JOURNAL OF LIGHT INDUSTRY

CN 41-1437/TS  ISSN 2096-1553

2012 Vol. 27, No. 3

Display Method:          |     

Ant-Chord model building and simulation based on OPNET
ZHANG Jian-wei, WANG Ling-yan, LIU Si, LI Zhao-yang
2012, 27(3) :1-4. doi: 10.3969/j.issn.1004-1478.2012.03.001
Abstract:
On the design of the core model of the multi-service and credibility network project,aiming at the inadequacy of Chord model physical topology matching ability,Ant-Chord model was proposed which uses the ant colony algorithm distribution network node ID.The model was simulated based on OPNET from process,node and network layer.The simulation results showed that the Ant-Chord had obvious advantages on routing hops and time delay performance,and it had higher network transmission rate and the inquired efficiency.
Secure definition and secure capacity model of streaming-media information hiding
TIAN Hui, LU Jing, CHEN Yong-hong
2012, 27(3) :5-10. doi: 10.3969/j.issn.1004-1478.2012.03.002
Abstract:
Aiming at the problem that the streaming-media information hiding has no universal theory model until now,the formal definition of perceptive transparency and statistical security were given based on elaborating secure principle of streaming-media information hiding using information theory and optimization techniques from the carrier of streaming-media characteristic.The relativity of hiding capacity and secure capacity were investigated,a secure capacity model of multi-hiding information channel based on streamingmedia was proposed,the covert multi-channel of streaming-media can be employed in parallel to achieve a nice hiding performance.
Study on network intrusion detection based on Web data streams technology
XU Ying-mei
2012, 27(3) :11-14. doi: 10.3969/j.issn.1004-1478.2012.03.003
Abstract:
Aiming at the problem that intrusion detection model constructed by mining technique with multiscanning to databases has not met the needs of high-speed and unlimited for Web data streams.Based on the characteristic of multi-dimension frequent patterns,a new intrusion detection model and data structure called SW.Tree was proposed,and a new algorithm AFP mining frequent patterns from data streams based on sliding window tree was designed.The different flow experiments data showed that the model had high alarm rate and low false alarm rate.
Research of OSPF routing protocol based on the virtual machine
CUI Jian-tao, WANG Wen-bing, DENG Lu-juan
2012, 27(3) :15-19. doi: 10.3969/j.issn.1004-1478.2012.03.004
Abstract:
In order to solve the interconnection problems of a company network,meet the requirements of the stability,reliability,adaptability and flexibility network,a simulation of the company network based on the virtual machine platform was made.It achieved success in solving some problems such as the interconnection of the network,the election intervention of designated router/a backup designated router,the generation intervention of the best path,the improvement of open shortest path first (OSPF) network safety through the measures such as starting routing and remote access service and configuring OSPF routing protocol,modifying interface priority and RouterID,modifying interface cost,setting OSPF interface password,configuring the inbound and outbound filters.
Design and implementation of emergency WebGIS architecture based on Flex
ZHU Fu-bao, GUO Qian-qian, YANG Jin-mei
2012, 27(3) :20-23. doi: 10.3969/j.issn.1004-1478.2012.03.005
Abstract:
Aiming at the problem of traditional Web geographic information system (WebGIS) with slow response,poor interactivity and poor scalability etc,a Flex-based emergency WebGIS system architecture was put forward.The architecture uses Flex and Java language to improve the portability of the system,the server-side uses the AMF protocol to improve the efficiency of the transmission and response,and the architecture uses multi-layer model to make independent of each other between the layers.Practice has proved that the architecture meets the demand such as strong interactivity,fast response and good scalability of WebGIS emergency platform,and greatly improves the efficiency and the user experience effect.
Application of octree in 3D scene modeling and path planning
HUANG Yong-li, SU Shang-en
2012, 27(3) :24-27. doi: 10.3969/j.issn.1004-1478.2012.03.006
Abstract:
