Home > Highlights of Sciencepaper Online > Current Issue

 
 
 
ISSN 1674-2850
CN 11-9150/N5
 
Current Issue
Previous Issue  |  Next Issue
October 30,2009
Volume 2,Issue 20
Pages 2095-2223
Subject Area:Computing Neural Network,Algorithm Theory,Computer Network,Computer Image Processing,Computer Information Management System,Data Security and Computer Security,Computer Applications,Cybernetics,Control Theory
 
Title: Design of video monitoring system for middle and small coal mines
Authors: XIAO Tao, MA Zhen, FU Jikui, WU Xiang, LIU Zengbao
PP: 2220~2223
Abstract: In order to solve the problem that traditional monitoring network is limited by bandwidth, a monitoring system for middle and small coal mine is designed. Industrial control computer is adopted as main control computer in the distributed monitoring system. The system architecture is analyzed, and each module is analyzed in details. For video monitoring, several video image compression algorithms are analyzed. The software is written by Visual C++, and it can run in the Windows environment. This paper divides monitor management software into a number of functional modules and introduces the main functions and software design of the modules. A new customer login mechanism is proposed, and it is effective to avoid the network congestion problem of traditional monitoring system caused by simultaneous login of too many clients.
Keywords: computer software; digital video; communication; control
 
Title: Transplantation of embedded Linux operating system based on MPC852T
Authors: CAO Yue, MA Yue
PP: 2213~2219
Abstract: The embedded system-transplanting is also known as building of the working environment of the embedded system, which supplies embedded software with developing and working environment, so it is the first task of embedded software development. The tasks of system-transplanting often include installing cross-compiler, transplanting Bootloader programs and operating system as well as making file system. This paper, taking MPC852T as an instance, describes how to transplant the embedded Linux system in detail in order to introduce the common method of building an embedded system.
Keywords: operating system and operating environment; embedded system; system-transplanting; MPC852T; Linux
 
Title: A class of neural networks with recent-history distributed delays and impulses
Authors: ZHANG Juan
PP: 2206~2212
Abstract: First, the Banach's fixed-point theorem is used to establish a criterion for the existence and uniqueness of an equilibrium point of such neural networks. Second, by combining the Lyapunov functional method and some inequality techniques, accompanied with the introduction of a set of parameters, a sufficient condition of the global exponential stability of the unique equilibrium for the above mentioned systems is given. It should be mentioned that this condition is independent of the associated delays, and it is an extension of some previously known results. Finally, this criterion is justified via numerical examples and simulation experiments.
Keywords: artificial intelligence; computer neural networks; impulses; Banach’s fixed point theorem; exponential stability; unique equilibrium point
 
Title: The novel non-linear analysis on inertia weight of particle swarm optimization
Authors: LI Li, XUE Bing, NIU Ben
PP: 2200~2205
Abstract: The inertia weight is the most important parameter in the particle swarm optimization (PSO). It can balance the global search and local search effectively to improve PSO’s convergence. PSO algorithm and the function of the inertia weight are described. Using the characteristic of the tangent function and the arc tangent function for reference, two new strategies are produced. Through the simulation and the contrast of the results, the new strategies have greatly improved the robustness, the convergence rate and the precision of the results.
Keywords: artificial intelligence; particle swarm optimization; inertia weight; tangent function; arc tangent function
 
Title: A problem decomposition-based ant colony optimization for satellite TT&C resource scheduling problem
Authors: ZHANG Na, KE Liangjun, FENG Zuren
PP: 2192~2199
Abstract: A model of weighted independent set is developed for satellite tracking, telemetry and command (TT&C) resource optimization scheduling problem. A novel ACO, called multi-space ant colony optimization (MsACO), is proposed to solve it. The original problem is separated into several mutual-restrained sub-problems, and consequently the search space is divided into several sub-spaces. The ants in the algorithm skip randomly into one sub-problem’s space to build solutions. A corresponding mechanism is introduced to deal with the constraints between them. In addition, this algorithm adopts suitable pheromone trail mode and effective heuristic information. The experiment results demonstrate that MsACO can avoid the local optimum efficiently, generate optimal schedules and improve the utility of the TT&C resources.
Keywords: artificial intelligence; satellite tracking, telemetry and command resources; optimization scheduling; independent set; ant colony optimization
 
Title: Analysis of consumer behavior of searching, browsing and purchasing in online bookstore
Authors: ZHOU Sisi, CAI Dongye, ZENG Jin
PP: 2185~2191
Abstract: This paper carries out a research on online consumers searching, browsing and purchasing behaviors, summarizes the laws of consumer behaviors, sums up the factors affecting these behaviors and their impacts, gives a brief analysis combined with Dangdang book cases, and proposes a model of consumer behavior in online bookstore. The research provides useful information to future study on the characteristics of consumer behavior, and provides some practical help to online retail practice of bussiness to consumer (B2C) companies.
Keywords: computer application; Internet; model; behavior research; consumer
 
