011) Comment (0) Favorites

      Abstract:With the rapid development of voice call roaming, expanding in the areas of clearing, ensuring data availability and business continuity at the time of major accidents, natural disasters and other emergencies occurring is particularly important. According to the requirement and the problem needed to be improved of voice call roaming system, this paper thoroughly researches and analyses CDP disaster tolerant technology, proposes the method of applying the CDP technology to disaster tolerant system for voice call roaming clearing, designs and constructs the disaster tolerant system for Voice Call Roaming Clearing with continuous data protection and overalls data recovery. Practice has proved that this method can effectively protect data integrity and business continuity for voice roaming clearing systems in a variety of disaster scenarios.

    • City Lighting Monitoring System Based on IEC61850

      2016, 25(5):39-43.

      Abstract (1346) HTML (0) PDF 688.83 K (2812) Comment (0) Favorites

      Abstract:In order to improve the efficiency maintenance, reduce the maintenance costs and save energy, city lighting monitoring system based on IEC61850 was proposed according to the status of domestic city lighting facilities. First, this system introduced some important technologies, such as IEC61850V, Vxworks development platform, Sqilte database and GoaheadServer. Second, the specific methods and the communication mode were discussed, and finally, following contents were introduced, such as real-time monitoring of lighting, integration of monitoring information, transmission protocol and the standardization of communication network. It has a certain significance to improve the overall management level of city-lighting facilities.

    • SIP Server Clusters

      2016, 25(5):44-48.

      Abstract (1440) HTML (0) PDF 585.70 K (2690) Comment (0) Favorites

      Abstract:With the development and improvement of Session Initiation Protocol (SIP), servers based on SIP have been widely applied in Communication Systems. However, the performance of single SIP server to handle SIP messages is limited on the condition of the hardware does not upgrade. The performance won't meet the demand of large-scale increasing of the number of users. Through of research and analysis on SIP, the paper designed and implemented SIP Server Clusters. By using multiple servers working together, more requests can be dealt with concurrently, which is an improvement of performance. The design is simple to implement and has high scalability. These clusters Practice has proved that the proposed solution can adequately address the current shortage, providing supports for future services expansion.

    • Application System Based on Lightweight Data Operation Architecture

      2016, 25(5):49-54.

      Abstract (1354) HTML (0) PDF 878.41 K (2242) Comment (0) Favorites

      Abstract:In order to satisfy customers' experience needs with strong interactivity, fast response speed of Web applications, this paper designs and implements a data operation method based on UI components using Ajax technology, and offers a solution of Web application system based on lightweight data operation architecture. It separates interface design, business logic processing and data access to increase the independence of program design, and introduces Ajax asynchronous communication mode to reduce the load of servers and improve time response of data interaction. Using hierarchical design data interface, operation is clear, concise and convenient. In the practical application, the architecture is easily combined with existing mainstream Web UI and has some certain commonality. Finally using ExtJs and ASP.NET, application examples of petrochemical corrosion evaluation system was designed and implemented.

    • Data Acquisition Frame Based on SNMP

      2016, 25(5):55-59.

      Abstract (2027) HTML (0) PDF 602.52 K (2841) Comment (0) Favorites

      Abstract:Data Acquisition module is the basis of the intelligent supervision and management system of embedded network devices. Due to the diversity and complexity of the acquisition object, it calls for higher requirements on compatibility and scalability in data acquisition frame. This paper creates a solution of data acquisition based on SNMP, embedded Internet technology, network management technology and multithreading. It improves compatibility and scalability and proposes a remote Web data acquisition frame with high generality, high compatibility and high portability. The data acquisition frame is designed and implemented with multi-threading technology and multi scheduling stages, which plays an important role in the intelligent supervision and management of embedded network devices.

    • Radio Cheating Prevention and Control Networking System

      2016, 25(5):60-64.