The motion characteristics of characters work as a breakthrough point,the different application of octree were designed in animated automatic generative system respectively:octree is used to simplify scene modeling for flying characters which don't need to build scene modeling accurately.It is used to test intersection between models and detect collision in process of path searching for walking and crawling characters which demand high precision of scene modeling.Experiments results showed that the efficiency of scene modeling and path planning were improved and the complexity was simplified with octree.The methods could plan a more reasonable path for all kinds of characters.The results of planning path had more rationality and optimality.
Research on interface optimization for reading and writing large data of massive parallel processing system
WEN Bi-long, ZONG Wen-dong
2012, 27(3) :28-30,48. doi: 10.3969/j.issn.1004-1478.2012.03.007
Abstract:
Aiming at the problems such as disorderly management of data file and low literacy rate in MPS,the system was optimized adopting the way collecting pattern for data flow control,and using the timeout mechanism,database connection pool and memory mapping technology.Test results showed that data managed orderly and file reading and writing speed increased in the optimized system.
Design and implement of main control software in traffic signal control system
ZHI Jun, ZHAO Wen-li, SU Xiao-ke, GAN Yong, ZHANG Su-zhi
2012, 27(3) :31-33. doi: 10.3969/j.issn.1004-1478.2012.03.008
Abstract:
Aiming at the problem of the complexity of single intersection and diversity of traffic signal control method,a main control software in traffic signal control system was designed and implemented,which can be applied to various control mod.The software uses multi-time stage and phrase control approach,which can configure parameters according to the intersection of the actual situation.Practical operation results showed that the main control software could meet the changing demand of traffic and had validity.
Design and implementation of Smart Voice system
XU Jun-fang, TIAN Su-zhen
2012, 27(3) :34-37. doi: 10.3969/j.issn.1004-1478.2012.03.009
Abstract:
Aiming at the problem that the current speech synthesis systems has strong taste of speech machine and poor voice quality,Smart Voice,a kind of Chinese TTS system was designed,and the Smart Voice call implementation was given.The system used a hierarchical,modular program structure,completing the marker analysis,syntax analysis,sustain treatment,tone sandhi processing function.Especially in the sustain processor,waveform concatenation technology innovation was used,creating waveform internal circulation damper module to make a good degree of natural sustain.System operation results showed that Smart Voice sounded natural,and could provide high-speed flexible Chinese speech for the network,games and other computer applications.
The development of Windows CE serial port software based on C#
LI Hua, GU Qiang, YANG Guo-ping
2012, 27(3) :38-40. doi: 10.3969/j.issn.1004-1478.2012.03.010
Abstract:
Aiming at the problem that almost all of the serial communication program based on Windows CE platform were called using C++API and the C#programming was seldom used.The C#language was used to develop serial communications software based on Windows CE.The program mainly uses the VS2008 Serial control,rely on an asynchronous operation to complete reading and writing.The experiments results showed that the program can normally receive the data from computer to complete the serial communication.
Design of book management system based on middleware technology
YAO Ni, LI Hong-chan
2012, 27(3) :41-44. doi: 10.3969/j.issn.1004-1478.2012.03.011
Abstract:
Aiming at the poor maintenance and scalability of the library management system,the application server was added to the system in distributed structure.Application server,remote data module and a local data module were designed.The running results showed that library management system based on middleware technology could reduce the cost of development and maintenance and improve the system scalability.
Application of data mining technology in university library information management system
ZHOU Jian-hua
2012, 27(3) :45-48. doi: 10.3969/j.issn.1004-1478.2012.03.012
Abstract:
Aiming at the problem that readers information extract stays at a realtively simple level in library,the management system lacks deep-seated information processing and data comprehensive analysis.Based on the data mining technology,through data cleaning,data integration and induction algorithm,the data mining and prediction of library information management were carried out.The practice showed that the method could mine and predict the information of the readers borrowing behaviors,demand for books and reading interest information.It could improve the library management strategy.