Title: Nonlinear filtering algorithm using adaptive neural-fuzzy inference systems
Authors: ZHAO Xueqing, WANG Xuan, BAI Chunli
PP: 2176~2184
Abstract: The major drawback of existing image filtering algorithms for removing salt-and-pepper noise is lack of the ability of preserving the image details and edges which are smaller than the size of filtering windows. A nonlinear filtering algorithm using self-adaptive neural-fuzzy inference systems (ANFIS) is proposed. The proposed filter has a two-stage scheme: detecting noise and removing noise. In order to improve the accuracy of noise detection, noise candidates identified with the noise detection algorithm of the adaptive median filter are judged again by local fuzzy membership function, and the structures and parameters of nonlinear system are identified and learned by ANFIS. This network uses hybrid learning algorithm to identify former parameters and conclusion parameters. The algorithm improves the precision as well as quickens the training speed. The proposed filtering algorithm takes advantages of local characteristics of images, and achieves a better performance than the other filtering algorithms in noise suppression and detail preservation.
Keywords: computer application; double noise detector; nonlinear filtering; adaptive neural-fuzzy inference systems; salt-and-pepper noise
 
Title: Design and implement of management information system for mesh stores resource
Authors: YANG Qinzhi, CONG Xiaonan, GAO Haoliang, WANG Yuanfei
PP: 2168~2175
Abstract: For the present situation and existing problems of modern enterprise management, manual management mode cannot meet the needs of current management, and it will become the bottleneck of future management. Facing the shock of the wave of information technology in 21st century, enterprise informationization is the only way of the traditional enterprises’ transition to modern enterprises, and will help standardize management process, improve management efficiency, and succeed in the fierce market competition. Based on the above, a management information system for mesh stores resource has been developed. The accomplishment of the total asset management, the intelligent rental management, the predictable status of the mesh stores and the visualized patterns helps the current information system management step further and fills the void of such types of system.
Keywords: computer application; mesh stores resource; informatization; rental management
 
Title: A new software watermarking algorithm based on instruction replacement of particular assembly
Authors: SUN Guang, SUN Xingming
PP: 2163~2167
Abstract: SHKQ is a static watermarking technique with high robustness, which can resist most attacks but may fail when applied in small software. This paper presents a new software watermarking method based on partial code block instruction replacement, which changes the frequency of particular assemblys instruction to embed watermarks. By changing a special instructions frequency of selected assembly, a bit of watermark is embedded into intermediate language (IL) program. One bit watermark is extracted by testing the frequency of instruction recorded in the textbook. Furthermore, the paper describes implementation of the algorithm and the issues that arise when targeting Microsoft intermediate language (MSIL), especially for textbook and assembly. The experimental results show that it has the ability of resisting collusive attack, is more feasible than SHKQ in practice, and can be applied in small software.
Keywords: computer application; software watermarking; SHKQ algorithm; Microsoft intermediate language; collusive attack
 
Title: A random-walk based adaptive size estimation algorithm
Authors: MA Xingkong, WANG Yijie, ZHENG Zhong
PP: 2155~2162
Abstract: In large scale dynamic network environment, nodes need network size information to support efficient and reliable data dissemination. Random-walk based adaptive size estimation (RASE) algorithm improves adaptation of dynamic environment by starting random walk when network size changes, realizes better trade-off between size estimation precision and transmission overhead by controlling the length of the random walk, and strengthens robustness by processing node failure. Theoretic analysis and experimental results indicate that compared with existing size estimation methods, RASE can provide accurate size estimation information quickly even in continually fluctuating network environment.
Keywords: computer application; size estimation; random walk; network size; overlay network
 
Title: Measurement of chaotic lidar range and velocity based on virtual instrument
Authors: LI Haizhong, WANG Yuncai, GONG Tianan, WANG Anbang
PP: 2150~2154
Abstract: Based on virtual instrument, the paper studies the ranging and real-time velocity measurement of target using time-interval measurement, with the correlation characteristics of broad bandwidth and noise-like chaotic laser. With the rapid data acquisition rate requirement of ranging system, the merits of oscilloscope about acquisition bandwidth, sensitivity and anti-interference were used. Data acquisition was realized by use of oscilloscope with general purpose interface bus (GPIB) interface. The range and velocity of the target was measured in the experiment, and data acquisition, processing and display were realized by the software of Labview. The results indicated that the chaotic lidar could accomplish the measurement of the range and velocity of a target rapidly by virtue of the virtual instrument.
Keywords: computer application; lidar; chaos; ranging; velocity measurement; virtual instrument; data processing
 
Title: Hot research topic extraction in digital libraries
Authors: HAN Xiaohui, MA Jun
PP: 2143~2149
Abstract: This paper proposes a structural paper similarity calculation method, and then proposes a novel approach to extract hot research topics during a time period from the corpus of digital libraries. A structural paper similarity measure was presented firstly. Then the similarity measure was used to group the papers into topics. Finally, the hotness of each topic was evaluated and the topics with highest hotness were selected as hot research topics. The results show the effectiveness of the paper similarity calculation method and hot research topic extraction method.
Keywords: computer application; topic detection; similarity calculation; digital libraries; scientific paper
 
