ZHENG Hao-Quan , JIN Dan , MA Zhi-Cheng
2017, 26(2):1-8. DOI: 10.15888/j.cnki.csa.005604
Abstract:In electric power, there are application requirements of big data in every specialty. At the same time, there are many big data solutions and technology roadmap. The unified platform needs to achieve for integrated enterprise information system to avoid multiple construction. In this paper, the application requirements and technique actuality have been analyzed. Then, we propose the function architecture of basic platform for big data. At last, the design theory and implementation of the platform are discussed in detail.
2017, 26(2):9-17. DOI: 10.15888/j.cnki.csa.005602
Abstract:In order to overcome the demerits of Fruit Fly Optimization Algorithm(FOA), such as long running time and easily relapsing into local optimum, which are caused by improper parameters setting, this paper mainly researches how the main parameters of FOA influence the following aspects:running time, optimization performance and convergence velocity. Taking six standard testing functions optimization as an example, we make the simulation experiments of FOA under the different parameters. Firstly, qualitative conclusions of influence of important parameters on FOA's performance are drawn by comparative analysis and study. And then the reasonable value ranges of the parameters are given in order to get a better balance between FOA's performance and its running time. Experimental results show that reasonable parameters settings not only shorten FOA's running time, but also speed up its convergence velocity and improve its optimization precision.
WANG Yan , ZUO Chun , ZENG Lian
2017, 26(2):18-24. DOI: 10.15888/j.cnki.csa.005640
Abstract:According to the weakness of shallow semantics models based on lexical analysis which are commonly used in QA system, shallow semantics models cannot accurately analyze the deep semantics of users' questions. This paper focuses on the tourism QA application field, adopts the combined category grammar (CCG) to parse the question sentences, and uses lambda calculus to express the question semantics, so that semantic models on tourism questions can be derived. And it's convenient to search answers according to such accurate semantic quickly. The research first carries out data acquisition and corpus tagging preparatory work,including the analysis of tourism question corpus both in sentence pattern and syntax. Then the supervised learning process based on a probabilistic CCG algorithm is used to train a reliable semantic dictionary. At last, an automated answering system is built according to the semantic dictionary and related knowledge, which is mainly about the question parsing and building of corresponding semantic models. The final result on evaluation dataset shows that the semantic analysis method has relatively clear improvement in analytical performance.
2017, 26(2):25-29. DOI: 10.15888/j.cnki.csa.005594
Abstract:Since the time of web2.0, social network information of internet has increasingly integrated into people's life. The analysis of the vast social network information has become an important research direction in the field of text analysis. In this article, through establishing emotional dictionary and semantic rules, the emotional colors of Chinese micro-blog are analyzed and calculated. Then the emotion map combined with GIS spatial analysis method gives a scientific and quantitative description of subjective emotion by means of objective evaluation and the emotion revealed on the map. This article which takes the result of micro-blog sentiment analysis as evaluation index to evaluate the Gross National Happiness, analyzes the meaning of evaluating the happiness with mood map created on the approach which combines the GIS with the traditional sentiment analysis.
ZHANG Qi , CHEN Yan , ZHANG Chun-Ping , LIU Ming
2017, 26(2):30-36. DOI: 10.15888/j.cnki.csa.005626
Abstract:With the development of Smart Grid, in the process of the operation, maintenance and management of Smart Grid, massive heterogeneous data can been generated. The massive data includes videos, images, sensor data and some enterprise file information, etc. Traditional relational database is unable to store so large-scale unstructured data. So far, it is one of the hot research topics that how to store the unstructured data efficiently, cheaply, safely and reliably, and how to retrieve and analyze quickly. This paper analyzes the generation and characteristics of big data of Smart Grid, and review the storage technology of distributed file system in industry. Finally, we propose a distributed file system storage strategy for unstructured data of Smart Grid.
ZHANG Chi-Cheng , ZHOU Yuan-Ping
2017, 26(2):37-42. DOI: 10.15888/j.cnki.csa.005599
Abstract:In the process of driving a motorcycle, drivers have to wear helmets to ensure safety. However, there are some inconveniences and potential safety risks when drivers have a phone call or want to check the time while driving. In order to solve these problems, this paper studies the intelligent helmets which use Bluetooth connection to Android phone. The user can operate mobile phone and helmet to realize relevant functions through speech recognition. It uses 51 single chip microcomputer as the central processor to manipulate and control the Bluetooth module as well as other functional modules. Meanwhile, an APP is designed to enhance the user experience. It provides an easier interoperate between helmet and mobile phone via Bluetooth technology. This APP realizes not only data transmission function, but also instructions recognition and speech synthesis function.
