Li Hongliang, Yang Yan, Yin Hongfeng, Jia Zhen
2013, 2(3):1-4. DOI: 10.12146/j.issn.2095-3135.201305001
Abstract:Information extraction is an important area of data mining. Text information extraction means extracting specified information from a section of free text and storing structured data in the knowledge base for user querying or further processing. Character attribute information extraction is an important instrument of building search engine of persons, and is also a technology for computer program understanding. This paper presents an automatic method to obtain encyclopedia character attributes, and this method uses the speech tagging of each attribute value to locate the encyclopedia free text. The rules are discovered by statistical method, and the character attributes information is obtained from encyclopedia text according to rules matching. Experiments show that this method is effective in extracting character attribute information from encyclopedia text. The extracted results can be used to build the knowledge base of the character attributes.
2013, 2(3):5-9. DOI: 10.12146/j.issn.2095-3135.201305002
Abstract:Microblog is a relation-based platform for sharing, spreading and acquiring information, and also the source of internet public opinion and the important battlefield of information transmission. The convenient forwarding operations of microblog result in the rapid spread of plenty of identical or similar microblog pages in the microblog space. Therefore, the detection of similar microblog pages is of great importance to lighten the client’s burden of browsing and improve the analytic efficiency of internet public opinion. A method based on LCS is introduced to detect similar microblog page: First is to calculate the files’ subset of the possibly similar microblog pages, and the next is to calculate its LCS and extract the reliable parts so as to ultimately detect the similar microblog pages. Experiments show that this method can detect the similar pages from the microblog data accurately and efficiently.
E xu, Zhou Jin, Hou Jian, Zhang Longchang, Bi JiaNa
2013, 2(3):10-14. DOI: 10.12146/j.issn.2095-3135.201305003
Abstract:For incomplete food safety information system, this paper proposes a direct method of attribute relative reduction based on rough set theory. This reduction method gives the concept of tolerance relationship similar matrix via using an extension of equivalence relationship of rough set theory, which is called tolerance relationship. It solves the problem of inconsistency in the incomplete information system through the introduction of restrictions of the generalized decision function. It calculates the core attributes of incomplete information systems via the tolerance relationship similar matrix. It applies attribute significance, which this paper puts forward based on attribute frequency in the tolerance relationship similar matrix, as the heuristic konwledge. It makes use of binsearch heuristic algorithm to calculate the candidate attribute expansion so that it can reduce the expansion times to speed up reduction. Experiment results show that this method is simple and effective.
2013, 2(3):15-21. DOI: 10.12146/j.issn.2095-3135.201305004
Abstract:To improve the performance of the commodity recommendation system, this paper proposes two methods: (1) recommend commodity in real-time; (2) understand customers’ purchase intentions. In order to achieve the above goals, we summarize commodity recommendation location, and the label of commodity. Based on the above, we propose a scheme to improve the performance of the commodity recommendation system. We conduct an in-depth analysis on existing work, and give necessary theoretical analysis and performance evaluation for the proposed commodity recommend scheme. From the technical point of view, this method improves the above commodity recommend scheme.
2013, 2(3):22-27. DOI: 10.12146/j.issn.2095-3135.201305005
Abstract:Spectrum cognition-aware wireless sensor network can provide wireless spectrum information collection, monitoring, queries, statistics, analysis, and distribution services, significantly improving the utilization of the scare spectrum resource and service performance of network applications. In this paper according to the application needs of industry, spectrum-aware wireless sensor network architecture and network protocols design problems are analyzed and studied preliminarily and hierarchical network structure and cross-layer protocol design methods are identified. In addition, spectrum cognition, information aggregation, routing selection and network management issues involved in network system design are discussed.
2013, 2(3):28-31. DOI: 10.12146/j.issn.2095-3135.201305006
Abstract:In order to build the wireless sensor network based large-scale, low-cost, low-power traffic information collection system, this paper proposes a vehicle speed detection algorithm. We divide the network into many subnets, and one subnet consists of one router and multiple sensor nodes. The router conducts time synchronization and vehicle speed computing for its subnet. The vehicle speed detection accuracy of the algorithm is verified by experiments.
