• Volume 25,Issue 8,2016 Table of Contents
    Select All
    Display Type: |
    • >Survey
    • Introduction of Unsupervised Learning Methods in Deep Learning

      2016, 25(8):1-7. DOI: 10.15888/j.cnki.csa.005283 CSTR:

      Abstract (8883) HTML (0) PDF 1.11 M (38813) Comment (0) Favorites

      Abstract:Since 2006, Deep Neural Network has achieved huge access in the area of Big Data Processing and Artificial Intelligence, such as image/video discriminations and autopilot. And unsupervised learning methods as the methods getting success in the depth neural network pre training play an important role in deep learning. So, this paper attempts to make a brief introduction and analysis of unsupervised learning methods in deep learning, mainly includs two types, Auto-Encoders based on determination theory and Contrastive Divergence for Restrict Boltzmann Machine based on probability theory. Secondly, the applications of the two methods in Deep Learning are introduced. At last a brief summary and prospect of the challenges faced by unsupervised learning methods in Deep Neural Networks are made.

    • Comprehensive Reservoir Evaluation Method Based on Improved AHP

      2016, 25(8):8-15. DOI: 10.15888/j.cnki.csa.005300 CSTR:

      Abstract (1869) HTML (0) PDF 534.11 K (2313) Comment (0) Favorites

      Abstract:Reservoir evaluation is the foundation of selecting and predicting the oil field favorable areas. In order to solve the problems of subjectivity and inconsistent of judging matrix, which are encountered in the traditional AHP method, an comprehensive reservoir evaluation method based on improved AHP method is proposed. The method constructs judgement matrix to reduce the expert's subjective bias by using group AHP method and quasi-optimun consistent matrix and to solve the inconsistent problem of judging matrix by using least square principle. Then, the bottom indicators are divided into non-quantifiable indicators which obtain the evaluation vector by using experts' evaluation method and quantifiable indicators which obtain the evaluation vector by using the utility function method and grey AHP method. Finally, the comprehensive reservoir evaluation is calculated by the evaluation vector and the indicator weight of each layer. The results show that the proposed method can obtain the reservoir evaluation standard more objective and scientific. The reservoir evaluation standard can improve the development effect of the study area and provide favorable basis for adjusting the subsequent development programs.

    • Resource Allocation Risks by CAs in RPKI and Feasible Solutions

      2016, 25(8):16-22. DOI: 10.15888/j.cnki.csa.005313 CSTR:

      Abstract (1715) HTML (0) PDF 2.06 M (2929) Comment (0) Favorites

      Abstract:There are serious security vulnerabilities in BGP (Border Gateway Protocol) which may lead to route hijacking. In order to overcome these BGP security defects, RPKI (Resource Public Key Infrastructure) was proposed by IETF (Internet Engineering Task Force). However, with the development and global deployment of RPKI, a lot of concerns about the security of certificate authority in RPKI have been raised. In this paper, it carries out experiments about two scenarios (resource reassignment and unauthorized resource assignment) on our RPKI testbed, and analyzes the security problems they may lead to, based on our research and analysis of the process of resource allocation. Besides, for these two kinds of security risks, this paper presents and implements a pre-control mechanism. Finally, it conducts further experiments on our testbed to prove that the pre-control mechanism we presented is feasible and effective to avoid the time limit for recovering from the failure caused by certificate authority's operational mistakes during the process of resource allocation.

    • Sanya Airport Passenger Flow Forecast Based on Combination Forecast Method

      2016, 25(8):23-28. DOI: 10.15888/j.cnki.csa.005268 CSTR:

      Abstract (1791) HTML (0) PDF 427.49 K (4195) Comment (0) Favorites

      Abstract:Accurate passenger-flow forecast has always been playing the crucial role on the construction and development of the airport. This passage based on the data of passenger flow from 2005 to 2015 at Sanya Phoenix International Airport is proposed to predict the flow from 2016 to 2017 by adopting Holt-Winter seasonal model, ARMA model and liner regression model. In order to promote the forecasting accuracy, the portfolio weight method is used to forecast the result and reduce the error. According to the verification, this measure is one of the effective ways to predict the passenger flow.

    • Comparison of Five Algorithms for Recognizing Serlal Number of Rmb Banknote

      2016, 25(8):29-34. DOI: 10.15888/j.cnki.csa.005295 CSTR:

      Abstract (1557) HTML (0) PDF 546.95 K (2612) Comment (0) Favorites

      Abstract:To investigate the performance of different neural network algorithms in identifying serial number of RMB banknote, the training speed, recognizing speed and rate, and ability of anti-noise of five neural network algorithms, including the discrete Hopfield neural network, BP neural network, PNN neural network, GRNN neural network and SVM neural network, are studied. The simulation results show that amongst the five algorithms, BP performs worst, followed by SVM and Hopfield, with PNN and GRNN performs best, not only gives the higher recognition rate, shorter training and recognition time, but also is more robust to noise.