2017, 26(2):43-50. DOI: 10.15888/j.cnki.csa.005600
Abstract:In order to break through the control mode of remote control system of X-ray single crystal diffraction, in which upper computer positive controls lower computer, the enterprise-class RabbitMQ message queue server is used to act as control communication server to build a messaging platform for X-ray single crystal diffraction remote control system. And we have achieved the remote operation and control among various distributed subsystems. The paper mainly introduces the design of the communication system for remote control system and the primary testing shows this communication architecture can realize stable and precise messaging.
2017, 26(2):51-57. DOI: 10.15888/j.cnki.csa.005677
Abstract:With the fast development of national power industry,ultra high voltage power transmission has already been applied in practice. And the following features such as stability and security of power system have become more crucial owing to the complexity of the grid. On the one hand, voltage stability is the major factor accounting for the power system reliability. On the other hand, the online assessment of the voltage stability in real time has always been an obstacle in the concerning research. This paper aims to put forward a QPSO-SVM model which can be applied to the online assessment of the voltage stability in real time, based on the increasing accuracy and efficiency of calculation by means of SVM model as well as the production of parameter via the method of QPSO. In addition, it ensures the absolute assessment and the comprehensive application to all networks adopt the component of tangent vector of power flow power as VSI so as to improve the assessment accuracy of machine learning. Finally, it is approved that by means of WSCC9-bus, the learning time, the assessment time and the accuracy have been increased by 23.2%, 63%, 77.9%, and 26.2%, 56.9%, 72.56% and 28.9%, 42.19%, 82.34%, respectively, compared with GA-SVM, SVM and BPNN. Also, the method based on the IEEE14 experiment is an ideal path for the online assessment of the voltage stability for the power system in real time due to the fact that the key buses can be found before the system collapses and that it shares the same findings with the power flow calculation.
ZHENG Qiu-Mei , SU Zheng , GONG Xue-Song , LIU Zhen , LI Song
2017, 26(2):58-62. DOI: 10.15888/j.cnki.csa.005583
Abstract:Aiming at the problem of the navigation information on Baidu map being not perfect in campus, an Android mobile navigation system is designed and implemented through setting up net database. The overall architecture of the system and the client software structure are introduced firstly. Then this paper discusses emphatically the design of function modules, including client interface, route navigation module, campus building navigation module and indoor scene module. The system has two distinct characteristics, which are embodied in the hierarchical software architecture, and in the combination of Baidu maps and self-build database. With the comparison between our system and Baidu map, the experimental results show that our system is able to navigate the missing common building in the campus of Baidu maps successfully. All in all, our system has the advantages of simple operation, stable operation, high user experience, maintainability and strong practical value.
SUN Xiao-Dong , CHEN Ting , XIANG Wan-Hong , LU Jing , TANG Jing , CHEN Meng-Jie
2017, 26(2):63-67. DOI: 10.15888/j.cnki.csa.005578
Abstract:With the increasingly fierce market competition, the importance of cost control for the enterprise is increasing. Financial reimbursement system is an important window of enterprise cost expenditure, which plays a key role in controlling the cost of enterprises. Traditional financial management software focuses on the business process. The management and control of reimbursement is weak, and all levels of managers in the examination of the expense claims have to approve in vain due to the lack of relevant information. In this paper, the intelligent sanction system of expense claims provides decision support for the approval of the expense claims, improving the efficiency and quality of the sanction and reducing the cost. The basic function and application process of the intelligent sanction system of expense claims are introduced in detail.
2017, 26(2):68-72. DOI: 10.15888/j.cnki.csa.005615
Abstract:A design program of intelligent home voice control system based on GSM is presented on Android mobile phone platform. Via the voice recognition of Android mobile phone, the intelligent home can have a function of being controlled by remote voice through this program, which greatly improves the operability and the security requirements of the intelligent home. Test results prove the features of real-time, effectiveness and stability of the system. Meanwhile, this system can also provide a practical reference solution for human-computer interaction, having a wide range of application.
2017, 26(2):73-77. DOI: 10.15888/j.cnki.csa.005616
Abstract:In order to realize that machine can make a sound, this paper designs and builds the HTK (HMM-Tool-Kit) platform to realize the Chinese speech synthesis system. The parameter synthesis method realizes the synthesis from text to speech, and this paper has a detailed discussion for the implementation technology of the text analysis, prosody control and speech synthesis in synthetic system. Finally, with experiments under the environment built on the Linux, the expected results are obtained, realizing the transformation from the text to speech.
2017, 26(2):78-82. DOI: 10.15888/j.cnki.csa.005618
Abstract:Unified Communications is one of the research hotspots in today's computer applications, and people's requirements of application service in unified communications system applications and services are increasingly higher. In terms of data access, based on the traditional relational database or file system-based storage, traditional way has become increasingly unable to meet the needs of the application. With the development of Hadoop technology and related subsystems, the advantages of distributed storage become obvious. Therefore, on the basis of analyzing respective characteristics and system architectures of HBase and Hive, this article combines with specific projects of Unified Communications and proposes the design method of storage engine based HBase-Hive integrated design, in order to solve the unsatisfied problem of data security, data access efficiency etc. in Unified Communications systems. The contrast experiments show that the design scheme not only improves the efficiency in data query, but also makes fully prepare for the development of subsequent data mining.
