• Volume 19,Issue 12,2010 Table of Contents
    Select All
    Display Type: |
    • Service-Oriented Data Integration Platform

      2010, 19(12):1-5.

      Abstract (1505) HTML (0) PDF 689.23 K (2724) Comment (0) Favorites

      Abstract:This paper presents a loosely coupled data integration solution. It separates the heterogeneous data sources from the data integration system as a service provider, and integrates the heterogeneous data sources into a unified data view called data integration processing package by the bottom-up way using the popular mediator/wrapper approach, and implements a prototype system initially. This paper focuses on the architecture of the system, as well as the structure design and the creation process of the data integration processing package, Finally, verifies the flexibility and validity of this solutions by experiment.

    • A Cross-Search Framework Supporting the Professional Type of Scientific Data

      2010, 19(12):6-10.

      Abstract (1507) HTML (0) PDF 769.23 K (2746) Comment (0) Favorites

      Abstract:The CAS 11th Five-year Informationization Construction Program will build a huge data application environment, which is composed of 51 institutions. It is necessary to build a cross-search tool to help people get useful information from those massive data. The traditional cross-search technology doesn't support the professional type of scientific data, which brings difficulty in data formatting and data presentation. This paper proposes a cross-search framework which supports these professional types. This framework uses data modeling middleware to publish scientific data and metadata on the basis of the universal data exchange format of the profession type, and uses template technology to display these data flexibly. The framework also manages professional type as a plug-in, which has good extensibility. This paper also introduces the application of the cross-search system Voovle, based on this framework.

    • Study and Improvement of MAC(Mandatory Access Control) for Windows

      2010, 19(12):11-16.

      Abstract (1532) HTML (0) PDF 750.38 K (2892) Comment (0) Favorites

      Abstract:Security is always a hot topic with the development of computer technologies. Currently, mechanisms like active defense, detection and anti-detection are proposed. They could be implemented on different levels such as application-level and kernel-level in the system. We manage to go to the system-level. Linux owns mature security-enhanced version SELinux. For Windows, we focus on mandatory access control and propose a mechanism with improved efficiency, compatibility and stability.

    • Advertising Integration System for Internet Virtual Environment

      2010, 19(12):17-23.

      Abstract (1727) HTML (0) PDF 1.27 M (2696) Comment (0) Favorites

      Abstract:With the rapid development of Internet technology and application, more and more enterprises start sales advertisement on the Internet. Advertising in the Internet Virtual Environment, as a new form of Internet advertising becomes the focus of market promotion. The ad agency plays a leading role in the existing advertising integration system. The application carrier does not have too much impact in the workflow, which does not fit in the current situation of China. This paper proposes an advertising integration system led by the application carrier, which includes roles of platform agency, application developer, application carrier, ad agency and ad customer. They execute their own tasks, complete the workflow via the cooperation between the ad engine and management platform.

    • MiniOSEK Operating System Based on Servent/exe-Flow Model

      2010, 19(12):24-28.

      Abstract (1726) HTML (0) PDF 869.44 K (2566) Comment (0) Favorites

      Abstract:To solve the problems existing in the OSEK operating systems, such as low real-time performance and efficiency, this thesis proposes a new OSEK operating system, namely, MiniOSEK, which is built on the servent/exe-flow model, and in accordance with the OSEK/VDX standard. The design idea of MiniOSEK is introduce message-driven idea into OSEK operating system. When a task needs to call an API function which conform OSEK OS standard, it just needs to send a message to this API function. In this way, the time required for context switch can be shortened and the real-time of the embedded system can be improved.

    • Securities Data Center Network

      2010, 19(12):29-33.

      Abstract (1861) HTML (0) PDF 950.98 K (3459) Comment (0) Favorites

      Abstract:Data center is the critical data platform to the system securities and other financial institutions. The status of its network system is extremely important. During a securities firm in the implementation of data center construction process, on the basis of need a network centric design principles and construction goals, this paper describes its data center network core business network, trading and office system network and wide area networks systems design. The operation of the new network system design shows that the system meets the business needs of the system and achieves the development goals.