      Abstract (1430) HTML (0) PDF 716.21 K (3466) Comment (0) Favorites

      Abstract:The behavior of cheating in examinations has grown into gang crime, showing the characteristics of networking, collectivization and industrialization, which makes it difficult to detect cheating by existing anti cheating equipments. To combat radio cheating, a simple and effective radio cheating prevention and control system is studied, integrating the application of the advanced monitoring and recognition technology, the adaptive directional jamming technology and the portable full-band cell domain signal shielding technology, and the effective block of sending answers to exam room is eventually realized, reaching the goal of preventing radio cheating. Gradually it helps to form a prevention and control network system covering most examination-room areas throughout Beijing. Through systems design and implementation, monitoring equipment and jamming equipment and others are effective, and it has improved the efficiency of examination.

    • Xinjiang Production and Construction Corps Tourism Information System Based on Mobile Internet

      2016, 25(5):65-70.

      Abstract (1439) HTML (0) PDF 2.95 M (2175) Comment (0) Favorites

      Abstract:In order to improve the level of tourist informatization of the Xinjiang Production and Construction Corps (in short "XPCC") and resolve the problems of scattering information, low coupling business and information asymmetry, an application that includes introduction of scenic, plan of route, recommendation of service was built for local enterprises based on mobile Internet. Tourism information database was built on SQL Server2008 and SQLite and the data transferred by Hypertext transfer protocol and JavaScript Object Notation, Client was designed and implemented with MVC and the singleton and Server was designed and implemented with the three-tier architecture. Therefore, the effectiveness of business and user experience was improved. System architecture and method will be referenced for the relevant mobile Internet software development.

    • Path Planning for Automation of Computer 3D Animation Generation

      2016, 25(5):71-76.

      Abstract (1343) HTML (0) PDF 1.13 M (2480) Comment (0) Favorites

      Abstract:Ruqian Lu, academician of Chinese Academy of science, put forward project "full life cycle automation of computer animation generation" in the 1990s. This technology inputs proper story with limited natural language to the computer, and from the beginning to animation generation, every step was completed in the computer assisted. In the animation, how to plan the character path has become the important factor that affects the animation effect. In this paper, a path planning method based on the animation scene planning information in PADL was proposed, in which A* algorithm is used with restricted conditions to create PCAL, finally animation was made by Motion Graph. Experiments showed that the method could automatically generate the path animation that met the specified requirements.

    • Predicting Protein Function Method with Node Importance Algorithm Based on Hadoop

      2016, 25(5):77-82.

      Abstract (1608) HTML (0) PDF 705.05 K (2256) Comment (0) Favorites

      Abstract:This paper starts from the perspective of protein sequence data, and constructs the protein network by cyclic sequence similarity matching. Then a novel method based on ranking the importance of network nodes is proposed. Considering the importance of protein nodes in the network, the node importance algorithm PageRank (PR) is used to compute the nodes' PR value. The proposed method is also developed on the Hadoop Platform, which makes it more suitable for huge genome database with great efficiency and parallel computing. Finally, comparing the traditional method of function prediction by the Accurate rate, Recall rate and F1-measure measurements, our method has been validated and the result shows that the method is feasible and valuable for practical usage.

    • Multi-Objective Order Sensitivity Study on Grey and Entropy Parallel Analysis Method

      2016, 25(5):83-88.

      Abstract (1414) HTML (0) PDF 1000.07 K (2227) Comment (0) Favorites

      Abstract:In view of the characteristic that multi-objective optimization algorithms are sensitive to objective order, objective order sensitivity analysis based on grey and entropy parallel analysis is proposed. Taking multi-objective flow shop scheduling problem as object, flow shop scheduling model of different objective order is established, and GA based on grey and entropy parallel analysis is used to optimize the multi-objective model of different objective order. Then sensitive coefficient is defined and graphics of sensitive coefficient is drew. The experiment results show that grey and entropy parallel analysis is sensitive to objective order, ascending and descending order ordered by the size of objective value are not the best, and sensitive coefficient of shock order is the smallest. It indicates that we should select reasonable objective order to get better optimization results for multi-objective optimization. Also algorithm fitness value is sensitive to objective order, which effects significantly on the algorithm performance.

    • Realization of Edge Detection Algorithm Based on FPGA by Simulink

      2016, 25(5):89-93.