YANG Zhong-Ming , QIN Yong , CAI Zhao-Quan
2017, 26(2):83-87. DOI: 10.15888/j.cnki.csa.005620
Abstract:By making full use of the security features of intrusion detection products, this paper designs an intrusion prevention and recovery system architecture based on policy shunt. The system uses the double NIDS system as the front-end detection module, making the double NIDS system completely cover the various protocol layers of intrusion detection by policy shunt and gives full play to the advantages of both NIDS detection system to achieve the high-efficiency intrusion detection. In addition, the system combines with the host logs protection mechanisms and the key recovery mechanisms. Therefore, even in the case of intrusion and data destruction, the system can ensure the security of the critical parts in the system.
TAO Liang , WANG Zhi-Peng , SHEN Bin , ZHANG Dao-Liang
2017, 26(2):88-92. DOI: 10.15888/j.cnki.csa.005623
Abstract:Intelligent air conditioning is a branch of intelligent buildings, and especially in the office buildings, the intelligent level is of great significance to save electric energy. Aiming at the remote monitor and control technology of multi-split air conditioning system, this paper presents two remote monitoring schemes:one is the line control scheme, the other is the group control scheme. Both schemes present respectively the implementation of bottom hardware, software protocol and control flow to support connecting to a remote server, monitoring corresponding multi-split air conditioning indoor machine with client. By the comparison tests, the two schemes can realize the remote control of the multi-split air conditioning, and the performance is reliable and stable.
LIU Han-Bing , ZHANG Ya-Juan , WANG Zhao-Ping
2017, 26(2):93-98. DOI: 10.15888/j.cnki.csa.005688
Abstract:A high power non-vehicular charging system is designed in order to meet the demand of the electric vehicle fast charging. In this system, advanced digital control technology, electronics power switching and controlling technology, PWM control method and the PI algorithm combining parameter and integral separation are applied. And this system also concludes the components of various electric circuits of control, protection and communication to realize the intelligent charging function for electric vehicle. The experimental results indicate that the charging system can output high current and high voltage, so that it can meet the fast charging requirement of electric vehicle and play a key role in the popularity of electric vehicles.
2017, 26(2):99-103. DOI: 10.15888/j.cnki.csa.005627
Abstract:Bank customer identification has a far-reaching significance, which can identify the bank's important customers by using face recognition algorithm in different application scenarios. When the feature information of face is changed or masked, the accuracy of recognition will be greatly reduced. The paper introduces the face layered filtering algorithm to remove non characteristic information (such as beard, glasses, scars, etc.) before doing face recognition, so that the face recognition target has a higher unity. By using MUCI data sets to verify the feasibility of facial layered filterer, we add the face layered filtering algorithm in unified recognition module to improve the recognition efficiency. And the feasibility of the algorithm is verified.
2017, 26(2):104-111. DOI: 10.15888/j.cnki.csa.005611
Abstract:The efficiency of power line patrol is highly improved by Unmanned Aerial Vehicle, and it can be further improved if those collected digital images can be processed with computers. Image enhancement is an important procedure for image process. Two different kinds of gray image enhancement algorithm based on random mathematics model and fuzzy mathematics model respectively are discussed combined with the characteristics of power line gray image, and the performance of these algorithms is compared. The disadvantage of each current image enhancement algorithm in power line gray image is analyzed. Accordingly, we provide an improved image enhancement algorithm based on fuzzy mathematics model and its applicability is tested with examples.
MA Wei-Jun , WANG Qiang , HE Xiao-Hui , ZHANG Shu , ZHANG Qing
2017, 26(2):112-117. DOI: 10.15888/j.cnki.csa.005568
Abstract:In order to solve the storage service unavailable problem on account of the management node fault in huge cloud storage system, an analysis model for fault effect of management node is built and a dynamic self-recovery algorithm for management node based on message called FRA-M is presented. FRA-M implements the cooperation, transparent take-over and self-recovery of management nodes by metadata update control based on load balance. Experiment shows FRA-M can provide management nodes auto switching when fault occurs and achieve good load balance by favorable resource allocation. The performance of FRA-M is also maintained in a relatively stable interval by reasonable control of TCP timeout, fault detection cycle and fault detection timeout. The storage service availability, data usability and data reliability are guaranteed by FRA-M during the breakdown of management nodes.