Application of decision tree mining algorithms based on information entropy in the intelligent electric power marketing
DAI Xiao-ting, CHEN Rong-si, XIAO Bing
2012, 27(3) :49-52. doi: 10.3969/j.issn.1004-1478.2012.03.013
Abstract:
Aiming at the problem that the current electric power marketing management system was lack of effective marketing data for decision support,the decision tree mining algorithm was applied in electric power marketing based on the information entropy,and the power customer classification model was established.Practical application results indicated that the classfication model had better predictive classification ability,and was able to meet the needs of customers'timely and accurate classification in electric power marketing.
A method for multifocus image fusion in NSCT domain based on pixel clarity
SHI Hai-liang, HUANG Hai-yang, LI Gang
2012, 27(3) :53-57. doi: 10.3969/j.issn.1004-1478.2012.03.014
Abstract:
Considering the problem that NSCT-based multiresolution fusion methods may change the reliable information during the process of decomposition and reconstruction,a multifocus image fusion method based on a new pixel clarity measure and NSCT in spatial domain was proposed.According to the characteristics of the human visual system (HVS) of frequency and direction selectivity,and the distribution difference between the image's salient features and the noise in NSCT domain,the conception of local directional contrast and directional vector is introduced in the measurement of pixel clarity.Finally based on pixel clarity of the corresponding pixels of the source images,a selection principle is put forward for fusion.Experimental results demonstrated that the proposed method could not only extract more important visual information from source images,but also effectively avoid the introduction of artificial information.It significantly outperforms the traditional image fusion methods.
Zero watermarking algorithm based on revised histogram invariant moments
HE Bing
2012, 27(3) :58-61,73. doi: 10.3969/j.issn.1004-1478.2012.03.015
Abstract:
A zero watermarking algorithm based on revised histogram invariant moments to resist geometric attacks was proposed in order to reduce the probability of dis-detectes and leak-detecting of zero watermarking.This algorithm calculates histogram invariant moments of original image and uses the histogram to construct zero watermarking system.The histogram invariant moments of test image is corrected by correlation coefficient of two images.The detection of watermarking system is achieved by calculating the revised histogram invariant moments.Simulation experiments demonstrated that watermarking detection was simple,had low dis-detecting rate and false alarm rate.The robust of proposed method is better than that of traditional histogram invariant moments in common signal processing and geometric attacks.
Tilt correction of vehicle license plate image
ZHANG Lai-sheng, CHANG Cheng-guo
2012, 27(3) :62-64,68. doi: 10.3969/j.issn.1004-1478.2012.03.016
Abstract:
Aiming at the problem that current license plate image detection inaccuracy and inclination angle error is big,tilt correction of vehicle license plate approach was proposed based on Radon transformation.License plate was located in vehicle license image;then license plate image was used for edge detection and Radon transformation;according to Radon parameters,horizontal and vertical tilt angle were detected;vehicle license image was corrected using bilinear interpolation.Experiment results showed that this method could verify the correctness of the approach,which could realize the correction of all kinds of tilts.
An optimized protection algorithm of face feature data
YANG Yu-ping, CHEN Yong
2012, 27(3) :65-68. doi: 10.3969/j.issn.1004-1478.2012.03.017
Abstract:
Aiming at the problem that the protection algorithm based on SIFT had low operating efficiency and algorithm structure was huge,an optimization algorithm based on SIFT face feature protection algorithm was presented.This algorithm improved the efficiency of retrieval by optimizing the data storage and the data structure in the feature database of the original algorithm.The experiment was carried out on the optimized algorithm in AR and YALE face databases,the experimental results showed that the optimization algorithm ensured data security of the premise,kept recognition rate of the original algorithm,at the same time,made the recognition system more efficient.
The image copy-move detection algorithm based on Gaussian pyramid decomposition and circular harmonic Fourier moments
DONG Mei-li, ZHANG Hua, ZHOU Ya-nan