      Abstract (1582) HTML (0) PDF 829.52 K (2736) Comment (0) Favorites

      Abstract:The algorithm based on FPGA to achieve high definition and large capacity video processing has certain complexity. In order to use the Verilog HDL to describe the image processing algorithms better, a set of video image processing model in Simulink is used. MathWorks company's latest Vision HDL Toolbox is used in the conversion from frame to pixel stream, and then image edge is detected. Finally, the feasibility of the method of this algorithm automatically generating Verilog HDL is verified by using Simulink and ModelSim co-simulation. That could quickly generate more accurate HDL code, improving the speed of description of the image processing algorithm using HDL.

    • Research on Particle Swarm Genetic Algorithm for Scheduling of Discrete Manufacturing Industry

      2016, 25(5):94-100.

      Abstract (1555) HTML (0) PDF 717.06 K (2825) Comment (0) Favorites

      Abstract:In discrete manufacturing industry, the pros and cons of production scheduling method directly affects the efficiency of production. In order to make the algorithm be better applied to the production scheduling, characteristics of discrete manufacturing industry production are analyzed. At the same time, in order to improve the search performance of the algorithm, the advantages and disadvantages of genetic algorithm and particle swarm optimization algorithm are analyzed, and a PSO_GA hybrid algorithm is proposed. In this algorithm, introducing parameters on the basis of genetic algorithm, thus crossover and mutation are automatically controlled for each iteration. Then, population diversity is improved. In order to overcome the disadvantage of genetic algorithm with low convergence rate, particle swarm optimization algorithm is introduced in the appropriate iteration cycle, so as to improve the search speed and precision of the algorithm. Finally, the results of simulation experiments for production scheduling model verify the search performance of the algorithm.

    • Block Fast Compressive Tracking Algorithm

      2016, 25(5):101-106.

      Abstract (1395) HTML (0) PDF 910.98 K (2212) Comment (0) Favorites

      Abstract:FCT is a simple yet effective and efficient tracking algorithm, despite much success has been demonstrated, numerous issues remain to be addressed. In FCT, because of the sparsity of the compression measurement matrix, the spatial information of the sample is neglected, so the feature cannot represent the tracking target correctly and there is no remedy when tracking error. In this paper, we propose an improved fast compressive tracking algorithm considering the sample space information and extracts generalized Haar-like features randomly in block; target motion estimation method is used to correct target location, as the classifier is wrong. Adjusting the sparse degree of vector in compression measurement matrix and threshold of naive Bayes classifier can realize accurate target tracking. The experimental results show that compared with FCT, the improved algorithm achieves much better results in terms of both similarity and success rate and subjective visual perception.

    • Approximate Shortest Path Problem in Complex Networks

      2016, 25(5):107-112.

      Abstract (1587) HTML (0) PDF 687.75 K (2781) Comment (0) Favorites

      Abstract:With the increasing of data in complex networks, the efficiency of classic algorithms such as Dijkstra algorithm is very low. To solve this problem, the researchers put forward a number of approximate search algorithms, but how to reduce the computational complexity and also keep the accuracy has been a big difficulty. According to the structural characteristics of complex networks, this article introduces regional division, improves the structure of the tree decomposition, and constructs graph into a tree to search the target vertex, getting a new the shortest path approximate algorithm for complex networks. In addition, the proposed algorithm not only reduces the computational complexity but also remains the high accuracy of approximation by examples.

    • Probabilistic Matrix Factorization Based on Constrained Bias

      2016, 25(5):113-117.

      Abstract (1943) HTML (0) PDF 652.22 K (2620) Comment (0) Favorites

      Abstract:Users who rate few will have features that are close to the prior mean once the probabilistic matrix factorization(PMF) model has been fitted, which leads to the predictions close to the movie average ratings. Constrained probabilistic matrix factorization(CPMF) algorithm has not fully considered about the holistic diversity among different rating systems and the inherent attributes that different users and products hold within the datasets. To solve the problems above, the user and product bias and global average are combined with constrained probabilistic matrix factorization to build a new matrix factorization algorithm. The algorithm brings in the constrains to restrain the user bias among users of similar action while evaluating different rating systems with global average and representing the attributes of different users and products with biases to increase the prediction accuracy. The results of experiments on two real datasets indicate that the prediction accuracy of the algorithm has been improved compared to PMF and CPMF.

