JOURNAL OF LIGHT INDUSTRY

CN 41-1437/TS  ISSN 2096-1553

2012 Vol. 27, No. 6

Display Method:          |     

A short text KNN classification algorithm based on semantic
ZHANG Su-zhi, LIU Jing-jiao
2012, 27(6) :1-4. doi: 10.3969/j.issn.2095-476X.2012.06.001
Abstract:
Aiming at the problems of key words sparse features,sample quantity of the short text classification and differcult dealing with,a method based on semantic KNN short text classification algorithm was presented.The algorithm extracts short text feature words based on the word segmentation strategy, combining CNKI to key for concept mapping to improve the short text semantic expression,KNN classification algorithm was improved according to the characteristics of short text through application of LSA dimensionality reduction. The experiment results showed that the algorithm can effectively improve the short text classification performance.
Study on the cooperation model of the multi-Agent based on dialogue
DENG Lu-juan, CHEN Pei, PAN Kai-jie
2012, 27(6) :5-8. doi: 10.3969/j.issn.2095-476X.2012.06.002
Abstract:
Aiming at the blindness and randomness of the traditional cooperation in design process,a dialogue-based multi-Agent cooperation model was proposed.The task was simplified by the task tree form of "and/or" structure.Communication efficiency has been raised through dividing the communications area and establishing Agent server.Agent dialogue interaction semantics were defined according to the dialogue model and used in multi-Agent cooperation process.The simulation results showed that the model which is Agent cooperation design provides a flexible and effective means of interaction,and the efficiency of the system can be significantly improved.
Application of DBSCAN algorithm based on adjustable threshold in the emergency plan classification management
JIN Bao-hua, LIN Qing, ZHAO Jia-ming
2012, 27(6) :9-13. doi: 10.3969/j.issn.2095-476X.2012.06.003
Abstract:
Aiming at large plan texts resource classification problems, adjustable threshold Eps replaced the original global threshold Eps.An improved DBSCAN clustering algorithm based on density was put forward.The similarity between plan texts was taken as measurement attribute. Improved DBSCAN was applied in the field of plan classification to remove the boundary identification error. The simulation results showed that this method not only does not affect the result in basis classification way, but also have certain reference significance to improve accuracy and reusability of classification.
Application of AOP technology in data exchange and sharing system
QIAN Shen-yi, FU Zhong-ju, LIN Qing
2012, 27(6) :14-16. doi: 10.3969/j.issn.2095-476X.2012.06.004
Abstract:
Aming at the probelm of code redundancy in data exchange and data sharing system,AOP technology was introduced in general service of system by code woven operation,the application of AOP frame was realized in data exchange and data sharing system.The experiment results showed that AOP technology can effectively reduce the burden and improve security of system.
Design and implementation of a personnel positioning and monitoring system based on the Android platform
LIU Yu-wei, LIU Ai-lian, XIE Tao, SONG Yao-lian
2012, 27(6) :17-20. doi: 10.3969/j.issn.2095-476X.2012.06.005
Abstract:
Because of the disadvantage of the traditional positioning and monitoring system with high cost and inconvenience,using the C/S structure,combined with Oracle database and Google Maps,a convenient and real-time personnel positioning and monitoring system was designed and implemented in the Android platform.The test results showed that under the premise of leagl,the system completes some functions on the Android mobile phones:monitoring multiplayer real-time and accurately,track record and distance calculation.
Study on vehicle flowrate prediction model of crossroads based on Markov process
JIANG Ya-ping, GUO Jun-liang
2012, 27(6) :21-23,31. doi: 10.3969/j.issn.2095-476X.2012.06.006
Abstract:
In order to predict the flow of vehicles of the each phase in the crossroads traffic controlling system,which can reasonable distribute the time of the each phase in one signal period,the vehicle flowrate prediction model of crossroads was built,this model uses the Markov analysis method and define the each phase as the current state,after the fragment of the time, as long as the system master the possibility of the transform the phase to another phase, the system can work out the corresponding control strategy.Experimental results showed that the errors between prediction of the flow of vehicles and the actual flow were small,and the method was feasible in the short-term traffic prediction.
Study on dynamic distribution algorithm in parking
DOU Ya-xing, ZHANG Ming-ming, ZHANG Jie, FAN Xiao-yan
2012, 27(6) :24-27. doi: 10.3969/j.issn.2095-476X.2012.06.007
Abstract:
Large-scale parking lot owns numerous spaces, how to distribute parking spaces and make users get suitable parking spaces is problem which should be resolved instantly.So a parking spaces information acquisition and release system was designed based on dynamic distribution algorithm.The research distribution strategy of the spaces in parking lot was to establish the correspondence of data table and parking spaces and it makes a balance point for the free spaces uniform distribution and the path weight.The simu-lation results verified that the algorithm is reasonable.