TAN Long-Bing , GAO Yang , ZHANG Cheng-Ye , HAN Zeng-Fan
2017, 26(2):118-123. DOI: 10.15888/j.cnki.csa.005572
Abstract:SMS (Short Message Service) gateway has characteristics such as high concurrent capacity, high peaks, difficult to predict and high resources consumption. How to improve the system efficiency and stability has always been one of the key issues for the telecom operators to solve. This paper presents elastic SMS cloud gateway design and an elastic control algorithm, which can realize load sensing by dynamic resource control through the cloud computing platform, and improves SMS gateway service quality and the efficiency of resource utilization. Results of test on simulation environment show that, comparing with existing algorithms, the proposed algorithm is more efficient on scaling control, and has less resource utilization jitter on the condition of cluster size change.
BAI Meng-Ru , XU Zhao , ZHENG Hong-Dang
2017, 26(2):124-128. DOI: 10.15888/j.cnki.csa.005524
Abstract:The modified weighted centroid location algorithm applying to outdoor is proposed. The algorithm analyses the measure principle of Received Signal Strength Indication (RSSI), in the case of unknown path decline index, which can convert the distance relation to the received power relations. In addition, the RSSI measure distance is obtained by the Gauss filtering, and the inverse is used as the weighting factor of the modified weighted centroid localization. The weighted centroid algorithm discusses the impact on the precision resulting from the adjustment coefficient. The ideal correction factor of the outdoor environment is obtained through the comparative analysis. The simulation experiments show that the best location accuracy of the improved algorithm is 0.5190m enough to meet the actual location demand when the dynamic adjustment coefficient is 4.
2017, 26(2):129-133. DOI: 10.15888/j.cnki.csa.005569
Abstract:In this paper, a hierarchical clustering routing algorithm (HCRA) is proposed for time-driven data collection methods, in which different types of sensors have different data collection period. In heterogeneous Wireless Sensor Networks, the energy consumption of all kinds of sensor nodes should be balanced. In the choice of cluster head node, the data acquisition cycle between different nodes is adequately considered in the HCRA algorithm. The algorithm uses a hierarchical threshold, and the probability and frequency of nodes with higher acquisition cycle becoming cluster head nodes is increased, so it can prolong the life time of nodes with lower acquisition cycle. Compared with the LEACH and LEACH-MAC algorithm, the simulation shows that, in the multilevel heterogeneous network model, the HCRA algorithm provides longer network survival time, and the stability period of the network is improved.
2017, 26(2):134-138. DOI: 10.15888/j.cnki.csa.005586
Abstract:The fault characteristics of complex equipment are characterized by uncertainty, nonlinearity and so on. For prevention of failure may cause serious consequences, it is necessary to improve the accuracy of fault prediction. As fault prediction has the characteristics of uncertainty, we design a method of fault prediction, which combines fuzzy mathematics closeness degree with particle filter algorithm to predict fault. The new method uses the membership function to describe the normal system with the normal fuzzy sets and the abnormal system with the abnormal fuzzy sets, and uses particle filter algorithm to calculate predictive value and the membership degree. Then we can calculate the closeness degree of predicted value of the normal membership degree with normal and abnormal fuzzy subset to implement a fault prediction. This method predicts whether the three tank system is faulty by the change of water level of the T2 tank in the three tank system and makes test by the fault of the UH-60 planet gear disc when the crack begins to increase, and we have compared with Particle filter fault prediction based on Dynamic Time Warping match, Fault prediction algorithm based on stochastic perturbation particle filter and FDI method based on particle filter. The feasibility of the proposed method is verified by experiments, which can predict the failure of the system in time.
WANG Qing , ZHANG Jin-Yu , SONG Xiao-Li
2017, 26(2):139-144. DOI: 10.15888/j.cnki.csa.005570
Abstract:Based on the characteristics of IP address, this paper proposes an algorithm which can statically measure inter-peer distance. And considering these factors such as coherence of peer contents, the locality of peer, stability and transmission capacity, we propose an algorithm of choosing service node based on the characteristic of data transmission delay of inter-peer. Simulation results show that our algorithm can enhance performance of P2P system and optimize the routing of P2P system.
WANG Dong-Yun , XU Yan-Ping , QU Bo-Yang
2017, 26(2):145-150. DOI: 10.15888/j.cnki.csa.005601
Abstract:Path planning problems are known as one of the most important techniques used in robot navigation. This paper adopts an Improved Artificial Bee Colony (IABC) algorithm and combines with cubic Bezier curve to describe the path, which implements the path optimization. The standard artificial bee colony algorithm has shortcomings of falling into local optima and the convergence speed is slow in the later. To overcome these disadvantages, the proposed algorithm modifies the search methods of employed bees and onlooker bees. Compared with other algorithms, we gain the advantages and disadvantages of the different algorithms in path optimization. The experimental results demonstrate that the IABC algorithm has better search performance in path optimization and is able to get a shorter path.