    • Simplification Method of Index System Based on R Cluster Analysis and Factor Analysis

      2016, 25(5):118-123.

      Abstract (1269) HTML (0) PDF 629.48 K (2622) Comment (0) Favorites

      Abstract:An excessively complicated index system may increase the complexity of computation. This work proposes a simplification method of index system based on R cluster analysis and factor analysis to extract the representative elements. This method can control the information loss rate of the representation element and explain the actual meaning of the representation element easily. It also avoids the weakness of factor analysis which is difficult to handle the problem with independent factor. The experiment results show that this method can improve the simplicity and effectiveness of index system significantly, and maintain the completeness of the index information without a prior knowledge is available.

    • Application of Text Classification for Specific Domains Based on Combination Kernel Function SVM

      2016, 25(5):124-128.

      Abstract (1202) HTML (0) PDF 696.33 K (2153) Comment (0) Favorites

      Abstract:In practical application of text classification for specific domains, most of the text always dopes with each other and is unable to be expressed in linear. The application of kernel function in SVM can solve the problem of nonlinear classification effectively. Different SVM can be constructed by different kernel function, and the recognition performance is also different. So the key problems of SVM are choosing the appropriate kernel function and optimizing its parameters. This paper constructs a new combination kernel function combined with homogeneous polynomial kernel and radial basis kernel function by linear weighted method based on the character of the kernel function. The combination kernel function has good generalization ability and good earning ability at the same time. The simulation experiment result shows that the precision rate, recall rate and comprehensive classification rate of macro average of combination kernel function are obviously better than linear kernel, polynomial kernel and radial basis kernel in choosing the right parameters, and the precision rate and the recall rate are ideal.

    • Stable and Load balanced Weighted Clustered Algorithm in Ad Hoc

      2016, 25(5):129-134.

      Abstract (1726) HTML (0) PDF 730.80 K (2649) Comment (0) Favorites

      Abstract:For the issues of the defects of traditional weighted clustering algorithm (WCA) in Mobile Ad Hoc Networks, a safe and load balanced WCA (SLB-WCA) is proposed. SLB-WCA take nodes stability into consideration of the combination weights computing of nodes, and a "relatively typical node degree" is proposed to substitute the simple node degree factors in traditional WCA. In the meantime, according to the degree of each node, SLB-WCA formulates local cluster size constraints instead of global constraints in traditional algorithm. SLB-WCA can make node weights calculation and cluster size control more reasonably, and make the network load more balanced. Compared with traditional WCA, SLB-WCA has less number of cluster heads, better network coverage, which improves the network lifetime effectively.

    • Landscape Image Classification Based on Multi-Feature Extraction and SVM Classifier

      2016, 25(5):135-141.

      Abstract (1192) HTML (0) PDF 738.51 K (2081) Comment (0) Favorites

      Abstract:This paper mainly proposed a classification method based on multi features and support vector machine. Firstly, by analyzing the features of landscape image in the visual content, the image is described by means of fusion color, texture and shape features. Secondly, a weighted principal component method is used to reduce the features of high dimensional image. Finally, the experimental results show that the method proposed in this paper has a good classification effect on landscape images.

    • Method of Human Fall Detection

      2016, 25(5):142-146.

      Abstract (1238) HTML (0) PDF 727.13 K (4648) Comment (0) Favorites

      Abstract:As the problem of population aging is becoming more and more serious, a method of human fall detection based on wearable device is proposed to solve the social problem that the elderly are prone to fall. Different from the majority of fall detection methods which detect fall events after falling to the ground, the features of acceleration and angle are considered and support vector machine (SVM) is used as the classification algorithm to detect fall events before falling to the ground. The experiment results show that the fall event is recognized with a 99.2% recognition rate and the recognition rate of the activity of daily living is 96%. The average lead-time is 273ms.

    • Image Keypoints Matching Based on Improved ORB and Symmetrical Match

      2016, 25(5):147-152.