    • Saliency Detection Based on Comparison of Color Channels

      2016, 25(8):35-40. DOI: 10.15888/j.cnki.csa.005317 CSTR:

      Abstract (1516) HTML (0) PDF 582.85 K (2873) Comment (0) Favorites

      Abstract:To detect the salient regions in images quickly and efficiently, using information of difference between color channels and spatial information, this paper proposes a saliency detection approach based on comparison of color channels. The algorithm regarded the saliency detection task as a process of separating and identifying the foreground region and the background region of the image. Firstly, it defines a set of color channels based with RGB color space, and separates regions with different colors in image by making comparisons between different channels. Then, it selects foreground regions by analyzing spatial information. Lastly, it combines all foreground regions to obtain the final saliency map. We evaluate and compare the performances of our algorithm against previous algorithms on two public datasets. The experimental results show that our algorithm has lower computational complexity and high precision and recall rate, and prove that our algorithm is simple and effective.

    • Aircraft Cockpit Simulation System for Display Interface Ergonomics

      2016, 25(8):41-47. DOI: 10.15888/j.cnki.csa.005291 CSTR:

      Abstract (1381) HTML (0) PDF 2.61 M (2780) Comment (0) Favorites

      Abstract:Display interface ergonomics studies usually use time and correct rate as the index to record and analyze the operating process .Display interface needs to be flexible. However, the existing flight simulator cannot meet the demand that mentioned above. In order to study further, the operating process for a pilot is divided into information input, information processing, information output and the time or event records when information input or output changes. To achieve the above requirements, the functional requirements of simulation system and function module should be clear to obtain system overall frame. System simulation module, virtual instrument module, visual module, communication module, data management module of the design process should be described in detail in this paper. After implementing and testing the simulation system, the results show that the simulation system can record the time and state when information input or output changes, that meets the needs of the ergonomics research on display interface and provides a new method in studying display interface ergonomics.

    • Design of Self-Propelled Gun Fire Control System Virtual Training Software Based on WinCE

      2016, 25(8):48-53. DOI: 10.15888/j.cnki.csa.005281 CSTR:

      Abstract (1417) HTML (0) PDF 772.77 K (3092) Comment (0) Favorites

      Abstract:In order to solve the problem of the training equipment shortage, difficulty of organization is and massive operation cost of real vehicle training on fire control system, the fire control virtual training software based on WinCE is developed in this paper, according to the requirement of tactics and performance from real vehicle training. Based on the brief introduction of WinCE and its development environment, this paper focuses on introducing the basement of software development environment of virtual training system. Detailed design method of major components is also proposed. Application test indicates that the simulator runs stably, which greatly improves the efficiency of equipment training.

    • Distributed Transcoding Scheme Based on Hadoop Cloud Computing Platforms

      2016, 25(8):54-60. DOI: 10.15888/j.cnki.csa.005286 CSTR:

      Abstract (1490) HTML (0) PDF 653.30 K (3289) Comment (0) Favorites

      Abstract:With the rapid development of new media video services today, traditional standalone video transcoding capability has been a bottleneck. This paper proposes a new video transcoding scheme based on the research on Hadoop cloud computing platform and the current mainstream audio and video processing tool FFmpeg. This scheme fulfills distributed transcoding method by using two core components in Hadoop: HDFS(Hadoop Distributed File System) and the programming ideas of MapReduce. Meanwhile, the paper also describes in detail the specific processes and design of distributed transcoding. Finally, experimental results show that The distributed transcoding scheme has greatly improved the efficiency. Simultaneously in the experiment, the segment size of each video file also impacts the time of video transcoding process. The experiment shows that as the segment size goes from small to large, time consumed by the transcoding process index experiences a curve: firstly it changes from large to small, then drops to its lowest point and gradually rises. The lowest point exists when the segment size is adjusted to 32M.

    • Collaborative Drawing System Based on Mobile Terminal with IOS

      2016, 25(8):61-66. DOI: 10.15888/j.cnki.csa.005275 CSTR:

      Abstract (1468) HTML (0) PDF 571.51 K (2156) Comment (0) Favorites

      Abstract:In order to increase the drawing interaction and collaboration between the users, a collaborative drawing system based on mobile CSCW method on Mobile Terminal with IOS is designed and realized, which adopts the C/S model. Through analyze the coordinated control technology, the system realizes the information communication between mobile terminal and server. At the same time, with the demand of user single hand drawing, in order to make full use of gyroscope and accelerometer sensors, it designs a scheme with Primitive as a unit. Finally, the system is tested in IOS platform, and it is indicated from the result that the system runs smoothly and can achieve the design target.

    • UI Library Based Convergence Communication System

      2016, 25(8):67-72. DOI: 10.15888/j.cnki.csa.005280 CSTR:

      Abstract (1396) HTML (0) PDF 758.98 K (2173) Comment (0) Favorites

      Abstract:Along with the progress of the science and technology, more and more attentions were paid to Convergence Communication. Therefore, many products based Convergence Communication emerged. Nowadays, UX(User Experience) becomes more and more important. However, the traditional develop-mode of UI interface has the problem that UI is tightly coupled with business logic, which can't meet the demands of the ICT products' UI interface. A UI Library based on DirectUI is proposed, which decouples the UI interface and business logic. The architecture design and each module of the UI Library are described. What's more, the formulation of the user interface description language and the design of the message mechanism are detailed explained. The characteristics of the UI Library are proved by an ICT instance.