2017, 26(2):151-157. DOI: 10.15888/j.cnki.csa.005598
Abstract:When it comes to the face recognition, this paper exceptionally focuses on the facial feature extraction based on subspace analysis. Firstly, this paper introduces the constitution of the face recognition system, and then analyses the key technologies, such as the face detection, feature extraction, and image pretreatment processing. It mainly analyses the various face recognition algorithms. According to the high efficiency of wavelet in the processing of image data matrix and the shortcoming of less dimension of the LDA training sample, PCA cannot use higher order statistical properties of the data. Combining these three algorithms, this paper puts forward the improved recognition method. Simulation experiments with MATLAB are carried out and the results show the effectiveness of the method.
2017, 26(2):158-162. DOI: 10.15888/j.cnki.csa.005607
Abstract:In order to improve the efficiency of node energy consumption management and enhance the forwarding efficiency of data during the data delivery process in the delay tolerant network, a delay tolerant network routing algorithm based on energy consumption demand evolution mechanism is proposed after introducing the node energy consumption game model. The data delivery mechanism is designed according to flood routing strategy, and the node can develop the corresponding delivery operation according to its own energy surplus when the data is sent to the network, giving a unit of the reward to the middle node for firstly delivering the data to the destination node. Then a reasonable data delivery operation is selected by node strategy game model to improve the energy consumption of nodes, promoting both of the data delivery energy management efficiency and data transmission efficiency. Simulation results show that this algorithm has higher data delivery ratio and lower transmission delay than the contrast algorithm.
2017, 26(2):163-167. DOI: 10.15888/j.cnki.csa.005681
Abstract:At present, the study on people recognition is still a quite challenging problem, and it is a new subject to combine with multi-pose for person recognition. Therefore, it is a significant step for people recognition to capture multi-pose samples accurately. Poselets can detect all the people and the corresponding position in the image, but it cannot locate the people on a particular location. Therefore, this paper presents a method of pose extraction which based on poselets for the specific location:First, we should set filtering model according to the head calibration form of the human in specific location, and then using the filtering model, we can screen the figure box detected by the poselets algorithm and sort the results of the screening. Then, we can find the target person of the specific location by combining the sorting score with the maximum weight bipartite graph matching algorithm. Finally, it is easy to extract the corresponding pose. Experimental results show that the algorithm mentioned in this paper can detect the person of the specific location effectively and extract the corresponding pose.
2017, 26(2):168-173. DOI: 10.15888/j.cnki.csa.005624
Abstract:Embedded system has become more and more popular in image processing, spatial computing and other fields. In order to achieve a balance in three major aspects of power consumption, cost and computing power, it is an effective solution to improve the computing ability of embedded system, using the multi-core and multi processor system based on parallel computing method. This paper discusses the basic structure of embedded multi processor system based on Cortex, and has a research on parallel image median filtering algorithm on this system. Experimental results show that the parallel algorithm can improve the performance of image median filtering exponentially on the embedded multi processor platform.
YANG Shao-Bing , LI Lei-Min , HUANG Yu-Qing
2017, 26(2):174-178. DOI: 10.15888/j.cnki.csa.005637
Abstract:Graph cut needs user interaction on image segmentation, which comes up with that threshold value method, gets the objects by cutting rectangle and then we remaps to image to finish the interaction by laser radar. GrabCut algorithm is sensitive to local noise, and it is time-consuming. In addition, the edge extraction is not ideal under complex background, so an improved GrabCut algorithm is put forward to adapt background automatically in the determined background. The proposed algorithm chooses probable foreground neighboring pixels as background pixels to make background become simple. It is applicable to the case when foreground pixels account for low proportion in the whole image pixels and the background pixels are relatively simple around the foreground. Experimental results show that error rate of the proposed algorithm is reduced and the efficiency is improved in comparison with GrabCut algorithm after reducing nodes number in the graph. In addition, the edge extraction is more complete and smooth.
2017, 26(2):179-183. DOI: 10.15888/j.cnki.csa.005663
Abstract:In the wireless data communication network, the array element inter-symbol interference cause the non-stationary characteristics of channels and it also has a channel imbalance effect, so a channel equalization design is required to improve the performance of data transmission of wireless network. Traditional methods use Hilbert transform spread-spectrum for communication channel equalization and discrete data analysis. Due to the expansion of multipath channel which causes inter-symbol interference, and in order to improve the performance of channel equalization, a wireless network channel equalization algorithm based on non-stationary time-frequency analysis is proposed. This algorithm proposes a space multipath channel model for wireless network data transmission and uses time-frequency analysis method to suppress the inter-symbol interference of signal communication. It also uses this extracted time-frequency characteristics for orthogonal frequency division multiplexing decomposition of communication channel. Through time-frequency characteristic analysis, the phase deviation of spatial symbol is reorganized and the path deviator of phase shift is removed to realize channel equalization. Simulation results show that this proposed algorithm has a good performance for channel equalization. It can effectively suppress the inter-symbol interference of communication channel and reduce the bit error rate of the wireless data communication network to improve the quality of the communication.