      Abstract (1352) HTML (0) PDF 880.44 K (3175) Comment (0) Favorites

      Abstract:Given the ORB algorithm has no scale invariance and exists more false match in image keypoints matching, this paper combines SURF and bilateral matching algorithm to improve ORB. The improved ORB algorithm is named SSORB(scale invariance and symmetrical matching ORB). First, we generate multi-scale space by different sizes of box filter template convoluting with integral image. Second, we detect the stable extreme points in multi-space, making the extracted points invariant to scale. Third, we describe these points with ORB descriptor making them invariant to rotation. At last, according to the Hamming distance match these points. Due to the existence of error match, bilateral matching is used to improve the match accuracy by eliminating the false match. The experimental results show that the SSORB algorithm effectively solves the scale invariant defects of the ORB algorithm, meanwhile, keeps the speed advantage of ORB and improves the matching accuracy.

    • Improved Wireless Mesh Routing Metric Algorithm and Protocol

      2016, 25(5):153-158.

      Abstract (1260) HTML (0) PDF 701.29 K (1919) Comment (0) Favorites

      Abstract:To handle the problem of packet loss caused by the large number of retransmission times in the IEEE 802.11s-based wireless mesh network, a novel airtime link metrics algorithm based on maximum number of retransmission times was proposed according to the retransmission characteristics in the actual wireless network. Meanwhile, an improved Multi-root Hybrid Wireless Mesh Protocol (M-HWMP) based on tree-based rooting mechanism was proposed to alleviate the network congestion caused by the topology with single root node. This modified protocol can also improve the transmission performance of the edge node in some practical scenarios and ensure fairness of the use of wireless channel resources. Theory and simulation results showed that the improved algorithm and protocol can optimize the throughput and delay of different data flows in Wireless Mesh Network, and also can avoid network congestion to some extent.

    • Automobile Airbag Assembly Precision Evaluation Method Based on the Stereo Vision

      2016, 25(5):159-163.

      Abstract (1171) HTML (0) PDF 740.81 K (2252) Comment (0) Favorites

      Abstract:This paper proposes a method based on binocular stereo vision detection, which can implement the auto airbag assembly precision of the measurement and evaluation. It combines the image of the airbag under test which is provided by the CCD camera with three dimensional mathematical model of standard airbags, establishes the position tolerances Vx,Vy,Vz of the car airbag contour detection points, and the shape tolerances K of the points on the contour curve segment is as evaluation indexes of assembly precision parameters, which can complete contour parameters automatically and determine whether the airbag under test qualified. The actual verification results show that, the assembly quality indexes and methods of stereo vision airbag assembly accuracy of the evaluation can evaluate the assembled quality of the airbag quickly and accurately.

    • Devoicing Algorithm Based on Neural Network and Wavelet Transform

      2016, 25(5):164-167.

      Abstract (1134) HTML (0) PDF 696.72 K (3805) Comment (0) Favorites

      Abstract:Aiming at the traditional wavelet transform threshold, the soft threshold and hard threshold method are adopted. The two threshold methods have their own limitations. There is a deviation in the processing of the soft threshold method, which affects the stability and continuity of the signal. The hard threshold method can easily lead to Gibbs-pseudo in processing speech signals. According to the empirical formula, the threshold method is uncertain, so the fusing algorithm based on neural network genetic algorithm and wavelet transform is put forward. The feasibility of the fusion algorithm is demonstrated by experiments.

    • Application of Combination Kernel Function SVM in Speech Recognition

      2016, 25(5):168-172.

      Abstract (1089) HTML (0) PDF 634.32 K (2389) Comment (0) Favorites

      Abstract:In the problems of practical application, GMM - UBM is adopted as the background model when the training data is insufficient in speaker recognition system. EigenVoice is used as adaptation ways, then it structured a new combination kernel function combined with homogeneous polynomial kernel with good generalization ability and radial basis kernel function with good earning ability by linear weighted method to optimize model parameter. The optimal parameters of kernel function are determined through the multiple grid search method. DAG method is adopted to realize multivariate classification of SVM kernel function. Then the linear kernel, homogeneous polynomial kernel, radial basis kernel function and combination kernel function are evaluated in the experiments. The experimental results show that the identify performance of the combination kernel is more ideal than that of other kernel functions in the different classification strategy, different adaptive time, different signal-to-noise ratio and different number of speakers.