2012, 27(3) :69-73. doi: 10.3969/j.issn.1004-1478.2012.03.018
Abstract:
Aiming at the problem that the space and time complexity of digital image copy-move detection algorithm are very high because of the movement of image sub-block sliding window approach,the detection algorithm based on Gaussian pyramid decomposition and circular harmonic Fourier moments was proposed.The algorithm firstly finished the Gaussian pyramid decomposition of the image and extracted the low frequency component of image,then calculated 3-circular harmonic Fourier moments of each image sub-block and completed the dictionary sort to feature vector of each image sub-block,finally further find the image copy-taste area according to various threshold.The experimental results showed that this algorithm had good detection effects for the tampered image added noise or compression again,and less compution.
Vehicle tracking algorithm in road traffic video
GUO Feng, WANG Bing-zheng, CHEN Yan
2012, 27(3) :74-76. doi: 10.3969/j.issn.1004-1478.2012.03.019
Abstract:
Aiming at the problem that the accuracy of present vehicle tracking algorithm was not too high,according to the road traffic video features,an algorithm of vehicle tracking was presented.In predictional region,vehicles were matched and tracked through road movement rule of vehicle according to vehicle centroid and color characteristics.The experimental results showed that the algorithm had good stability and high accuracy,and meeting the real-time requirement.
Research on recognition of car license plate covered with CD
JING Zhi-feng, YAO Li-na, CAO Guang-qiang, CHEN Jin-zhong, YANG Jian
2012, 27(3) :77-79. doi: 10.3969/j.issn.1004-1478.2012.03.020
Abstract:
Aiming at the difficulty in car license plate recognition covered by CD,a new image segmentation method was proposed.The method calculated the ranks of pixels,compared with the set threshold value to determine the beginning and end of the character.Experimental results showed that the proposed recognition system had high recognition rate and accurate rate is above 90%.
Grouping dynamic framed slotted RFID anti-collision algorithm based on the ALOHA
LI Fei-gao, ZHANG Gui-lin
2012, 27(3) :80-82. doi: 10.3969/j.issn.1004-1478.2012.03.021
Abstract:
Aiming at the problem that dynamic frame slotted ALOHA algorithm (DFSA) delay is too big and its hardware requirement is too high when tag number increases.The grouping dynamic framed slotted ALOHA algorithm (GDFSA) was proposed.The algorithm determined the number of the tags'group and identified the tags by grouping through the tags quantity estimation method and according to the optimum frame length.The test results showed that GDFSA algorithm which could effectively solve the problem of the tag collision in radio frequency identification (RFID) system and improved the identification efficiency and channel availability.
An improved weighted trilateration localization algorithm
WU Wen-jian, LIU Jin, LI He-lin, KONG Bing
2012, 27(3) :83-85. doi: 10.3969/j.issn.1004-1478.2012.03.022
Abstract:
Aiming at the problem that trilateration localization method has low localization precision,an improved weighted trilateration localization algorithm was proposed.Based on the theory that the equilateral configuration of refer nodes can lead to the highest localization precision,this algorithm brings the interior angles and slide length information of the triangle surrounded by refer nodes to trilateration localization algorithm as weighted factor to reflect the difference between this triangle and equilateral triangle.Experiment simulation results showed that this improved algorithm increased localization precision.
An improved indoor positioning method based on ultra wideband
HE Xin-xin, LIU Ai-lian, LIU Wei, HU Yue
2012, 27(3) :86-88. doi: 10.3969/j.issn.1004-1478.2012.03.023
Abstract:
Aiming at the situation that four or more receivers of ultra-wideband (UWB) positioning technology are needed to directly receive signals from transmitting terminal.Positioning method for only three receivers with TDOA was proposed using high time resolution of UWB signals and character of big flat reflective surfaces in the environment to estimate the 3D position.This method can position applying of the information of multipath delay and reflector position.The experiment results showed that this method could determine the transmitter's position with better accuracy than the conventional assumed height TDOA method.
Study on flatness pattern recognition based on intelligent optimal radial basis function neural network
XIE Xiang-peng, YANG Lu-shan