2017, 26(2):184-188. DOI: 10.15888/j.cnki.csa.005628
Abstract:Screenshots of bank fault often exit in natural scenes. If the text can be accurately detected in the screenshots, it will be able to improve the accuracy of text recognition and improve the case base search and active operation and maintenance capabilities. In order to improve the efficiency of the text detection of natural scenes, an algorithm based on deep learning in natural scene is proposed. Firstly, candidate letters are extracted from the maximum stable extreme region, and candidate texts are generated by single-link hierarchical clustering, then the algorithm makes median filter for the candidate text. Lastly, non-texts are removed by the deep confidence network DBN. Experimental results show that DBN-based approach can effectively improve the accuracy of the text detection of natural scenes, and has better results than traditional methods.
CHEN Yi-Fei , WANG Yu-Fang , ZHAO Li-Ling , CHEN Hui
2017, 26(2):189-194. DOI: 10.15888/j.cnki.csa.005613
Abstract:Aiming at the scenarios that the query issuers and query sender are uncertain moving objects, a new type of queries named DRqTI (Distance-based Range query within a Time Interval) is defined. The DRqTI searches out the target object in the dataset, which satisfies that the distance to the query issuer does not exceed the threshold value in a given time interval. And query results contain the suitability and valid time intervals which satisfy the condition. Three pruning strategies, namely trajectory-based, time-based and distance-based rules are designed. Furthermore, algorithms that integrate the calculation method of refining and matching degree are developed. On this basis, a query processing algorithm is designed. The experimental analysis shows that distance-based method is the best among three methods and the proposed algorithm can deal with DRqTI problem efficiently.
LIAN Meng-Jia , LIU Yin-Zhong , WANG Jun-Lin
2017, 26(2):195-200. DOI: 10.15888/j.cnki.csa.005610
Abstract:In the field of the control system, MP or Multiple operating systems is often used, which will encounter the communication problems of process control operations in heterogeneous platforms, because different platforms handle data format is different. This paper proposes a cross-platform communication model. The model uses the method of intermediate proxy, which separates the underlying communication and the upper application and makes the underlying communication process transparent to the user. Based on the CMS and NML of RCS library, according to the model, the paper presents the corresponding implementation methods. CMS is the underlying communication management system of RCS library, providing the functions of reading and writing messages, encoding/decoding data and cross-platform communication. NML is the encapsulation of CMS, providing a higher level interface to make the upper system communication more convenient and to solve the communication between the heterogeneous platforms better. The CMS/NML are realized by a series of C++ classes.
2017, 26(2):201-206. DOI: 10.15888/j.cnki.csa.005580
Abstract:An adaptive measurement method is proposed based on Android mobile terminals streaming video services QoE, which is adapted to solve the problem of difficulty and inaccuracy in getting quality of experience(QoE) data under the different wireless environments (3G, WiFi). By measuring and evaluating QoE of online video service in real time, it can be more accurate and practical. Thus, an application that can automatically measure QoE of videos is designed to measure objective quality of service (QoS) parameters and map to the subjective QoE (MOS value) through a utility function. Finally, we improve the theoretical model by studying the correlation between theoretical QoE assessment model (taken from the literature) and actual user feedback. It shows that the results obtained by the improved model measuring, under wireless environment is closer to the actual user feedback, which can better evaluate the QoE.
TIAN Shuang-Zhu , CHEN Yong , YAN Zhi-Wei , LI Xiao-Dong
2017, 26(2):207-211. DOI: 10.15888/j.cnki.csa.005597
Abstract:The Web Information Extraction and Knowledge Presentation System is proposed to extract information from data intensive web pages. It downloads dynamic web pages, based on a knowledge database, changes them to XML documents after preprocessing, finds repeated patterns from them, by using a PAT-array based pattern discovery algorithm, recognizes their data display structure models, automatically based on the repeated patterns and an ontology-based keyword library, and then extracts the data and stores them in the knowledge database with the object-relational mapping technology of XML. Through these steps, web data is extracted automatically, and the knowledge database is also expanded automatically. Experiments on the traffic information auto-extraction and mixed traffic travel schemes auto-creation system showed that the system has high precision and is adaptive to web pages in different domains with different structures.
