计算机科学 ›› 2018, Vol. 45 ›› Issue (6A): 591-594.

• 综合、交叉与应用 • 上一篇    下一篇

基于Android平台的高校网络订餐系统的设计与实现

郝俊生1,李冰锋1,陈曦2,高文娟3   

  1. 河南理工大学电气工程与自动化学院 河南 焦作4540001
    河南理工大学测绘与国土信息工程学院 河南 焦作4540002
    深圳技师学院中德智造学院 广东 深圳5181163
  • 出版日期:2018-06-20 发布日期:2018-08-03
  • 作者简介:郝俊生(1995-),男,主要研究方向为自动化;李冰锋(1979-),男,博士,主要研究方向为机器学习;陈 曦(1996-),男,主要研究方向为地理信息与智慧城市,E-mail:hpu_cx@126.com(通信作者);高文娟(1983-),女,主要研究方向为工业自动化。

Design and Implementation of Network Subscription System Based on Android Platform

HAO Jun-sheng1,LI Bing-feng1,CHEN Xi2,GAO Wen-juan3   

  1. School of Electrical Engineering and Automation,Henan Polytechnic University,Jiaozuo,Henan 454000,China1
    School of Surveying and Land Information Engineering,Henan Polytechnic University,Jiaozuo,Henan 454000,China2
    School of Sino-Germany Intelligent Production,Shenzhen Institute of Technology,Shenzhen,Guangdong 518116,China3
  • Online:2018-06-20 Published:2018-08-03

摘要: 针对现阶段高校就餐高峰期餐厅拥挤、就餐困难、师生等待时间过长等问题,基于Android平台设计并开发了一款用于解决餐厅就餐高峰期拥挤问题的“高校网络订餐系统”。该系统由用户管理、在线点餐、线上支付和订单排号4部分组成。为确定单位时间订单数是否已达窗口最大容纳量,运用K均值算法对顾客排队时长进行特征聚类,提取基于菜品的顾客排队时长之间的相似性,并建立菜品窗口的最大容纳量标准。将窗口最大容纳量作为订单排号功能中单位时间用户订单量的最大容许值,通过“用户自选时间段-餐厅预做-到时取餐”的方式缓解餐厅拥挤问题。

关键词: Android, K均值算法, 高校餐厅, 聚类分析, 网络订餐

Abstract: For solving the problem of congestion,dining difficulty and boring waiting time in college dining peak period,this paper designed and developed a college network ordering system based on Android platform.The system consists of four parts,user management,online ordering,online payment and order sequence.In order to determine whether the number of orders unit time has reached the maximum capacity of the window,this paperd used the K-means algorithm to characterize the customerst’queuing time to extract the similarity between the customer queuing time based on the dishes and establish the maximum capacity of the window standard.It takes the maximum capacity of the window as the maximum allowable value of the user orders in the unit time.The proposed method can alleviate congestion problems by the mode of “user selecting time for free,making meal in advance and taking meal on time”.

Key words: Android, Clustering analysis, K-means, Network ordering, University restaurant

中图分类号: 