Title: Classification and annotation of 3D models based on semantic relationship
Authors: WANG Xinying, LV Tianyang, WANG Zhengxuan
PP: 2136~2142
Abstract: The paper explores the semi-automatic semantic annotation and classification based on semantic relationship. The semantic relationship among 3D models came from the uses’ retrieval records of shape-based retrieval and is adopted in the automatic semantic annotation of the models whose semantic is unknown. The experiments on princeton shape benchmark show that the proposed method achieves good performance not only in semantic classification but also in semantic annotation.
Keywords: computer application; relevance feedback; clustering; semantic annotation
 
Title: A method on link loss rate inference of Ad Hoc networks based on multiplying model
Authors: YAO Ye, CAI Wandong, TIAN Guangli
PP: 2127~2135
Abstract: This paper first analyzed both the multiplying model of packets successfully transferring rate from end to end and the inequality relation between the loss rate of link and that of path in Ad Hoc networks. Then an interior link loss rate inference algorithm of Ad Hoc networks was presented on the basis of end-to-end measurement to solve the measurability of link performance in Ad Hoc networks. The results of simulation indicate that the loss rate inference algorithm based on multiplying model not only is effective, but also has short computing time, which is very adaptable to interior link performance inference for Ad Hoc networks.
Keywords: computer application; Ad Hoc networks; link loss rate inference; end-to-end measurement; multiplying model; measurement time window
 
Title: Design of embedded PCI card for P2P streaming media transmission technology
Authors: ZHANG Xiaoxuan, CHEN Zhao, XING Dawei, CHEN Runchang, ZHAO Yuelong
PP: 2120~2126
Abstract: This paper introduces a system model of P2P streaming media and design way of media context local. The hardware system architecture of embedded PCI card for P2P streaming media, Bootloader and the transplantation process of Linux operating system are described. The experimental results show that this embedded PCI card can provide high-quality video services as a part of the efficient streaming media server.
Keywords: computer system architecture; peer to peer; streaming media server; embedded operating system; Linux; PCI card
 
Title: A worm detection model based on artificial immune theory
Authors: CHEN Wen, LI Tao, LIANG Gang, ZHAO Kui
PP: 2114~2119
Abstract: This paper points out the deficiency in detecting the unknown worms and system robustness of the traditional worm detection technologies, and then introduces the advantages of using artificial immune system in self-adaptability aspect and resource integrating. Based on artificial immune theory, the paper maps the computer network into immune network, and improves the self-adaptive capacity of worm detection with its immune mechanism. The detection nodes in the immune network carry out worm signature scanning, process activity monitors and process state inspection based on the principle of antibody recognize antigen. The detection process includes two phases, namely the initial training of antibody and the dynamic immune detection of worms, and in the dynamic immune detection phase, each node is independent while all the nodes cooperate with each other to defense the intrusion of worms. Based on these, a worm detection model based on artificial immunity mechanism is set up with adaptability, robustness and autonomy.
Keywords: computer application; worm detection; artificial immune; network security
 
Title: Implementation of the space vector pulse width modulation
Authors: HOU Yueen
PP: 2108~2113
Abstract: Space vector pulse width modulation (SVPWM) can guarantee that the winding of the motor produces little harmonic, and compared with the method of sinusoidal modulation, it can improve the utilization on the direct current (DC) side. This paper introduces the implementation method of the SVPWM based on coordinate conversion, and introduces the principle of pulse width modulation (PWM), the work principle of three-phase inverter, the vector synthesis of SVPWM, and deduces the parameters of SVPWM. Finally, the implementation of SVPWM on DSP2812 is introduced.
Keywords: automatic control technology; motor control; space vector pulse width modulation; three-phase inverter
 
Title: Multi-objective path planning of unconstrained mobile
Authors: GUO Feng, TIAN Yantao, WANG Hongrui
PP: 2099~2107
Abstract: Problem of multi-objective path planning is investigated in this paper for the underactuated ball and plate system. A multi-objective path planning method based on combined entropy method and Djikstra algorithm is proposed. The multi-objective path planning method takes path length and hazards into acount based on uncertainty feature of the unconstrained mobile. As illustrated by simulation results, the path obtained by multi-objective method proposed in this paper can meet the path planning requirement of the unconstrained mobile.
Keywords: control theory and control engineering; ball and plate system; multi-objective decision; path planning; entropy method
 
Title: Cost analyses of self-adapting group defense model
Authors: HAO Junjun, HAO Wuling, LI Yuhua
PP: 2095~2098
Abstract: Group defense is a very complex system engineering. This paper analyzed the cost of group defense, and tried to reduce the cost of group defense without decreasing defense accuracy. Firstly a planar group model was extracted from Aves\'rest. Based on this model, a self-adapting defense model was obtained, and the costs of guard and danger avoidance were brought up. Then the paper focused on analyzing the costs of peripheral static defense, full-scale static defense and self-adapting defense, and got minimum values respectively. Finally, the paper briefly narrated potential application value of the research on the problem of the multi-agent group defense problem.
Keywords: system theory; complex system; group defense; defense cost; multi-agent; self-adapting