Li Meng xin, Li Donghao, Zhang Rui, Song Xiao-li
2013, 2(3):32-36. DOI: 10.12146/j.issn.2095-3135.201305007
Abstract:Illumination processing method based on image processing technology is studied. Histogram equalization is effective for treating too bright or too dark background images but is very poor in detail treatment. Retinex is effective in restoring image details. Combining histogram equalization and Retinex, a fusion method is proposed based on wavelet transform. The corresponding experiments were conducted on Yale B face database. The comparison of the experiments showed that the fusion method can weaken the impact of the light on the image, properly preserve the details with better effect of processing, enhance the image feature information and improve the clarity of the image.
2013, 2(3):37-40. DOI: 10.12146/j.issn.2095-3135.201305008
Abstract:The paper describes an indoor video surveillance system of lower bit rate with static camera. The combination of efficient video compression and motion detection realizes lower bit rate real-time monitoring, saving the network resource and storage space. Using the dynamic threshold and background updating, motion detection can efficiently get the moving area which is encoded by H.264. The result shows the bit rate is much lower while video image quality has no change.
Li Meng xin, Fan Jingjing, Zhang ying, Zhang rui, Hou Dingding, Xu Weijing
2013, 2(3):41-44. DOI: 10.12146/j.issn.2095-3135.201305009
Abstract:The existing moving target detection algorithms are vulnerable to noise and shadows, so the edge of the moving target detection is relatively vague. Combining the inter-frame difference with background subtraction, a wavelet edge detection method is proposed to detect moving targets. The morphological filtering and connectivity analysis are applied to obtain accurate moving target. The experiment shows that the algorithm can be adopted to detect moving targets from the video image sequence accurately.
Liu LI, Xu Guo-qing, Li Weiming, Ou Yongsheng, Song Zhangjun, Zhou yimin
2013, 2(3):45-54. DOI: 10.12146/j.issn.2095-3135.201305010
Abstract:This paper proposes some methods of increasing the robustness and accuracy of lane detection in bad weather, such as light rain or after a rain. First, a reflection model of road surface water is presented. The model can efficiently fit the real reflection phenomenon on a rainy road with strong specular reflection of sky light on the surface water or road, and it can efficiently reduce specular reflection and enhance lane markings in the same situation. Second, the paper proposes some methods of extracting lane markings based the symmetry feature. They include the methods of detecting vanishing point and fitting the shape model of the parallel lanes using the symmetry features. Finally, by combining some prior knowledge, such as restriction of slope of the parallel lane lines and symmetry features, the methods can effectively increase the stability, robustness and accuracy of lane detecting in different complex environments.
Lv Xuesong, Zhang yi, wang Jin-ge
2013, 2(3):55-59. DOI: 10.12146/j.issn.2095-3135.201305011
Abstract:A new Hierarchical co-evolutionary learning method is proposed based on Michigan approach and Pitt approach. The two populations belong to deferent levels of intelligence. Deferent genetic operators are used independently in Michigan population and Pitt population via co-evolutionary method. and the interacting genetic operators are used interpopulations. Simulation experiments show that the methods can amend the short sight characteristic of the classifier system and improve its intelligence.
2013, 2(3):60-66. DOI: 10.12146/j.issn.2095-3135.201305012
Abstract:Indoor scene plays an important role in human living environment which constitutes the urban landscape together with building and flora reconstruction. However, the accessible 3D indoor scene data are usually not as semantic and reasonable as expected. They may contain a multitude of topological errors and omissions. This easily results in fragments production during model reusing and incompatible transform during format conversion. We creatively build a scene hierarchy using “Graph Cuts” method iteratively by considering the topological relation (“support & non-support” and “primary & non-primary”) and geometry relation (symmetry, alignment, intersection and connectivity). The hierarchy reorganizes the scene in different levels and users could select the required level of detail which contains semantic segmentation. It corrects the topological errors and offer convenience for further scene edit.
2013, 2(3):67-74. DOI: 10.12146/j.issn.2095-3135.201305013
Abstract:The rapid growth of cybercrime, Internet resources and the number of users, the ‘virtual–reality’ integration of new Internet applications, as well as the uncertainty research for network behavior, chronosphere and the relation of geographical environment, are all needed to develop new space positioning technology to get cyber-objects quickly and accurately locked in the real space. By means of IP locating and virtual GIS, this article explores the establishment of new Internet-based composite space positioning system, which includes: (1) extend the IP protocol to carry IP surveying, establish Internet resource and user space database, setup a new space positioning network; (2) extend GIS data structure, add ‘cyber-dimension’ and ‘virtual attribute’, take IP as the third dimension to space coordinate system, dynamically connect cyberspace and real space; (3) use cybercrime as the research object, make spatial analysis for the composite data, reveal ‘virtual–reality’ space law for the crime fighting, prevention and comprehensive management.