    • Communication Protocol of Monitoring System of Large Facility

      2016, 25(5):173-176.

      Abstract (1715) HTML (0) PDF 1.05 M (2405) Comment (0) Favorites

      Abstract:Aiming at achieving reliable communication between the underlying device and the monitoring center, a new application layer protocol based on TCP is designed to deal with the huge amounts of data transmissions and high real-time requirements of some data. The protocol proposes secure login method from the acquisition device to the remote monitoring center, and it can complete transmitting real-timely specific parameters and components according to the actual requirements. The protocol has great flexibility, scalability and security, which can meet the demand of data transmission between the acquisition device and the monitoring center in the monitoring system of large facility.

    • Socket Quality Detection Based on Machine Vision

      2016, 25(5):177-180.

      Abstract (1629) HTML (0) PDF 1021.43 K (2289) Comment (0) Favorites

      Abstract:For the current rising labor costs and low detection efficiency of eye fatigue, this paper presents a method for detecting socket quality based on machine vision. The main research contents are as follows: 1) Socket positioning method based on template matching with machine vision. 2) The machine vision detection method for screws defects based on the mean of gray value. 3) The detection method of jack defect based on grayscale standard deviation. In the production line testing, screws and jack defect recognition rate have reached 100%. And the average per-frame image processing only takes 100ms, which shows that this method has high accuracy, fast speed advantages.

    • Achieving of Statement Coverage Object for Radio Tuning Unit Software

      2016, 25(5):181-186.

      Abstract (1281) HTML (0) PDF 1.69 M (2662) Comment (0) Favorites

      Abstract:Taking the Radio Tuning Unit software hosted on Radio Tunning equipment for instance, this paper discucces how to achieve the statement coverage object of DO-178C by LDRA TESTBED automatic test tool which can improve the test efficiency during the statement coverage test. Statement Coverage is the basic test coverage object for airborne software and could effectively detect the extraneous code from the source code to improve the quality during the test. The test report indicates the TESTBED can process the code instrumentation and analyse the coverage data correctly. And it can identify the uncovered codes information that provides a source for developer to analyze. The report of TESTBED conforms to the DO-178C object requirement and be provided to the certification authority for review, which can increase the certification credits.

    • Resource Scheduling Based on Firefly-Genetic Algorithm in Cloud Computing

      2016, 25(5):187-191.

      Abstract (1489) HTML (0) PDF 756.27 K (2413) Comment (0) Favorites

      Abstract:How to give the fullest play to the efficiency of resource scheduling in cloud computing is a hot spot of current research. First of all, resource scheduling model in cloud computing is established and individuals in firefly algorithm and node resources in cloud computing are matched; secondly, the genetic algorithm is introduced into the initialization of individuals in the algorithm and sensory threshold of the updating of algorithm's position is set to adjust the probability for individuals to choose the optimal path; finally, the volatile factor is improved to update the value of fluorescein. Simulation experiment shows that this algorithm can effectively improve the performance of resource scheduling in cloud computing, shorten the time to complete tasks and improve the system's overall processing capacity.

    • Analyzing and Optimizing Instrument's Running Time in Chinese Academy of Sciences SAMP System

      2016, 25(5):192-196.

      Abstract (1125) HTML (0) PDF 738.10 K (2896) Comment (0) Favorites

      Abstract:Information management has been used in the SAMP system of Chinese Academy of Sciences, which greatly improves efficiency of the use and management of the equipment. However, the SAMP system cannot scientifically allocate resources in some ways, such as the system couldn't monitor the equipment while it is just running for doing nothing or is starting up at abnormal time. By this, the user record of the instrument and equipment must be analyzed immediately in order to find out the abnormal data and optimize the use efficiency of the equipment. In this paper, these data will be analyzed and forecast by the method of Bayes classification and Logistic Regression. Then the forecast data with be compared with the real results to find out the abnormal data and the reason how the abnormal data generate. Finally, the management of the instrument and equipment will be optimized base on the practice situation. In this way, the use efficiency of the instrument will be improved.