    • Exception Handling Mechanism in School Management System Based on Request

      2016, 25(8):73-78. DOI: 10.15888/j.cnki.csa.005334 CSTR:

      Abstract (1383) HTML (0) PDF 706.69 K (2329) Comment (0) Favorites

      Abstract:The exception handling mechanism is one of the key parts in any web application design. Spring MVC framework provides an exception handling interface and several exception resolvers. Through analyzing of the Spring Framework's source code, it describes the way which these exception resolvers work in, deduces their time complexity and lists their applicable scenarios. According to the application requirement of exception handling in framework of eCampus System in SYSU, it divides exception into two categories: business exception and system exception and designs and implements an exception handling including exception handling applying for AJAX and global exception handling of ExceptionHandler.

    • Research and Design on Technology to Improve Intelligent Device Application System Performance

      2016, 25(8):79-85. DOI: 10.15888/j.cnki.csa.005324 CSTR:

      Abstract (1795) HTML (0) PDF 774.33 K (2225) Comment (0) Favorites

      Abstract:With the wide application of intelligent devices in all the fields, their application system has the increasingly prominent issues in the aspects such as power consumption, efficiency and instantaneity, and such issues have become the main obstacle for the continuous development of the intelligent devices. How to improve the intelligent device application system performance has become an important topic in this field. In this paper, the technology is able to effectively improve the intelligent device application system performance in the way of core algorithm and design framework of the application software. First, it conducts the cross-platform transplant on the core algorithm and framework of the application software based on the technologies such as JNI and NDK; then, it improves the original algorithm with the native code (C or C++ language); finally, it utilizes the multi-core calculation and processing ability of the intelligent devices to appropriately increase the task quantity and improve the load balancing. The experimental result indicates that: if such technologies are appropriately integrated into the original application system, the overall performance of the intelligent devices can be improved substantially.

    • Discussion on the Construction of Integrated Environment of New Media Government Affairs Release Websites

      2016, 25(8):86-90. DOI: 10.15888/j.cnki.csa.005311 CSTR:

      Abstract (1854) HTML (0) PDF 532.08 K (2086) Comment (0) Favorites

      Abstract:According to the information release characteristics of government website on various media, this paper proposes Integrated content management solution which integrates a variety of media content management functions, it uses unified information resource pool with centralized management of data resources, implements information and a multi channel convergence release, forms a environment of content association and sharing between new media platforms.

    • E-Commerce Recommender System Based on Web Log Mining and Correlation Measure

      2016, 25(8):91-95. DOI: 10.15888/j.cnki.csa.005341 CSTR:

      Abstract (1749) HTML (0) PDF 721.77 K (3160) Comment (0) Favorites

      Abstract:Nowadays, personalized recommender technology based on Web log mining has been widely used in the e-commerce website. For the issues that the existing recommender systems do not have high accuracy, a recommendation system for e-commerce based on web log mining and correlation measure is proposed. First, the user's access log is extracted, and the data is preprocessed to obtain the structured data. Then, the log is analyzed to extract the characteristic sequence. After that, the correlation between the page and the transaction text documents is calculated according to the occurrence frequency of characteristics and the page dwell time. Finally, the angle cosine formula is used to calculate the correlation between the user and the page, and thus form a list of recommendations. Experimental results show that the proposed scheme can accurately give personalized recommendation according to the user's preference.

    • Extracting Application of Medical Quality Evaluation Index Data Based on the Ensemble Integration Platform

      2016, 25(8):96-100. DOI: 10.15888/j.cnki.csa.005448 CSTR:

      Abstract (1471) HTML (0) PDF 678.46 K (2417) Comment (0) Favorites

      Abstract:In view of the research of medical quality evaluation in general hospital, current research focuses on the determination of medical quality evaluation index system, and the calculation of weight of hospital or physicians. In ways of extracting index data, it mostly uses semi-automatic entry summary data or existing data in the same system, the extraction results does not meet the three levels of grouping physicians management mode. This paper puts forward automatically extracting dynamic grouping information of clinical physicians, medical quality evaluation index data of each group and clinical physician in each group, using interface integration of webservice+xml, which are based on the ensemble integration platform. Experimental results are automatically extracted the part quality evaluation indexes of each group and clinical physician for a clinical department. The conclusion of this study provides a new team oriented assessment method and quantitative data basis for each clinical department in general hospital.

    • Bursty Topic Detection Based on Word Co-Occurrence and Emotions

      2016, 25(8):101-108. DOI: 10.15888/j.cnki.csa.005288 CSTR:

      Abstract (1549) HTML (0) PDF 1.50 M (2489) Comment (0) Favorites

      Abstract:With the rapid development of the We-Media, monitoring and guidance of public opinion becomes a significant research subject. Traditional topic detection methods in microblog data analytics encounters the problems of high computational complexity, low real-time and recall rate. An improved algorithm based on emotions and word co-occurrence detection is proposed in this paper aiming at solving these problems. It builds a emotional subspace model through co-occurrence relation of sentiment words in hot events, and classifies the flow of information in weibos. Finally, it gets the aim of topic detection via extracting the subject in the corresponding category. The experimental results carries out on the microblog content corpus of NLPIR and verifies that this method can effectively detect news topic from the massive microblog information and realize the news topic tracking.