    • Extensible Management Information System Based on Domain Engineering and Component

      2010, 19(12):34-38.

      Abstract (1782) HTML (0) PDF 904.40 K (2478) Comment (0) Favorites

      Abstract:In order to meet MIS’s changing user-requests, based on the domain engineering software development methods and component technology, we deeply study about the MIS’s domain analysis, domain design and the implementation of the domain components; Based on three kinds of composite frame Struts, Spring, and Hibernate support, use the idea of domain model's stratification structure, proposed a kind of software architecture which has the data abstraction and the sliming and coupled loosely level style, In this architecture use component technology and the code automatic production technology to solve the requirements change of information system caused by the environment and the service change, provide a reasonable technology solutions for MIS and related systems due to the changes in requirements caused by domain object and the associated changes in business operations.

    • Design and Implementation of Rich Media Client Based on LASeR

      2010, 19(12):39-43.

      Abstract (1614) HTML (0) PDF 879.52 K (2601) Comment (0) Favorites

      Abstract:With the increasing number of mobile end-user, people's demand of experience became higher and higher. In academy, rich media technology became the solution of this problem with its rich user experience. Because of the conditions of our country, rich media technology is still in the preliminary study stage, this article proposed a complete solution of rich media service based on mpeg4 laser, designed and implemented a rich media client with SVG scenes, described the stratified system architecture, analyzed the core functional modules and made a test to the system. The results showed that rich media client could integrat media resources very well, increased the demonstrated ability and real-time interactivity highly, enriched the user's experience.

    • File Storage Distribution Algorithm in Streaming Media System

      2010, 19(12):44-48.

      Abstract (1676) HTML (0) PDF 574.28 K (2890) Comment (0) Favorites

      Abstract:With the development of high performance center build on server cluster, the speed of CPU and Memory have gained a big leap in massive data processing, but the unmatched I/O speed is still a bottleneck of whole system. This paper digs into streaming media system’s specific characters deeply in order to find out a more efficient, balanced way of file storage distribution, increasing degree of parallelism while reducing service time delay. First, give an evaluation of each media file based on target features, then distribute all files onto different disks through storage scheduler, finally there is a fine grit division to guarantee storage inside one disk is highly optimized. The simulation results verify the validity of the algorithm, this strategy of storage allocation not only improves data organization among disks, but also works well in one disk, which brings a better concurrent service and user experience.

    • Object Tracking Using Mean-Shift Based on Comentropy

      2010, 19(12):49-53.

      Abstract (1845) HTML (0) PDF 615.20 K (2618) Comment (0) Favorites

      Abstract:Video object tracking technology has great applied value in the fields of traffic and military. In this paper, a video matching object tracking algorithm, which is comentropy-based, is proposed. First of all, the concept of comentropy is introduced. Secondly, the feature of the video object is described by comentropy, and the algorithm which combined with mean-shift is designed with feature match in two different feature spaces, RGB and HSV. Finally, the experiment simulation is presented. The experiment results show that the proposed algorithm can track the object steady and real-time. This algorithm can achieve the desired effects and it is a practical algorithm.

    • Robust Target Recognition Algorithm of Soccer Robots

      2010, 19(12):54-58.

      Abstract (1782) HTML (0) PDF 853.88 K (2735) Comment (0) Favorites

      Abstract:Vision system is the critical way to obtain environmental information for humanoid soccer robot. During the competition, because of the variable illumination conditions on the field, the Recognition algorithm using traditional segmentation is not satisfying. An object recognition algorithm, which combined target color with shape information is presented in this paper. This algorithm implements rapid image threshold segmentation based on color information in the HSI color space, obtain the pixel of the object, and joined the adaptive threshold update, then use object pixel and shape information implement optimizing edge detection to recognize the object, finally obtain the accurate target location information in the image. Experiments show that this algorithm can be a long time to obtain the target location information in the image in different illumination conditions, satisfy the requirement of the real-time.

    • Calculation of Sentence Group Similarity Based on Hadoop

      2010, 19(12):59-63.