YAN Xiao-Jing , YU Fang , SUN Yong , XIAO Ka-Fei , WANG Song
2017, 26(2):212-216. DOI: 10.15888/j.cnki.csa.005589
Abstract:The security monitoring data of Dangerous chemicals business has great social value, especially real-time accurate prediction of the security risk has become a hot warning research. From the view of four dimensions which are people, equipment, the environment and management, this article analyzes the relevant indicators of safety hazards warning, constructs the bottom-up decision tree based on multi-classification SVM warning model, constructs a bottom-up decision tree SVM multi-classification model based on early warning, to achieve the security level of accurate classification and for future production safety status warning. By comparison with more top-down classification model, it confirms that early warning model used in this paper has better performance in real-time and accuracy, and meets the basic requirements of early warning models.
2017, 26(2):217-221. DOI: 10.15888/j.cnki.csa.005638
Abstract:With the rapid development of internet technology and the popularity of mobile devices, the application system needs to adapt to the changing mobile terminal devices, and needs to be user centric and improve the system friendly. Therefore, this paper studies the development of the frontend and backend decoupling model. Using the data format of JSON, the frontend developments should independently improve user experience and adapt the layout of diffident mobile terminal devices.
NIAN Mei , REN Hao-Zhe , LIU Ruo-Lan
2017, 26(2):222-226. DOI: 10.15888/j.cnki.csa.005571
Abstract:With the domestic IPV6 network construction, the demand for technical staff of IPV6 configuration and management is growing. This paper mainly discusses the design of IPv6 address auto configuration experiment based on the software of WMware Workstation and Wireshark, etc. In this IPV6 experiment, we combine engineering configurations with protocols theoretical analyses. The experiment is designed to improve the students' understanding for the IPv6 address auto-configuration protocols and multicast addresses represent and usage, and it also enhances students' project practice ability of configuring and managing the host machine and router of IPV6. In this study, no special hardware and software investment is needed. This experiment isn't limited by the condition and the time, and can achieve the combination of internal and external classroom. The design ideas of this paper offer a useful reference for the construction of IPV6 experimental system.
2017, 26(2):227-230. DOI: 10.15888/j.cnki.csa.005564
Abstract:Task assignment strategy has a great impact on the performance of the workflow management system. In order to reduce the execution time of task, improve the operation efficiency of process and promote the customer satisfaction, this paper proposes a workflow task allocation method based on the location service, which is based on the basis of predecessors' research results. This method can solve the task assignment problem of workflow and ensure the task be finished with high quality as soon as possible.
QIU Yun , JI Zhen-Shan , ZHANG Zu-Chao , WANG Yong , XU Zhang-Hou
2017, 26(2):231-234. DOI: 10.15888/j.cnki.csa.005577
Abstract:In this paper, we put forward the communication implementation of the upper computer with the software of Labview and lower computer PLC-300 based on OPC UA technology. The communication is data exchanging between two PC machines. One PC acts as a client, the other one acts as a server, and the server is connected to the PLC-300. The client connects to the server through UA, and then it can realize the communication between Labview and PLC on the client machine. This paper introduces how to create UA Client which can be safely connected with UA Server, and how to finally realize the secure communication between PLC and Labview. In Labview, the data can be displayed in real time when it changes in PLC, and the collected data can be save in the form of text files for follow-up observation and playback. The feasibility of this method is verified by experiments. The system has the advantages of short development period, strong flexibility and system stability. Finally, we fully validate the feasibility of using this method to data communications.
2017, 26(2):235-239. DOI: 10.15888/j.cnki.csa.005587
Abstract:With the lithium-ion batteries widely research and application in the aerospace, military construction, industrial manufacturing, electric vehicles and energy storage equipment areas, its remaining useful life prediction is of great significant. Through analyzing the principle of the lithium ion degradation process data and eliminating lithium-ion battery relaxation effect, this paper establishes Wiener process degradation model with random effects. Knowing its degradation threshold, lithium ion battery life distribution is deduced, and on this basis, we can predict a single lithium-ion battery remaining useful life. Finally using the battery data of NASA PCoE database to verify, the results show that compared with the traditional equipment storage-work joint degradation model, which is mentioned in the references, Wiener process degradation model has higher precision of prediction.
GUAN Ning , ZHAO Yang , WANG Jun-Lin
2017, 26(2):240-244. DOI: 10.15888/j.cnki.csa.005590
Abstract:The report designer of facing service is based on web and meets the system requirements through providing service. Act as coarse-grained services, this report designer is composed of a plurality of fine-grained sub service, providing a templates-designed service for different business system by converting interface. It reduces development difficulty by dragging component to use. And it is convenient for using and maintain. The report designer uses XML to save and access the template files, and it is quick to change the format of template files through changing the mapping rules to provide convenience for exporting. The new designer solves the problem of inflexibility and non-reusability of the traditional designer which is based on Object-Oriented or Integration-Oriented or Component-Oriented. And the new designer also has the feature of accessibility, interactivity and expansibility.