    • Validity Index for Fuzzy Clustering Based on Belong Proportion

      2016, 25(8):109-114. DOI: 10.15888/j.cnki.csa.005274 CSTR:

      Abstract (1778) HTML (0) PDF 623.19 K (3346) Comment (0) Favorites

      Abstract:Aiming at the problem that fuzzy clustering needs to know the best cluster numbers, a new validity index named new validity index for fuzzy clustering based on belong proportion is proposed in the reference of existing cluster validity indexes. Firstly, it proposes a basic validity index after full consideration of the given dataset's partition matrix and geometrical structure by redefining the separation distance between different clusters. Secondly, it defines the concept of belong proportion to enlarge the calculation value. Finally, it introduces cluster number to restrain the index because belong proportion may cause excessive influence. The new validity index is proved to be more reliable and have a higher accuracy compared to the classical indexes like XB index because it still makes right decision even when the given dataset is overlapping, so the new index has some value to popularize.

    • Static Gesture Recognition Arithmetic Based on CHMM

      2016, 25(8):115-119. DOI: 10.15888/j.cnki.csa.005266 CSTR:

      Abstract (1984) HTML (0) PDF 979.88 K (3076) Comment (0) Favorites

      Abstract:In the paper, the continuous hidden Markov model is applied in static gesture recognition for the first time. According to the characteristics of CHMM, the pixel coordinates sequence of hand contour is chosen as a learning sample. It extracts and tracks the hand gesture by Kinect, and trains CHMM model library which is used for static gesture recognition. At last, the method is compared with the SVM method in an experiment. Experimental result shows the method is efficient, flexible and need minority samples.

    • Non-Invasive Blood Glucose Measurement Based on Support Vector Machine Algorithm

      2016, 25(8):120-124. DOI: 10.15888/j.cnki.csa.005253 CSTR:

      Abstract (1845) HTML (0) PDF 707.09 K (3958) Comment (0) Favorites

      Abstract:To achieve sensing non-invasive blood glucose concentration, this paper proposes a non-invasive blood glucose spectrum algorithm based on support vector machine (SVM) model. The algorithm firstly uses a PPG device to sample red and infrared signal of volunteers to obtain the PPG signal, and then extracts the blood glucose concentration by a minimally-invasive glucometer. Compared with traditional near-infrared spectrum and regression method, the proposed algorithm could effectively improve the prediction accuracy by adopting the SVM model to find regression relationship between signal and glycemic. And the SVM model uses the Gauss-function as the kernel function. The algorithm is independently of the individual and environmental factors. The experimental results demonstrate that compared to partial least squares regression, the proposed algorithm could improve the predictive accuracy by 10%–15%. And the algorithm's forecast accuracy could reach to 98%.

    • Method for Overflow Diagnosis of Memory in Hadoop Platform

      2016, 25(8):125-129. DOI: 10.15888/j.cnki.csa.005285 CSTR:

      Abstract (1118) HTML (0) PDF 618.90 K (2398) Comment (0) Favorites

      Abstract:In this paper, it analyzes the mechanism of Hadoop and summarizes the common issue of memory leak, and proposes a method to diagnose this issue. The proposed approach could diagnose the phase of the overflow of memory occurs, the objects which consume most of the memory space, and the related configurations, to help the Hadoop user to find the root cause of error during out of memory. It also evaluates the effectiveness of the proposed approach under typical data processing applications for the power grid.

    • Adaptive Tri-Training Semi-Supervised Algorithm

      2016, 25(8):130-134. DOI: 10.15888/j.cnki.csa.005298 CSTR:

      Abstract (1797) HTML (0) PDF 587.30 K (2746) Comment (0) Favorites

      Abstract:Tri-Training algorithm belongs to semi-supervised algorithm,unlabeled samples are often labeled incorrectly in study, and the performance is affected. So the ADP-Tri-Training (Adaptive Tri-Training) algorithm is proposed, cooperative work mode is improved, a classification composition scheme based on geometric center is used, the fuzzy mathematics theory is applied to combine the classifiers, so the algorithm can evaluate the samples by multiple factors, genetic algorithm is introduced to dynamically set the combined weight in order to adapt different sample sets, also it can reduce the error of classifies as far as possible, finally the experimental results show that the proposed algorithm is more effective.

    • New Algorithm of Image Inpainting Curvature-Driven Diffusion Model

      2016, 25(8):135-138. DOI: 10.15888/j.cnki.csa.005284 CSTR:

      Abstract (1467) HTML (0) PDF 847.49 K (3105) Comment (0) Favorites

      Abstract:CDD inpainting model is based on TV model local spread and it introduces curvature term, then realizes the connectivity and holistic principle. For the different size of the gradient value of each reference point and diffusion efficiency defects, an improved CDD inpainting algorithm is proposed by degenerate diffusion model. Firstly, it calculates the gradient information of pixel and curvature of isolux line to control the contribution of the reference point on the repair area, and then they are weighted. Finally, the discrete model of partial differential equations is given. Experimental results show that this algorithm realizes the connectivity principle partially. In addition, it can repair the damaged image better than CDD algorithm with same iterative times.