      Abstract (1848) HTML (0) PDF 712.00 K (3927) Comment (0) Favorites

      Abstract:Based on the introduction of Open Source Framework of Hadoop, encoded pattern of Map/Reduce and the calculated formula of sentence similarity, the present paper adopts the method of sentence group similarity parallel computing to the encoded pattern of Map/Reduce in terms of Hadoop. And it verifies the stability and feasibility of dealing with tremendous data.

    • Image Lossless Compression Algorithm Based on Data Multi-Packet

      2010, 19(12):64-68.

      Abstract (1728) HTML (0) PDF 753.68 K (3490) Comment (0) Favorites

      Abstract:Several fundamental image lossless compression methods are explained and researched comprehensively. With the relevance of adjacent pixel, an image lossless compression algorithm based on data multi-packet is presented, and four RLE improved algorithms for pixels which has same or similar gray value and a length code table compression algorithm for bi-level sequence are proposed in this paper, there is very good effect. Experimental results shows the algorithm has a better compression ratio than WinZIP, almost the same effect as WinRAR.

    • CAN Bus Node Emulator Based on Qemu

      2010, 19(12):69-74.

      Abstract (1765) HTML (0) PDF 1.01 M (3768) Comment (0) Favorites

      Abstract:The development of vehicle control network is a difficult problem at present. Because it needs a lot of cheap toolchains,which must meet the requirement of hardware/software co-design. In the toolchains, hardware emulator plays an important role. The emulator provides funcation verification for the development of software and shortens the development period of embedded system. For the development of vehicle control network, this paper proposes an emulator based on QEMU and virtual local area network at the same time introduces a way of building CAN bus network by the emulator. It’s called CES and achieves the function simulation of the hardware environment of the CAN bus network node.

    • Novel Binary Image Compression Algorithm Based on Cellular Automata

      2010, 19(12):75-80.

      Abstract (1545) HTML (0) PDF 920.18 K (2878) Comment (0) Favorites

      Abstract:This paper reports a new Cellular Automata (CA) model for image compression. The genetic programming has been employed to search for optimal non-linear cellular automata rules which are used to generate vectors. The code is the simple CA cycle number. The simulation research proves that the algorithm is good in compression ratio, compression speed, decompression precision and the code can be compressed using other compression algorithms etc. The searched CA rule is also good for different compression.

    • Visualization Method of WebGIS Data

      2010, 19(12):81-85.

      Abstract (1994) HTML (0) PDF 796.42 K (2874) Comment (0) Favorites

      Abstract:The working principle of AJAX and the visualization method of webGIS data, and another JavaScript-based vector graphics principles of visualization methods are introduced. The combination of the two proposed a new type of webGIS platform design program, using tile-based map to indicate the map information, using JVGL to other two-dimensional visualization of geographic information

    • Weighted KNN Algorithm for Tumor Gene Expression Profiles Classification Based on Neighborhood Rough Sets

      2010, 19(12):86-89.

      Abstract (1773) HTML (0) PDF 1.11 M (3158) Comment (0) Favorites

      Abstract:The accurate identification of tumour subtypes in the treatment of tumors is important; the classification of different tumor subtypes has recently received a great deal of attention in the field of bioinformatics. The paper sorts genes using Relief algorithm and selects the initial subset of the genes of tumor information firstly. Then, calculates the weighted gene sets using the forward attribute reduction algorithm based on neighborhood rough set model. Then the weighted K-NN algorithm is used to analyze the data in order to detect differentially expressed genes. The results showed the feasibility and effectiveness of the method proposed in this paper.

    • Optimization of Services Composition Based on BPEL

      2010, 19(12):90-93.

      Abstract (1637) HTML (0) PDF 873.57 K (2332) Comment (0) Favorites

      Abstract:In view of the current service combination existence's problem, proposed one based on the BPEL service combination optimization construction. The construction mainly includes the distributional UDDI service registration center, the BPEL designer, service combination analysis module, service combination optimization module and so on. From the proposition and design of the platform construction to the platform realization, it has implemented the SOA design concept, optimized service combination, raised the operating efficiency.

    • Pointer Strategy Optimized Scheduling Algorithm for Input Queued Switches

      2010, 19(12):94-99.