    • Application Analysis of Generalized and Modified D-H Method in Kinematic Modeling

      2016, 25(5):197-202.

      Abstract (1427) HTML (0) PDF 673.13 K (5353) Comment (0) Favorites

      Abstract:Generalized D-H method has been widely researched and applied in robot kinematics modeling, but there is a fundamental flaw, which is that the homogeneous transformation matrix obtained by generalized D-H method is a singular matrix, so the model we get is also incorrect, and we cannot analyze correctly. The modified D-H method is improved to avoid the defects of generalized D-H, and to ensure the accuracy of the models. In this paper, the general kinematic modeling method and the application of the D-H method and its' defects and the modified D-H method are studied. At last, the correctness of kinematic model established by the modified D-H method in 6-DOF robot is verified.

    • Application of Dark Channel Prior in Fog Image Restoration

      2016, 25(5):203-208.

      Abstract (1277) HTML (0) PDF 826.93 K (2745) Comment (0) Favorites

      Abstract:Currently, defogging algorithm based on dark channel prior is one of the most effective single image defogging method. This paper studies various image defogging technologies based on dark-channel-prior. The time complexity of soft matting algorithm is too large. This paper presents an adaptive median filter to achieve a smooth and refined transmittance to improve the algorithm speed and a robust method for determining the value of Light Atmosphere. Experimental results show that the proposed method can achieve effective defogging, ensure defogging image clarity, and increase speed of dark-channel-prior defogging algorithm, which has some practical value.

    • Load Forecasting of Power System Based on Cloud Model SVM

      2016, 25(5):209-212.

      Abstract (1700) HTML (0) PDF 725.91 K (2605) Comment (0) Favorites

      Abstract:The accuracy of load forecasting of power system is the guarantee of the safe, stable and efficient operation of the power grids. Least squares support vector machine (LSSVM) is widely used on the load forecasting of power system, but this method has many shortcomings in dealing with uncertainty problems. In order to improve the accuracy of selecting the parameters of the kernel function, to deal with uncertainty factors and improve the accuracy of short-term load forecasting, this paper proposes a new model which is combined by the cloud model, particle swarm optimization (PSO) and LSSVM. First of all, through analyzing uncertainty of each influence factor, it uses the models of Cloud-LSSVM and PSO-LSSVM separately to predict the impact factor according to the uncertainty, then it achieves the final forecast through the weighted combination model. At last, the simulation of experiment proves that the new model can achieve better load forecast of power system by dealing with the uncertainty factors.

    • Real-Time Positioning and Direction Method for Oversize Vehicle Based on Computer Vision

      2016, 25(5):213-217.

      Abstract (1573) HTML (0) PDF 1.50 M (2298) Comment (0) Favorites

      Abstract:In order to solve the problem that oversize vehicles are difficult to be positioned and directed when they load and unload cargos, a real-time positioning and direction method based on computer vision is presented in this paper. With the help of index strip, Hough Transform is applied to detect lines and its direction. Then, numeral recognition is introduced to compute vehicle's rough moving distance. After that, the system will accurate position the distance by using length and number information of pixel of image. Finally, the result will report in image and digital format. The experimental results demonstrate the method's accuracy and real-time performance.

    • Trust Valuation Model Based on Game Theory in Social Network

      2016, 25(5):218-221.

      Abstract (1313) HTML (0) PDF 623.53 K (2744) Comment (0) Favorites

      Abstract:In order to solve malicious evaluation problems in evaluation model, an improved evaluation model with feedback incentive based on game theory is proposed. The model introduce user's authority into the content-based recommendations model give feedback points with nodes. The model can adjust feedback function dynamically when evaluation. The model with trust evaluation incentive mechanism is established by game theory including one node, a plurality of nodes and a plurality of content. The results showed that evaluation of trust value with authority value would facilitate reasonable choice and the same time, the content trust values increased reasonably.

    • 13.56MHZ RFID Reader Antenna Embedded in the Gap Magnetic Core

      2016, 25(5):222-228.