    • Analysis and Application For B-Tree Structure of the Index Directories in NTFS

      2016, 25(8):139-144. DOI: 10.15888/j.cnki.csa.005265 CSTR:

      Abstract (1584) HTML (0) PDF 756.82 K (5459) Comment (0) Favorites

      Abstract:Aiming at managing the index directories in the NTFS file system, it uses B+ tree in some of books and magazines of NTFS, analyzes the 90H attribute, A0H attribute, B0H attribute in the folder recorder in the metafile $MFT and the structure of the index node in NTFS file system, observes to change the index directions in the NTFS by researching, deleting, inserting the file name in it by the mode of experiment. The experiment results indicate that the structure of the index directories in NTFS uses B-tree structure, but it isn't the standard B-tree structure.

    • Enhancing the Transmission Efficiency by Edge Deletion in the Urban Traffic Optimization

      2016, 25(8):145-148. DOI: 10.15888/j.cnki.csa.005264 CSTR:

      Abstract (1762) HTML (0) PDF 663.00 K (2183) Comment (0) Favorites

      Abstract:This paper establishes an urban traffic network model which is used with control methods, and is mathematical described by Structure matrix. The concept of order parameter is introduced to characterize the urban traffic congestion. Then this paper put forward a certain strategy of enhancing the transmission efficiency by edge deletion which is based on betweenness. This strategy is applied in the traffic network model which has been established. The simulation results show that, in the optimization of urban traffic, enhancing the transmission efficiency by edge deletion is an effective and low cost strategy. And a conclusion is drew that the corresponding relationship of edge deletion proportion and maximum betweenness is inversely proportional.

    • Application of Intelligent Algorithm in Mathematical Modeling Contest

      2016, 25(8):149-154. DOI: 10.15888/j.cnki.csa.005272 CSTR:

      Abstract (1613) HTML (0) PDF 691.34 K (3510) Comment (0) Favorites

      Abstract:As a successful mathematical teaching reform practice, mathematical modeling contest has promoted the improvement of students' practical ability and the exploration of mathematics. In recent years, with the rapid development of computer technology and artificial intelligence technology, artificial intelligence algorithms have been widely used in mathematical modeling. The proposed intelligent algorithm plays an important role in promoting the development of mathematical modeling.

    • Application of ELM Algorithm in the Analysis of Customer Electrical Behavior

      2016, 25(8):155-161. DOI: 10.15888/j.cnki.csa.005305 CSTR:

      Abstract (1677) HTML (0) PDF 888.01 K (2945) Comment (0) Favorites

      Abstract:In order to detect the illegal use of electricity, electrical enterprises generally adopt traditional manual examination ways. However, both of the accuracy and efficiency of the approaches are far from satisfaction. In this paper, an analysis method based on the Extreme Learning Machine (ELM) algorithm is proposed, which is used to predict the behavior of customers' illegal electric use. Firstly, it collects the historical electric usage data and preprocesses the data to make it suitable for analysis by the algorithms. Then, it applys an algorithm based on neural network model, which is called ELM, to build the model to describe the abnormal power utilization behavior of the customers. Finally, experiments on the real electrical consumption data are conducted to evaluate the proposed method. The experimental results demonstrate that the proposed method is accurate and efficient.

    • Improved Threshold Segmentation Algorithm on Valley-Emphasis Information

      2016, 25(8):162-165. DOI: 10.15888/j.cnki.csa.005287 CSTR:

      Abstract (1462) HTML (0) PDF 741.88 K (2580) Comment (0) Favorites

      Abstract:The valley-emphasis method and the neighborhood valley-emphasis method all consider the gray threshold, where the valley and the neighborhood values affect the probability of segmentation results. This paper proposes an improved Otsu algorithm, which combines valley gray value and spatial distribution of the image, and constructs a new standard deviation factor, thus forms a new threshold segmentation of the target formula. Through the simulation experiment, the proposed algorithm can effectively segment the images, which has a very strong practicability.

    • Improved Naïve Bayes Algorithm Based on Weighted Instance with Cosine Similarity

      2016, 25(8):166-170. DOI: 10.15888/j.cnki.csa.005306 CSTR:

      Abstract (2038) HTML (0) PDF 610.90 K (4719) Comment (0) Favorites

      Abstract:Many classifiers cannot get good results facing numerous sample features, bayes algorithms get poor estimate of joint probability distribution with limited samples, effective similarity measure is needed to build a local classifier. Considering these problems, an improved multinomial Naïve Bayes algorithm based on weighted instances (IWIMNB) with cosine similarity is proposed. Taking different attributes contributing differently to the classification decision weight into account this algorithm uses cosine similarity as a metric of the similarity between training and validation instances. Selected training instances weighted by cosine similarity are used to train modified Naïve Bayes model. Results of final experiments show that the average classification accuracy of the proposed IWIMNB algorithm gets significant improvement.