2012, 27(3) :89-92. doi: 10.3969/j.issn.1004-1478.2012.03.024
Abstract:
In order to deal with the problem that the usual flatness pattern recognition methods based on neural network have some flaws which restrict their applications,i.e.,lower precision for the obtained networks,lower velocity for both on-line recognition and complex network modeling,a kind of flatness pattern recognition based on intelligent optimal radial basis function (RBF) neural network was proposed.In the process of modeling the neural network based on some training data,an improved particle swarm optimization algorithm was proposed to optimize both the number of network nodes and the value of network parameters.Therefore,the approach has simpler structure and better generalization than before.The simulation experiment results showed that the approach was effective and could increase the precision of flatness control.
Overview on obstacle recognition of power transmission line inspection robot
LIN Guo, LI Wei-chao
2012, 27(3) :93-97. doi: 10.3969/j.issn.1004-1478.2012.03.025
Abstract:
The classification and comparison methods of the obstacle recognition of inspection robot in power transmission line with the domestic and foreign research progress were carried out from the aspects of multi-sensor-based navigation,single-frame image processing,binocular vision and active learning.The development direction of the future to the obstacle recognition technology for power transmission line inspection robot was summarized.The sensor information fusion technology will be used to improve the accuracy of obstacle detection,the intelligent and automated high obstacle recognition algorithm will be studied,obstacle recognition methods that adapt to various environment for power transmission line inspection robot will be designed.
Monte-Carlo simulation on schedule risk in complex construction project using Bayesian networks
LI Meng, ZHANG Yun-bo
2012, 27(3) :98-101. doi: 10.3969/j.issn.1004-1478.2012.03.026
Abstract:
Based on the analysis of the risk characteristics of complex projects,Monte-Carlo simulation on schedule risk using Bayesian networks was introduced and schedule risk model was built.An power project as an example is simulated and analyzed.The results showed that the reverse retrospective study can find affect extent of the risk factors related to complex projects,and targeted control methods can be adopted.
Application of MasterCAM in numerical control machining and programming
JIA Kun-xin
2012, 27(3) :102-104,108. doi: 10.3969/j.issn.1004-1478.2012.03.027
Abstract:
Aiming at the irregularity of the shape of complex curved surface parts and difficulty in model process,combining with design and processing simulation of pump body bottomcover,the three-dimensional models of parts were established using modelling technology and numerical control programming of MasterCAM software.The tool paths of rough machining and finish machining for the parts were generated,and processing simulation of the parts was obtained and the NC program was generated by post processing.It provided reference for NC programming and machining of similar parts.
Design and implementation of alcohol fermentation remote monitoring system based on ARM-Linux
GUO Peng-fei, QI Yue, LI Zhao-yang, ZHANG Jian-wei
2012, 27(3) :105-108. doi: 10.3969/j.issn.1004-1478.2012.03.028
Abstract:
The current alcohol fermentation was supervisory controled mainly by using singlechip and had disadvantages such as backward function,small montioring range and inconvenient information circulation feedback.A remote manitoring system was designed.In this system,the data of pH value and temperature etc were collected and processed based on ARM platform and Linux operation system.The data were also transmitted from alcohol fermentation equipment to host machine using TCP/IP protocol,at the same time it supports remote client to control through the Web,so the remote monitoring was reached for alcohol fermentation equipment.The test results showed that the program broadens the scope of monitoring,and it has a good application prospect.
Journal Information

Founded in 1986, bimonthly

Administered by:The Education Department Henan Province

Sponsored by:Zhengzhou University of Light Industry

Editor-in-chief:Wei Shizhong

Executive Editor-in-Chief:Zou Lin

Subeditor:Qu Shuanghong

Edited & published by:Editorial Department of Journal of Light Industry

CN 41-1437/TS

ISSN 2096-1553

Address:136 Science Avenue, Zhengzhou City, Henan Province, China

Postal Code:450001

Tel:(086)0371-86608635
(086)0371-86608633

Email:qgxb@zzuli.edu.cn
qgxb1986@163.com

Download Center
More+