      Abstract (1153) HTML (0) PDF 847.65 K (2781) Comment (0) Favorites

      Abstract:For the phenomenon that the distribution of magnetic field intensity caused by antenna coil is non-uniform, this article puts forward a solution to enhance the local antenna's magnetic field intensity. First of all, this article explains the skin effect of high frequency magnetic field from the theory. Then, based on the skin effect of high frequency magnetic field, we add a gap magnetic metal core in the central coil in order to enhance the magnetic field strength. Finally, the influence of the different opening Angle of the gaps magnetic core on the magnetic field strength of loop antenna is studied by using 3D electromagnetic simulation software Ansoft HFSS and the MATLAB software, to find out the optimal design scheme of gaps. This has a certain reference value for the actual design of the antenna in13.56 MHz RFID reader systems.

    • Research and Simulation of OSPF Routing Protocol

      2016, 25(5):229-232.

      Abstract (1374) HTML (0) PDF 479.86 K (3673) Comment (0) Favorites

      Abstract:OSPF (Open Shortest Path First) is a typical link state routing protocol, and is widely used. Based on the intensive research of the packet type, packet header format and working principle of OSPF, an experimental network model including multi OSPF areas was designed. On the GNS3 platform, a simulation network environment was built, the routers and computers were configured, and the designed network model was successfully simulated. The simulation results verify the working process of OSPF, and provide a reference for the proper deployment of OSPF in the actual network.

    • Wiring Labeling Management Tool's Application Effect Assessment

      2016, 25(5):233-236.

      Abstract (1189) HTML (0) PDF 1.04 M (2009) Comment (0) Favorites

      Abstract:For dispatching automation engine room wiring quality and labeling are not standardized, this paper introduced the application of independent research and development of wiring labeling management tool. The tool's drawing function resolves the room wiring "no plans to follow"; its advanced applications improved wiring maintenance efficiency and promoted the standardization of the label. In order to study the feasibility of reducing the risk of the automation system by wiring labeling management tool, this paper cited the equipment state evaluation model to quantify risk assessment automation system. According to the impact of identity management elements to the assessment result of risk quantification, the application effects and promotion value of room labeling management tools was demonstrated.

    • Hybrid Mobile Application Development Based on HTML5

      2016, 25(5):237-240.

      Abstract (1362) HTML (0) PDF 578.83 K (3097) Comment (0) Favorites

      Abstract:With the rapid development of Internet and software technology, mobile application development is also continuously developing. Rapid speed, high performance and cross platform have become hot spots for developers. Aiming at the low efficiency and performance of mobile application, a mobile application development method based on Cordova and ionic/AngularJS is proposed. This method has realized the research of the HTML5 mixed development and improvement technology. This method improves the efficiency of development and operation.

    • Remote Communication and Control System of Military Radio Station Based on LAN

      2016, 25(5):241-244.

      Abstract (1712) HTML (0) PDF 855.03 K (5011) Comment (0) Favorites

      Abstract:Aiming at the limitation of the military radio communication range, a new communication and control system based on local area network was developed. The problem of the limited distance of civil air defense communication was effectively solved, the communication distance of military station was expanded, and the seamless connection of different types of military radio communication was realized. So this development has wide application value.

    • To Build the Optic Fiber SPR Virtual Simulation Design Platform Based on LabVIEW

      2016, 25(5):245-248.

      Abstract (1383) HTML (0) PDF 607.55 K (3109) Comment (0) Favorites

      Abstract:The surface plasmon resonance (SPR) based optical fiber sensor is a novel sensor, which takes optical fiber core as a substrate to excite SPR effect. This paper demonstrates a virtual simulation platform for design of optical fiber SPR devices on the basis of LabVIEW, and makes theoretical calculations according to material parameters and component architecture, which can change the size and material parameters in situ to understand the impact on SPR effect, and furthermore to find the optimum parameters. Finally, based on side-polished PMMA plastic optical fiber, the simulation shows that 40nm silver-plated thin film on the grinding surface results in a better performance of optic fiber SPR sensor. In terms of the optimum parameters of the sensor, the relationship between the resonance wavelength and the refractive index of sampling solution can be obtained.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063