    • Multi-Table Paging Query Optimization Technology in MySql

      2016, 25(8):171-175. DOI: 10.15888/j.cnki.csa.005292 CSTR:

      Abstract (2134) HTML (0) PDF 690.97 K (4694) Comment (0) Favorites

      Abstract:Under large amount of data the union operation makes data paging very slow, how to improve the performance of data paging efficiency becomes an import issue for MySql. This paper proposes a new data paging algorithm from analysis of union operation in MySql data paging method's advantages and disadvantages, and the key factors affects the speed of the data paging. By avoiding union operation in multi-table query and using indexes it improves query efficiency and reasonable. The experimental results confirms that the optimized query methods in pagination operations could significantly improve the speed.

    • Intra Prediction Mode Selection for HEVC Based on Canny Operator

      2016, 25(8):176-181. DOI: 10.15888/j.cnki.csa.005293 CSTR:

      Abstract (1272) HTML (0) PDF 830.03 K (2210) Comment (0) Favorites

      Abstract:Intra-modes decision in HEVC has higher complexity. Aiming at this problem, after brief analysis of the intra prediction algorithm, an intra prediction method selection algorithm based on the improved Canny operator is proposed to reduce the HEVC intra-frame prediction complexity. Firstly, The improved Canny operator is used to obtain the direction of the Prediction Unites(PU) in advance, in order to select the corresponding angle prediction model to comprise the candidate list,and the spatial correlation of images is adopted to add the optimal mode of the neighboring PU to the candidate list. At Last, this algorithm takes full use of the advantages of rate distortion cost to select the candidate pattern quick descending law. Experiment proves that the proposed algorithm will reduce the number of candidate patterns from 35 to less than 10 compared with RMD, and effectively reduces the complexity of intra-coding. The average encode speed is accelerated about 32%, while BD-Rate loss was only 0.096% encoding time, and subjective image quality has no obvious change after encoding.

    • Image Change Detection with Supervised Context Similarity

      2016, 25(8):182-188. DOI: 10.15888/j.cnki.csa.005322 CSTR:

      Abstract (1727) HTML (0) PDF 954.66 K (2256) Comment (0) Favorites

      Abstract:To deal with the problem that changed areas are overestimated in image change detection, a context-sensitive similarity based supervised image change detection method is proposed and applied in bi-temporal high resolution and multispectral satellite image change detection. It exploits both context-sensitive magnitude and direction of change in the vicinity of each pixel by means of local intercept and slope, and uses support vector machine (SVM) with local intercept and slope for image change detection. The results are from experiments for change detection of high resolution bi-temporal multispectral earthquake images including building damage. It is obvious that the false alarms are mostly reduced, which means it is effective for solving changed area overestimation problems.

    • Hot Water Stock Control Algorithm for Solar Central Water Heater Based on the Credibility Theory

      2016, 25(8):189-194. DOI: 10.15888/j.cnki.csa.005302 CSTR:

      Abstract (1714) HTML (0) PDF 642.11 K (2474) Comment (0) Favorites

      Abstract:The safety hot water stock of solar central water heater plays an important role in balancing the user demand and energy consumption. To design and establish a suitable safety hot water stock model can effectively reduce the energy consumption in the auxiliary heat source in the system. The credibility theory recently has been widely applied to solve the problems in engineering uncertainty, product management, inventory management and the ambiguous design in power system, etc. All heat losses parameters of solar central water heater are analyzed in this paper with the purpose of designing a safety hot water stock model suitable for solar central hot water engineering based on the credibility theory and further the optimized result to control the solar central water heater being used in the field control system of the solar system to help the solar central water heater to reduce auxiliary heat source energy consumption. The running results show that the model of the optimal solution design in this paper can improve energy utilization and reduce energy consumption in the auxiliary heat source.

    • Grid Parallel Topology Analysis Based on Method of Node Integration and Layering

      2016, 25(8):195-199. DOI: 10.15888/j.cnki.csa.005367 CSTR:

      Abstract (1488) HTML (0) PDF 596.71 K (2982) Comment (0) Favorites

      Abstract:With the rapid development of modern multi-core and cluster technology, design of parallel computing to improve the efficiency has become one of the mainstream technologies. This paper puts forward a new method of node-based integration and hierarchical network topology in parallel. When in the normal operation of power network, using parallel fusion nodes adjacent table, to analyze static electric Island grid topology, electrical island adjacent to form and hierarchy. When the network topology changes, according to the attributes of the nodes and parallel depth first search method, it updates the local network topology and the electrical Island adjacency list. a practical network being analyzed by MATLAB's Parallel Computing Toolbox and the results prove the correctness and effectiveness of the proposed method.

    • Improved Genetic Algorithm Used in Test Cases

      2016, 25(8):200-205. DOI: 10.15888/j.cnki.csa.005307 CSTR:

      Abstract (1416) HTML (0) PDF 643.76 K (2951) Comment (0) Favorites

      Abstract:In software testing process, efficient test case generation can dramatically simplify testing, improve test efficiency and save software development costs. As an effective search algorithm, genetic algorithm has been widely applied to the study on automatic generation of test cases, and has good global search capability. However, some inherent limits of this algorithm exist, such as low optimization efficiency, premature convergence, etc. This paper proposes a modified genetic algorithm combined with tabu search algorithm, improves the select and crossover operator of genetic algorithm against the shortcomings of premature convergence, and adopt the optimal preservation strategy for improving search capabilities in the local space and the overall operating efficiency. Experiments result shows that the new algorithm has obvious advantages in efficiency and effectiveness compared with traditional genetic algorithm for test case generation.