ZHANG Xin , LIU Zhao-Yuan , WANG Zhao
2017, 26(2):245-248. DOI: 10.15888/j.cnki.csa.005595
Abstract:Embedded systems pushes the video stream to the cloud and pulls it from the cloud in 4G environments. Especially in remote update and debugging, there is so much interference that the system is not working properly. Therefore, we propose a kind of technology based on watchdog (commonly known as "watchdog"). This paper mainly analyzes how to make the system work more reliably in the process of using the state machine, the multiple threads and the remote update and so on, and this scheme applies to OMAP (TI's open multimedia development board) to make experiments. Test results show that it is effective to enhance the reliability of the 4G network video.
CHEN Peng , QU Ke , HU Xiao-Feng
2017, 26(2):249-253. DOI: 10.15888/j.cnki.csa.005609
Abstract:This paper builds a framework about the crime data mining of on intelligence analysis and decision command based on the principle of prevention and control in public security. First, we can get the standardized crime information according to the preprocessing of crime database and space encoding. Using the related methods used in cluster analysis, classification and association analysis, we can get such information as the spatial-temporal risk distribution of crime, targeted people features and modus-operandi. Finally, by mining the data of actual theft cases in Beijing, it is proved that data mining methods could play significant role in crime intelligence analysis.
CHANG Ming-Xiao , ZHAO A-Qun , LV Lu-Ming
2017, 26(2):254-259. DOI: 10.15888/j.cnki.csa.005603
Abstract:In this paper, to study the static and dynamic structure features of Beijing metro network, complex network theory is used for the first time. Based on the structure of Beijing metro network in 2015, metro network sample is built. The paper analyzes the static structure features of metro network by computing characteristics like degree and degree distribution, betweenness centrality, average path length and so on. And, for the first time, section flows of Beijing metro is combined in static network topology. And it also analyzes the dynamic features of the network by computing characteristics like node strength and its distribution, weighted node betweenness centrality and node strength correlation and so on. Thus, the paper explains the interaction between the various factors and the impact of Beijing rail network structure, providing some guidance suggestions for the construction and operation of the rail transit in the future.
ZHAN Yin , ZHOU Yuan-Ping , ZHANG Jian
2017, 26(2):260-265. DOI: 10.15888/j.cnki.csa.005608
Abstract:In the current communications technology, MIMO has a significant technological advantage. MIMO communication system applies multiple transmit antennas and multiple receive antennas. And it makes full use of space resources to improve the quality of communication and to enhance channel capacity under the condition of no increasing spectrum resource and the power of the transmission. However, the offset of the time and frequency will influence the performance of communication system largely. The Zynq-7000 is a new generation of programmable system on chip, which includes the core of ARM processor and integrated FPGA to provide a well software radio development environment. This paper presents a MIMO communication system on the Zynq-7000 platform with an algorithm of time and frequency synchronization and the processing of the implementation. The system tests demonstrate that the algorithm promotes the performance of the communication system.
LIU Lin-Hui , CHEN You-Xing , WANG Zhao-Ba
2017, 26(2):266-270. DOI: 10.15888/j.cnki.csa.005631
Abstract:This paper makes defect location maps for cylinder component ultrasonic testing by using Contour Method and finds that the generation of error of Contour Method for porosity defects reconstruction in cylindrical member is affected by the positioning angle. The experimental results are verified with flaw echo signal which is simulated by finite element software of PZFlex. The influence of the defect location, size and signal attenuation for the positioning angle is analyzed, which lays a foundation for further defect boundary reconstruction.
2017, 26(2):271-275. DOI: 10.15888/j.cnki.csa.005778
Abstract:Office reporting technology is one of the important contents when we develop enterprise information system based on B/S. But in B/S system the application can't get good development due to the restrains of Office's platform and environment. This paper puts forward a method to create a model based on reporting technology in view of AJAX and this model inherits a variety of advantages of traditional reporting technologies. And through its feature of asynchronous communication, this technology realizes the asynchronous visualization reporting generation process, which greatly improves the user's experience. At the same time, this model uses AJAX technology to solve the data access security problems which exist in traditional office reporting technology based on ActiveX. The asynchronous-report-drawing technology provides a new model to achieve the report programming based on Web.
LIU Yu-Mei , DONG Chao , WANF Jian-Yong , MENG Qing-Qing , CHEN Shu-Lan
2017, 26(2):276-279. DOI: 10.15888/j.cnki.csa.005614
Abstract:A multi-form streaming media server system is proposed to overcome problems of traditional media server in Video Surveillance Networking System. This system has high expandability and stability by dividing traditional media server architecture into several modules according to its function. It can also realize the load balance and dynamic expansion. Based on this architecture, control protocol is designed, which includes Session Initial Protocol and private protocol. The experimental results show that this method of control can strengthen the reliability and manageability of the system.