      Abstract (1756) HTML (0) PDF 880.52 K (2835) Comment (0) Favorites

      Abstract:To resolve the performance decrease of FIRM under non-uniform traffic, a pointer strategy optimized algorithm named low-FIRM is proposed. This scheduling algorithm modifies round-robin pointers of each input queue according to the weight of the length and waited time of each virtual output queue, which makes the queue with largest weight tend to be served first. Low-FIRM is described and its performance is compared with those of iSLIP and FIRM. Simulation results show that low-FIRM achieves high performance under both of the uniform and non-uniform traffic.

    • Web Usage Mining Algorithm Based on Sequence Number

      2010, 19(12):100-104.

      Abstract (1695) HTML (0) PDF 880.01 K (2662) Comment (0) Favorites

      Abstract:Aiming to the character that page attribute of session pattern in Web server log is Boolean quantity, an algorithm of Web usage mining based on sequence number is presented. The algorithm turns session pattern of users into binary, and then uses the way of number ascending to search candidate frequent itemsets. The algorithm computes support by sequence number dimension in order to scan once session pattern of users, and then the efficiency of Web usage mining is efficient improved. The experiment indicates that the efficiency is faster and more efficient than presented algorithms.

    • Front-End and Back-End Data Processing of a Middleware for Bank

      2010, 19(12):105-108.

      Abstract (1632) HTML (0) PDF 1.15 M (2620) Comment (0) Favorites

      Abstract:Data processing middleware for banking risk is a high-level application middleware mainly using data mart technology to support the supervision system of banking risk. This paper firstly discusses the objective reasons for proposing the DPMFBR and the significance of studying it, then builds out the architecture of middleware system, gives a detailed description of the major functional modules, and focuses on designing the front-end and back-end application service interface. At last, an example of application of middleware system is given. Middleware system refines and packages the same logic of data processing for banking risk and provides a unified service interface and platform for various front-end risk management applications. It can greatly shorten the development cycle of banking risk management system and reduce the development costs.

    • Invulnerability Simulation of Military Communication Networks Topology

      2010, 19(12):109-113.

      Abstract (1503) HTML (0) PDF 931.17 K (2680) Comment (0) Favorites

      Abstract:Based on the classical scale-free network model (BA model), this article designs a adjacent network of which key nodes are constructed to be like the structure of rotary interchange, and puts forward a method of the topology optimization for military communication networks by redundant links, and has a research on the arithmetic of the topology optimization. The method proposed are simulated by matlab. The results of the simulation show that the method can well improve the invulnerability of military communication networks, which has less influence on the network.

    • Learning Algorithm of Fuzzy Petri Net Based on Result-Feedback

      2010, 19(12):114-118.

      Abstract (1622) HTML (0) PDF 1.10 M (2030) Comment (0) Favorites

      Abstract:With regard to the complex structure of Fuzzy Petri Net, this paper improved the hierarchical algorithm of Fuzzy Petri Net without increasing the virtual place and virtual transition, thereby simplifying the learing and training of Fuzzy Petri Net. To speed convergence, this paper proposed a new algorithm for the learning of Fuzzy Petri Net based on the results feedback, namely FBFPN. Firstly, this algorithm layered the pure net hierarchically and established the approximate continuous function of the transition firing, then adjusted the weight, the threshold and the credibility ,finally adjusted the input vector to minimize the error function. Simulation results showed that this algorithm has stronger generalization ability and higher learning efficiency.

    • Multi-Path Protocol of QoS in Wirelesses Mesh Network

      2010, 19(12):119-122.

      Abstract (1394) HTML (0) PDF 935.13 K (2834) Comment (0) Favorites

      Abstract:In order to meet the Wireless Mesh Network users’ application demands for the quality of service (QoS), in this paper, base on the AODVM (Ad hoc On-demand Multipath Distance Vector) to promote the Stability-Preferential On-demand Distance Vector Routing (SPODV) protocol which is a network link stability-preferential-based as well as a multi-path QoS protocol. It comprehensively considerate the agreement between the network link stability and bandwidth constraints to improve the routing strategy to meet the users’ QoS requirements.

    • User Authentication Scheme Based on Message Authentication Code

      2010, 19(12):123-125.