    • Quantum-Inspired Neural Networks Model and Algorithm

      2016, 25(8):206-210. DOI: 10.15888/j.cnki.csa.005346 CSTR:

      Abstract (1777) HTML (0) PDF 736.90 K (2325) Comment (0) Favorites

      Abstract:To enhance the approximation ability of neural networks, by introducing quantum rotation gates to the traditional BP networks, a novel quantum-inspired neural network model is proposed in this paper. In our model, the hidden layer consists of quantum neurons. Each quantum neuron carries a group of quantum rotation gates which are used to update the quantum weights. Both input and output layer are composed of the traditional neurons. By employing the error back propagation algorithm, the learning algorithms are designed. Simulation-based experiments using two application examples of pattern recognition and function approximation, respectively, illustrates the availability of the proposed model.

    • Vehicular Safety Message Broadcast Mechanism Based on Probability and Backoff

      2016, 25(8):211-219. DOI: 10.15888/j.cnki.csa.005483 CSTR:

      Abstract (1446) HTML (0) PDF 689.25 K (2574) Comment (0) Favorites

      Abstract:In vehicular ad hoc network (VANET), the efficient coverage and low transmission collision of safety message is the challenge. To solve this problem, a VANET broadcast mechanism based on probability and backoff (VBM-PB) are proposed in this paper. The mechanism is part of the recipient mechanism and is practicable due to low complexity and fully distributed computation. The geographical position and data load of vehicles are both considered to calculate the forward probability of each potential relay in VBM-PB. A function of forward probability is constructed combined with an adaptive backoff mechanism, which can reduce packet redundant in the network, relieve data collision among nodes and enhance coverage rate of safety message. Besides, timeout-retransmit mechanism is also applied to guarantee high reliability of transmission. The simulation results show that the performance of VBM-PB is superior to several traditional mechanism in terms of package permeability, forwarding node proportion and transmission delay.

    • 802.11 DCF Channel Access Mechanism Based on Linear Networking Coding

      2016, 25(8):220-226. DOI: 10.15888/j.cnki.csa.005246 CSTR:

      Abstract (1322) HTML (0) PDF 643.72 K (2179) Comment (0) Favorites

      Abstract:Considering the main problem of the high loss rate in wireless environments, this paper proposes a linear networking coding-aware 802.11 distributed coordination function(LEC-DCF). A double-decoding method is introduced to decode the transmitted packets. The decoding success rate of the destination node is greatly improved. It develops a Markov chain model to characterize the mathematical modeling of LEC-DCF. Analysis result shows that LEC-DCF can improve throughput in high loss rate wireless environments.

    • Key Technology of Cloud Desktop Printing Mapping

      2016, 25(8):227-232. DOI: 10.15888/j.cnki.csa.005279 CSTR:

      Abstract (1445) HTML (0) PDF 691.02 K (2798) Comment (0) Favorites

      Abstract:Printer is one of the most common peripheral device. With the rise of desktop virtualization Technology, applications gradually migrate from PC to cloud desktop, which brings a new challenge for printing because of the sharp different of printing architecture between cloud desktop and PC. This paper explores Windows printing architecture, introduces the GDI print path and XPS printing path, and compares the difference of printing architecture between cloud desktop and PC, then discusses the issues of printing inside the cloud desktop and the solution derived from the major desktop virtualization vendors. By analyzing deep into the major USB redirection technology and printer mapping technology, the advantages and defects of them are compared, and the problems to be solved are discussed. The development direction and research prospects of cloud desktop printing are put forward in this paper.

    • Exploitation of Experimental Board Based on AT89S52 and CPLD for Integrated Course Design

      2016, 25(8):233-240. DOI: 10.15888/j.cnki.csa.005297 CSTR:

      Abstract (1418) HTML (0) PDF 844.41 K (2489) Comment (0) Favorites

      Abstract:Single chip microcomputer technology and CPLD technology has become the necessary professional knowledge of electronic class for students in Colleges and universities. The experimental board combined with curriculum content of college students selected AT89S52 microcontroller and Altera company production EPM7128SLC84-6. which are commonly used in the current school teaching. And it designs the common used digital tube display, 1602A LCD display, keyboard, and calendar clock interface circuit. Through a large number of examples of learning, students can quickly grasp the microcontroller C language and HDL Verilog programming skills in a short period of time.

    • Similarity Measurement Method of Target Recognition

      2016, 25(8):241-245. DOI: 10.15888/j.cnki.csa.005282 CSTR:

      Abstract (1269) HTML (0) PDF 758.55 K (2368) Comment (0) Favorites

      Abstract:Similarity measurement is a key step in image matching, this paper studies the differences between feature vector sequence alignment and cross comparison method, and based on two-dimensional histogram features which are extracted by shape context, respectively combined with x2 distance, earth mover's distance and the diffusion distance these three different similar measurements, it carries out the identification and verification of a variety of image standard library.