2013, 2(3):75-78. DOI: 10.12146/j.issn.2095-3135.201305014
Abstract:Beginning with analyzing the testability of UML model, a scenario tree can be created by parsing it. The input, respected output, constraint and scenario context are generated through traversing the scenario tree, and the four parts constitute the test case. We can find the changed information before and after revision by comparing versions of the sequence diagram. Finally, a mapping relation between changed information and test cases is generated. Using this map relation we can select test cases affected by revision.
2013, 2(3):79-81. DOI: 10.12146/j.issn.2095-3135.201305015
Abstract:LTE(Long Term Evolution) network is developing at a very high speed all over the world. LTE voice solution is one of the key points in the LTE network and terminals. LTE network is totally based on the packet-switched architecture, which can not provide custumers with voice service in the circuit-switched network. We need to implement the IMS network to make the VoLTE work. However, it is impossible in the early days of the network implementation. This article introduces several voice solutions over LTE network, analyses good and bad aspects about each solution, and has a deep analysis about what solution should be implemented for operators in different periods.
Hou Zengtao, Qu Yuanju, Bai Xueling, Huang xu, Xu Zhaobin, Ye Xin, Zhang Linan, Shang Peng
2013, 2(3):82-86. DOI: 10.12146/j.issn.2095-3135.201305016
Abstract:More attentions are paid to the secondary development of CAD/CAM , where building one,s own database for CAD/CAM software is very important. Based on the famous CAD/CAM software PRO/E, we studied the way of building an external database by integrating dll program. The dll program was written by VC.NET with ADO technology. With the integration,, we built a database system of cutting tools required in industry.
Wei wei, Su Haijian, Liu Liang
2013, 2(3):87-90. DOI: 10.12146/j.issn.2095-3135.201305017
Abstract:Analysing the current waste of electricity in some public indoor places, this paper proposes a single chip microcomputer based energy smart control system. The system can automatically turn on or turn off the lights and fans in automatic control mode, according to the light intensity, person number and temperature. Using it can enable intelligent automatic control of lamps and fans, and achieve energy savings.
Wang Cheng-zhi, Liu Yuhong, Ren Mingyuan
2013, 2(3):91-97. DOI: 10.12146/j.issn.2095-3135.201305018
Abstract:The application range of the power management chip is very wide. Development of the power management chip is of great significance for improving the overall performance, and is directly related to the selection of this kind of chip and the demand of the system. The charge pump circuit through charge-transfer work achieves a certain boost in the case of no inductive components. Therefore, the boosted circuit and the power management chips are very popular in real applications. The low-power consumption charge pump DC/DC boost circuit analyzed in this paper is the result of a cooperation project with a foreign company. The circuit uses 0.35 μm standard CMOS process, and its input voltage is 2.5 V~5.0 V. When the input voltage is higher or lower than the output voltage, the output voltage maintains a stable low ripple output, and can work in step-up or step-down mode automatically. The charge pump circuit uses a comparative booster circuit and effectively reduces chip power consumption, and improves the conversion efficiency of the system, especially in the case of light load. The circuit has multiple protection features such as soft start, over-temperature protection and over-current protection. The simulation results satisfy the design requirements. This work is a valuable attempt to combine theory and practice.
Xie ShengJun, Cai SiJing, Li YouChen
2013, 2(3):98-104. DOI: 10.12146/j.issn.2095-3135.201305019
Abstract:There are a number of parameters related with mining method optimization of transferring large scale openpit into underground mining, of which many have fuzzy features. Based on deposit and mining conditions of the Nanfen iron mine, the ideal point method and the Hamming approach degree method were used for primary selection of possible underground mining methods. The fuzzy multi-attribute decision-making method was used for final optimization of mining method to ensure adaptability and comprehensiveness of underground mining method selection. A subjectiveobjective coupling weighting method was used to determine weights of various factors influencing mining method selection, which would prove reasonableness of determining weight coefficients. Finally, the sublevel caving method with no sill-pillar was selected as the underground mining method to be used in the Nanfen iron mine. According to the comments of mining experts in a judging meeting, the selected m ethod would fill requirements of mining techniques and mining benefit.
Mobile website