Study on load balancing algorithm based on integrated load and dynamic group
LI Yong-ming, LI Dong
2012, 27(6) :28-31. doi: 10.3969/j.issn.2095-476X.2012.06.008
Abstract:
In order to resolve the problems that server cluster load is variable and dynamic algorithms spends too much system overhead,a load balancing algorithm based on integrated load and dynamic group was presented. This algorithm considers problem of server isomerism and different requirement categories in computer cluster and is equipped with comprehensive load threshold and the minimum interval of compulsory reload.The experimental results showed that the overhead of the algorithm is smaller and its load-balancing effect is remarkable.
A new Web application program test method based on Webpage classification
LIU Xiao-yuan
2012, 27(6) :32-34. doi: 10.3969/j.issn.2095-476X.2012.06.009
Abstract:
Based on the model test technology,a testig method for Web application program was put forward according to Website feature through Webpage classification:the static Webpage with black-box testing methods,database Webpage with white-box testing methods,dynamic Webpage with gray-box testing methods.The experiments verified the effectiveness of this method.
Study on the joint detection algorithm based on energy block and kurtosis characteristic
DU Hai-ming, SUN Ming-quan
2012, 27(6) :35-40. doi: 10.3969/j.issn.2095-476X.2012.06.010
Abstract:
A joint detection algorithm was presented based on characteristic detection of normalized kurtosis and energy block detection to improve the detection probability.When signal and noise are Gaussian distribution,the related calculation formula was applied for the energy block detection.Normalized kurtosis variation was analyzed based on mathematic theory when the number of signals changes from small to maximum in the data block.The simulation results showed that the detection probability and detection performace were improved by using the joint detection algorithm,so it will be useful in the detection of data block.
An improved dynamic frame slotted ALOHA algorithm
CHEN Yan, LI Na-na, ZHANG Na
2012, 27(6) :41-43. doi: 10.3969/j.issn.2095-476X.2012.06.011
Abstract:
Aiming at the problem that the dynamic frame slotted ALOHA algorithm required more timeslots,an improved dynamic frame slotted ALOHA algorithm was proposed through analyzing the relation between the number of electronic tag and probability of collision,which determine the length of frame don't need estimate the number of tags,only need a frame timeslot conflict probability.Simulation results showed that the improved algorithm has less timeslot and computation.
Design of sintering machine monitoring system based on the ZigBee
LI Wei-jia, LIANG Wan-yong
2012, 27(6) :44-47. doi: 10.3969/j.issn.2095-476X.2012.06.012
Abstract:
Aiming at the problem of wireless monitoring and management for sintering machines,the wireless communication module JN5148 was used to develop a sintering machine monitoring system based on ZigBee technology.The system builds the wireless communication among the PC and many sets of sintering machines which using PID control algorithm based on relay setting and ZigBee wireless network.The running results showed that the methods is convenient, and its reliability is high,and tempreature control error is less than 0.3℃, and pressure control error is less than 0.1 kN.
Design of clinical call voice gateway based on SIP protocol
CHEN Xiao-lei, LIANG Po, DENG Lei
2012, 27(6) :48-50. doi: 10.3969/j.issn.2095-476X.2012.06.013
Abstract:
Based on the ARM9 CPU Mini2440 and using the SIP protocol,a small voice gateway which is controlled the clinical call signaling was presented. The analog signal was processed with sampling,digitization,compression coding,packaging and grouping,distribution route,storage and exchange,unzip etc,the voice communication was realized in the IP network.The conversion from complex protocol to SIP standard protocol was realized in the gateway,the signal can be transmitted in the whole building.The test results showed that the communication voice quality is good and there is no speech delay.
Design of handheld terminal CoreProcess system based on Android
HAN Bing, YAN Hong-yan
2012, 27(6) :51-54. doi: 10.3969/j.issn.2095-476X.2012.06.014
Abstract:
To realize the functions of sound/video transmission,playing,recording etc.on the handheld terminal system,the handheld CoreProcess terminal system was designed,which is divided into two parts:embedded client and Windows server.Besides V4L2 video driver,ALSA audio driver,it adopts Android system with the Samsung S5PC110 as the core chip.The test results showed that it can work stably,the problems of losing package,the instability of controlling code stream project and so on are solved in the process of net transmission.
Design and implementation of debt information speech automatic calling and self-help querying system
YAO Ni, ZHANG Lin-lin, ZHU Fu-bao
2012, 27(6) :55-58. doi: 10.3969/j.issn.2095-476X.2012.06.015
Abstract:
Aiming at the information management problem of the college students' debt of tuition with time-consuming and bad performing,a speech automatic calling and self-help querying system was designed.The underlying hardware of the system uses the SHT-4B/USB voice card,the database server uses the SQL Server,and the development environment uses the VS2010, and the development language use the C#.The experiment results showed that the proposed system has good flexibility and expansibility to meet the needs of the management of the arrears in tuition.
Design and implementation of embedded handheld terminal based on SIP
DENG Lei, CHEN Xiao-lei, LIANG Po
2012, 27(6) :59-61. doi: 10.3969/j.issn.2095-476X.2012.06.016
Abstract:
Combining embedded technology with SIP technology,using the modularizing design thought,the design of embedded handheld terminal based on S3C2440 was realized.The simulation results showed that the design realized transplantation of SIP protocol stack in the Linux system,the handheld terminal operated well,conformed to the SIP call process and meet the design demand.
Study on the ranging measurement accuracy of pulse laser responder
WEI Long-chao, HE Zi-jie, CHEN Jing, ZHANG Wen-ping, FAN Jie-ping
2012, 27(6) :62-64. doi: 10.3969/j.issn.2095-476X.2012.06.017
Abstract:
Aiming at the problem of the translate time delay's jitter with pulse laser ranging,further the jitter affects the accuracy of the ranging.The minimal time's delay pulse laser responder were designed adopting some techniques such as the diode laser,automatic temperature control,automatic power control and the detection method of the high-accuracy pulse time.The results of light experiment indicated the pulse of jitter less then 1 ns,the accuracy of ranging was effectively improved.
Research and implementation of the parallel CRC in USB 3.0 device
TENG Li-wei, LI Xiao-hua
2012, 27(6) :65-68,72. doi: 10.3969/j.issn.2095-476X.2012.06.018
Abstract:
Aiming at the problem that the serial CRC check algorithm is not suitable for high-speed transmission and not easy to hardware realization,a parallel CRC algorithm was deduced base on the characteristics of the CRC in the USB device,and was implemented with Verilog hardware programming language.The simulation results showed that parallel CRC algorithm has a higher data throughput rate and can reduce the clock frequency.It's easier to implement in hardware.
Constructing CFD terrain mesh based on contours image by applying BP neural network
GAN Yong, LIU Xin-xin, ZHENG Yuan-pan
2012, 27(6) :69-72. doi: 10.3969/j.issn.2095-476X.2012.06.019
Abstract:
Aiming at the problem of huge calculation and poor accuracy when generating the CFD terrain mesh,a method for generating CFD terrain mesh based on the BP neural network was put forward,which put 2D vector matrix as the training sample,generating the BP neural network model.The matrix combines with the methods of scanning digitizing and linear elements extraction.And the model was structured, trained, simulated by Matlab.Based on the method, DEM elevation grid matrix was established by fitting the elevation that is not in contours.And then the 3D terrain mesh is generated in the software Gambit based on the data from the matrix.The example validation showed that applying the method can generate high accuracy and efficient CFD terrain mesh, it is suitable for the CFD simulation applications.
A method for grids formation based on point cloud data complex terrain CFD
LIU Xin-xin, GAN Yong, ZHENG Yuan-pan
2012, 27(6) :73-77. doi: 10.3969/j.issn.2095-476X.2012.06.020
Abstract:
Aiming at the problem that terrain data accuracy is not high in CFD grid generation, a grid generation method based on point cloud data complex terrain CFD was put forward.This method generates the local coordinates of the point cloud file through the introduction of a seven-parameter solution method,and by the point-line-face-volume method for mesh generation, further polyhedral mesh conversion,the terrain mesh is optimized.The example validation showed that the application of method can generate high accuracy data and consistent with the actual terrain mesh,is suitable for the later stage of the fine CFD simulation applications.
An image enhancement approach for long-range surveillance based on infrared
XIA Yong-quan, DONG Xiang-ying, WANG Hui-min
2012, 27(6) :78-81. doi: 10.3969/j.issn.2095-476X.2012.06.021
Abstract:
The infrared images that are captured at long range usually have low contrast, low brightness, and small hot objects of interest.A novel adaptive histogram-based equalization was put forward to enhance the contrast of infrared images in order to overcome the defects of infrared image itself. It can automatically generate a hybrid cumulative histogram based on two different pieces of information about the image histogram.The proposed adaptive equalization approach can automatically realize image equalization.Experimental results demonstrated that the approach proposed in this paper can improve the contrast of infrared images,and the effect is more obvious to the small objects embedded in infrared images.
Player number localization and recognition in sports video
XU Xiao-yu, HUANG Huan, YANG Xiao-na, HE Guan-xiong
2012, 27(6) :82-85. doi: 10.3969/j.issn.2095-476X.2012.06.022
Abstract:
A method for player number localization and recognition was proposed.It can achieve the recognition of player identity.This method extracts the number region on the jersey by image segmentation and locates the number using internal contours detection.Finally,it can recognize the extracted number based on the probability statistics Bayesian classifier.The experiment verified that this method is practical and effective.
Design of detection system for BIOS Bootkit in Windows
WANG Wen-bing, FAN Nai-mei, LIU Sheng-li
2012, 27(6) :86-89. doi: 10.3969/j.issn.2095-476X.2012.06.023
Abstract:
In order to quickly detect and accurately locate a new deeply concealed Trojan Horse Bootkit,the design of exclusive detecting system to BIOS Bootkit-IBBDS was put forward:IBBDS deposited in the bootable disk,to get the system implementation authority as soon as possible,the BIOS Bootkit capture was realized in the system start-up through the detection for IVT,ISA and HOOK INT 13H module.The validity of this detection method was verified with experiment.
The simulation research of improved 802.11b wireless network transmission performance anomaly based on NS2
LIU Shu-ru, FENG Yuan, CAI Zeng-yu
2012, 27(6) :90-92. doi: 10.3969/j.issn.2095-476X.2012.06.024
Abstract:
Aiming at the data transmission performance anomaly in multi-rate wireless local networks 802.11b, a new method was proposed which adjusts the size of data frame and contontion window according to the different data transmission rates to improve the performance anomaly in multi-rate wireless local networks, the simulation results showed that this method can effectively improve the performance anomaly in the 802.11b wireless network.
Study on routing optimization for wireless sensor networks based on annealing genetic algorithm
LIANG Heng, LIU Xin-xin, ZHENG Yuan-pan, XU Er-feng
2012, 27(6) :93-96. doi: 10.3969/j.issn.2095-476X.2012.06.025
Abstract:
Aiming at the problem of wireless sensor networks limited nodes energy and unstable network topology structure, a method of searching wireless sensor network optimal path was put forward based on annealing genetic algorithm, which adopts variable-length encoding mode,considers the inter-node communication consumption, communication distance and the shortest path and other factors, and selects the appropriate annealing genetic operators,through the optimal selection of stocks, the calculation of the fitness function,a reasonable cross-effective variation and cooling annealing operation, to achieve the objectives of the optimal path of the wireless sensor network.Simulation results showed that the algorithm can effectively balance node energy consumption,prolong the network survival cycle.
Study on call admission control model of ring wireless networks
LIU Zu-jiang, LIU Yun
2012, 27(6) :97-100. doi: 10.3969/j.issn.2095-476X.2012.06.026
Abstract:
In the orthogonal frequency division multiplexing wireless network (OFDM),when the user close to the edge of the base station coverage area,if you want to switch the call,the traditional queuing models switching have a higher failure rate.A new call admission control model based on the ring was established in a coverage area with cover of the base station,cellular will set in concentric circles,though the amount of resources required to establish the cell balance equation of the mobile users,to reduce switch failure rate.The simulation results showed that the model reduces switch failure rate in the protection channel,and improves resource utilization.
Study on low-rate wireless sensor network LR-MAC mechanism
WANG Ming-chao
2012, 27(6) :101-104. doi: 10.3969/j.issn.2095-476X.2012.06.027
Abstract:
Aiming at the problem that the increasing of the node in the wireless sensor networks may cause the lower saturation throughput and the higher packet collision.A novel channel access control mechanism for WSN, i.e.Lowe-rate MAC (LR-MAC) was proposed that the site firstly backoff for a moment after the site successfully send the data.The simulation results demonstrated that when the network size varies,LR-MAC performs much better than the L-MAC does.
Study on non-standard VPN security technology in the industrial network
ZHU Peng, ZHANG Zhi-bin, HUANG Yu-ze
2012, 27(6) :105-108. doi: 10.3969/j.issn.2095-476X.2012.06.028
Abstract:
Aiming at the problem that the traditional SCADA (supervision control and data acquisition) is operated independently with less configuration safety management in current industrial control field,a secure channel was constructed the communication between industrial network using N2N (a layer two peer-to-peer VPN), in which the joining node will be authenticated with digital certificates, and node communication between joint be realized with IKEv2 protocol. As a result, the security of N2N in industrial network communication will be improved efficiently and greatly through dynamic selective encryption algorithm and communication key.
Journal Information

Founded in 1986, bimonthly

Administered by:The Education Department Henan Province

Sponsored by:Zhengzhou University of Light Industry

Editor-in-chief:Wei Shizhong

Executive Editor-in-Chief:Zou Lin

Subeditor:Qu Shuanghong

Edited & published by:Editorial Department of Journal of Light Industry

CN 41-1437/TS

ISSN 2096-1553

Address:136 Science Avenue, Zhengzhou City, Henan Province, China

Postal Code:450001

Tel:(086)0371-86608635
(086)0371-86608633

Email:qgxb@zzuli.edu.cn
qgxb1986@163.com

Download Center
More+