    • Text Classification Based on Semantic

      2016, 25(8):246-249. DOI: 10.15888/j.cnki.csa.005263 CSTR:

      Abstract (1446) HTML (0) PDF 602.21 K (2130) Comment (0) Favorites

      Abstract:Since the 21st century, much of the knowledge is stored in the document, but the size and structure of all kinds of documents do not facilitate knowledge processing, integration and management. How to extract semantics from the disordered, unstructured data (knowledge) is a task, the primary task is to extract knowledge which is contained in the data and information, to construct the semantic web which is based text resource, using RDF to represent indicate the semantic data, then using TFIDF algorithm to calculates the credibility of the key of the text, the last to enter text information in the database and to realize automatic text classification, ultimate goal is to realize knowledge sharing.

    • Solving Process of Backdoors Set in QBF

      2016, 25(8):250-253. DOI: 10.15888/j.cnki.csa.005252 CSTR:

      Abstract (1783) HTML (0) PDF 661.62 K (2424) Comment (0) Favorites

      Abstract:The Backdoors as one of the important structures of problem QBF, it makes QBF problems easier in solving difficulty. In QBF problem, the solving of backdoors is quite complex and difficult to understand. In order to enable the reader to better understand the solving process, this paper researches the solving process of backdoors for QBF problems, calculates the depth of variable x and the triangle dependent set of variable DψΔ(x) that is meet the condition by combining the examples. This paper solves the backdoors of this problem according to the ideas of B=B∪{x}=x and ψ'=ψ-DψΔ(x). We are hoping that it can provide a reference for researchers in this field.

    • Channel Selection Mechanism in Cognitive Radio Networks

      2016, 25(8):254-259. DOI: 10.15888/j.cnki.csa.005296 CSTR:

      Abstract (1384) HTML (0) PDF 703.26 K (3346) Comment (0) Favorites

      Abstract:To improve the utilization of wireless spectrum resource, the dynamic spectrum access is used in the cognitive radio network. However, the advantages and disadvantages of Node target channel selection directly determine the spectrum access performance. Firstly, by comprehensively considering the two factors of the channel gain and spare time, this paper designs a channel selection mechanism so as to realize the goal of maximizing the system throughput. Then this paper introduces the concept of channel heat and puts forward a channel selection mechanism based on multiple attribute decision. The simulation results indicate that channel selection mechanism based on multiple attribute decision apparently improves the system throughput and spectrum utilization performance.

    • Warehouse Visual Editor Based on Unity3D

      2016, 25(8):260-263. DOI: 10.15888/j.cnki.csa.005308 CSTR:

      Abstract (2091) HTML (0) PDF 967.48 K (3861) Comment (0) Favorites

      Abstract:In recent years, with the rapid development of the storage industry and the increasing variety of warehouse goods, the traditional manual management can not meet the needs of modern warehouse management. And 3D visualization management system that can manage the warehouse real-timely, intuitively and comprehensively, has become more attractive to warehouse managers. The development of any 3D visualization system requires a seamless editor. The warehouse visual editor presented in this article is developers-oriented. It can help developers to build a real 3D scene quickly and shorten the development cycle of visualization system. In this paper, it realizes the warehouse visual editor based on unity3D. Firstly, it realizes the overall framework of the editor. Secondly, it achieves the functions of 3D interface layer, uniform interface of communication, the operation panel of model.

    • Exceptional Handling for Embedded System in Pathology Equipment

      2016, 25(8):264-268. DOI: 10.15888/j.cnki.csa.005413 CSTR:

      Abstract (1440) HTML (0) PDF 996.14 K (2458) Comment (0) Favorites

      Abstract:Based on the principle of finite state machine, the article presents one new exceptional handling algorithm aiming at software and hardware exceptional handling in embedded system running in pathology equipment. The algorithm retrieves exceptional code based on the type of exception at first, and then handles it with XML formatted exceptional handling table and the specific state machines. The article firstly introduces background on the algorithm and then describes the detailed design and implementation. After that, one example is also shown to verify the algorithm. Finally, it also discusses how to improve this algorithm briefly.

    • Research and Application of Performance Evaluation Index Based on Particle Swarm Optimization

      2016, 25(8):269-271. DOI: 10.15888/j.cnki.csa.005424 CSTR:

      Abstract (1196) HTML (0) PDF 562.34 K (2492) Comment (0) Favorites

      Abstract:PSO (PSO) trends in real life in recent years presents a leap trend. It is used in many aspects. Taking its advantages into account. Its application is taken into the evaluation of the performance appraisal. The existing assessment methods can not solve the problem of the present., this paper proposes a particle swarm optimization based on performance evaluation methods to optimize the performance assessment indicators, so that it is able to help examiners to assess personnel Evaluation.

    • Second Layer Bridge Switch Technology for Embedded Linux Based on HDLC Media

      2016, 25(8):272-275. DOI: 10.15888/j.cnki.csa.005547 CSTR:

      Abstract (1284) HTML (0) PDF 602.04 K (2892) Comment (0) Favorites

      Abstract:This paper makes HDLC device use into a virtual net device in Linux, uses the configuration of bridge in Linux to design for interconnection between HDLC protocol and ethernet. The main purpose of this paper is to introduce the design main points of virtual net device driver and configuration of bridge technology, which provides a scheme for communications equipment between different medias to actualize net bridge function in embedded Linux.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063