  • TP311.52
[1]张宁,刘宏磊,谭薇,等.基于校园一卡通的电子商务平台的设计与实现[J].华中师范大学学报(自然科学版),2017(S1):195-199.
[2]杨斯博.基于安卓平台的手机订餐系统的设计与实现[D].长春:吉林大学,2016.
[3]马勇喆.基于Android平台的高校订餐软件设计与实现[J].信息技术,2016(3):170-174.
[4]张裔智,赵毅,汤小斌.MD5算法研究[J].计算机科学,2008,35(7):295-297.
[5]WANG X,FENG D,LAI X,et al.Collisions for Hash Functions MD4,MD5,HAVAL-128 and RIPEMD[EB/OL].
[2013-10-20].http://eprint.iacr.org/2004/199.pdf.
[6]PIMENTE l V,NICKERSON B G.Communicating and displaying real-time data with WebSocket[J].IEEE Internet Computing,2012,16(4):45-53.
[7]COWARD D.Java WebSocket编程[M].北京:清华大学出版社,2015.
[8]沈海波,洪帆.基于Cookie的跨域单点登录认证机制分析[J].计算机应用与软件,2006,23(12):48-51.
[9]OSKARSSON A,SKERFVING S,et al.Total and inorganic mercury in breast milk and blood in relation to fish consumption and amalgam fillings in lactating women[J].Archives of Environmental Health:An International Journal,1996,51(3):234-241.
[10]JIANG F,KU S.How to display the data from database by Listview on An-droid[C]∥2010 2nd International Workshop on Intelligent Systems and Applications (ISA).IEEE,2010:1-4.
[11]BATYUK L,HERPICH M,CAMTEPE S A,et al.Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications[C]∥2011 6th International Conference on Malicious and Unwanted Software (MALWARE).IEEE,2011:66-72.
[12]任敏丽.排队论在银行服务系统中的若干应用研究[D].哈尔滨:哈尔滨工业大学,2010.
[13]CHEN N,XU Z S,XIA M M.Hierarchical hesitant fuzzy K-means clustering algorithm[J].Applied Mathematics:A Journal of Chinese Universities(Series B),2014,1:1-17.
[14]韩微,翟盘茂.3种聚类分析方法在中国温度区划分中的应用研究[J].气候与环境研究,2015,20(1):112-113.
[15]章基嘉,孙照渤,陈松军.应用K均值聚类法对东亚各自然天气季节500毫巴候平均环流的分型试验[J].气象学报,1984(3):55-63.
[16]贾俊平,何晓群,金勇进.统计学[M].北京:中国人民大学出版社,2012.
[1] 姚烨, 朱怡安, 钱亮, 贾耀, 张黎翔, 刘瑞亮.
一种基于异质模型融合的 Android 终端恶意软件检测方法
Android Malware Detection Method Based on Heterogeneous Model Fusion
计算机科学, 2022, 49(6A): 508-515. https://doi.org/10.11896/jsjkx.210700103
[2] 王毅, 李政浩, 陈星.
基于用户场景的Android 应用服务推荐方法
Recommendation of Android Application Services via User Scenarios
计算机科学, 2022, 49(6A): 267-271. https://doi.org/10.11896/jsjkx.210700123
[3] 肖蕾, 陈荣赏, 缪淮扣, 洪煜.
融合聚类算法和缺陷预测的测试用例优先排序方法
Test Case Prioritization Combining Clustering Approach and Fault Prediction
计算机科学, 2021, 48(5): 99-108. https://doi.org/10.11896/jsjkx.200400100
[4] 曹素娥, 杨泽民.
基于聚类分析算法和优化支持向量机的无线网络流量预测
Prediction of Wireless Network Traffic Based on Clustering Analysis and Optimized Support Vector Machine
计算机科学, 2020, 47(8): 319-322. https://doi.org/10.11896/jsjkx.190800075
[5] 高玉潼, 雷为民, 原玥.
复杂环境下基于聚类分析的人脸目标识别
Face Recognition Based on Cluster Analysis in Complex Environment
计算机科学, 2020, 47(7): 111-117. https://doi.org/10.11896/jsjkx.190500004
[6] 孙志强, 万良, 丁红卫.
基于深度自编码网络的Android恶意软件检测方法
Android Malware Detection Method Based on Deep Autoencoder Network
计算机科学, 2020, 47(4): 298-304. https://doi.org/10.11896/jsjkx.190700132
[7] 孙志刚, 王国涛, 蒋爱平, 高萌萌, 刘金钢.
基于信息融合技术的行车安全监测系统
Monitoring System of Traffic Safety Based on Information Fusion Technology
计算机科学, 2020, 47(11A): 642-650. https://doi.org/10.11896/jsjkx.200400133
[8] 黄海燕, 刘晓明, 孙华勇, 杨志才.
聚类分析算法在不确定性决策中的应用
Application of Clustering Analysis Algorithm in Uncertainty Decision Making
计算机科学, 2019, 46(6A): 593-597.
[9] 章宗美, 桂盛霖, 任飞.
基于N-gram 的Android恶意检测
Android Malware Detection Based on N-gram
计算机科学, 2019, 46(2): 145-151. https://doi.org/10.11896/j.issn.1002-137X.2019.02.023
[10] 侯禹臣, 吴伟.
静态图像行为标注众包系统的设计与实现
Design and Implementation of Crowdsourcing System for Still Image Activity Annotation
计算机科学, 2019, 46(11A): 580-583.
[11] 叶佳, 葛红军, 曹春, 朱晋, 张营.
规则驱动的Android应用DFS测试技术
Rule-driven DFS Testing Technology for Android Application
计算机科学, 2018, 45(9): 99-103. https://doi.org/10.11896/j.issn.1002-137X.2018.09.015
[12] 曾星,孙备,罗武胜,刘涛诚,鲁琴.
基于深度传感器的坐姿检测系统
Sitting Posture Detection System Based on Depth Sensor
计算机科学, 2018, 45(7): 237-242. https://doi.org/10.11896/j.issn.1002-137X.2018.07.041
[13] 霍敏霞,薛博桓.
基于智能算法的破碎文件拼接复原技术的研究
Research on Splicing Recovery of Broken Files Based on Intelligent Algorithms
H
计算机科学, 2018, 45(6A): 174-178.
[14] 王振朝,侯欢欢,连蕊.
抑制CMT中乱序程度的路径优化方案
Path Optimization Scheme for Restraining Degree of Disorder in CMT
计算机科学, 2018, 45(4): 122-125. https://doi.org/10.11896/j.issn.1002-137X.2018.04.019
[15] 牛雷,孙忠林.
PCA-AKM算法及其在入侵检测中的应用
PCA-AKM Algorithm and Its Application in Intrusion Detection System
计算机科学, 2018, 45(2): 226-230. https://doi.org/10.11896/j.issn.1002-137X.2018.02.039
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!