      Abstract (1726) HTML (0) PDF 779.99 K (2717) Comment (0) Favorites

      Abstract:For easy leak, replay attacks, the burden of overweight and other issues in password-based user authentication schemes for electronic commerce, this paper proposes a user authentication scheme based on message authentication code to solve these problems. This algorithm has countable and time-bound features, does not require any password or verification table, it is under firm security. This algorithm has a lower computational overhead on client, can be used in mobile environment with limited computing capability.

    • Design and Implementation of Driving Theory Examination System

      2010, 19(12):131-136.

      Abstract (2058) HTML (0) PDF 598.33 K (4398) Comment (0) Favorites

      Abstract:This paper analyzed the deficiencies of the current driving theory examination management, discussed the management requirements of the driving theory examination system after the promulgation and implementation of Ministerial Decree No.111. From the close of business process and examination of security studies perspective ,design a new generation of subjects in a driving theory examination system using the advantage of Spring framework and introduced the system design and development process of a number of key technology solutions.

    • Optimization Algorithm for Multivariate Decision Trees Based on VPRS

      2010, 19(12):136-130.

      Abstract (1498) HTML (0) PDF 989.18 K (2648) Comment (0) Favorites

      Abstract:When construct multivariate decision trees, noise data reduced the training efficiency and quality of model, most of the present pruning methods aimed at leaf node to eliminate the influence of noise data, but not pay attention to the disturbed problem of noise data when selected testing attribute. In order to solve the problem, extends the relative core of attributes in rough sets theory to variable precision rough set(VPRS), and uses it for selection of initial variables for decision tree; extends the concept of generalization of one equivalence relation with respect to another one, to relative generalization equivalence relation under mostly-contained condition, and uses it for decision tree initial attribute check;propose an algorithm for multivariate decision tree that can avoid disturbance of noisy data. Finally, validated the algorithm by an experiment.

    • Visual Ontology Manager of Power Domain

      2010, 19(12):137-141.

      Abstract (1772) HTML (0) PDF 569.51 K (3197) Comment (0) Favorites

      Abstract:Based on the analysis of the shortage of current CIM(Common Information Model)in power system, this paper designed a visual ontology editor of power domain. It could translate the description language of CIM from UML to OWL DL(Web Ontology Language based on Description Logics). Experimental results indicate that the editor can complete the CIM language translation from UML to OWL DL and the translated- ontology can be well inferred by machine and be extended intuitively.

    • Optimization of Municipal Meteorological Telecommunication Network Construction

      2010, 19(12):142-146.

      Abstract (1397) HTML (0) PDF 531.08 K (2665) Comment (0) Favorites

      Abstract:With the development of meteorological services, the exchange of meteorological data and data transmission was more and more dependent on the network,Network security and reliability was very important。This paper introduced that the SDH and VPN was applied in meteorological networks,The main networks and backup networks was switched automatically when network fault occurred。

    • IP PBX Dispatch System and Its application in Coal Mine

      2010, 19(12):147-150.

      Abstract (1514) HTML (0) PDF 546.03 K (2581) Comment (0) Favorites

      Abstract:With the development of economy, the increasing demands of enterprise in production and security lead to the birth of dispatch systems. Meanwhile, with the improvement of IP technology, the IP dispatch system has played an important role in many industries. This paper analyzes the key technology in IP PBX dispatch system, and then proposes the approaches and characteristics of putting IP PBX dispatch system into mine. The function requirements of the system and implementation details of primary modules are given.

    • Research and Application of Continuous Integration Based on Hudson

      2010, 19(12):151-154.

      Abstract (1432) HTML (0) PDF 627.15 K (4075) Comment (0) Favorites

      Abstract:Continuous Integration (CI) is an important milestone of modern software engineering’s development history. This paper analyzes existing problems of integration in modern software development, and aiming at solving integration problem & promoting project predictability, puts forward a CI design & implement solution for the first time, which gives the guide of implement in J2EE projects. This solution has got good effects in practical software development.

    • Application of Levenberg-Marquardt Algorithm to Training of T-S Fuzzy Model Based RBF Neural Network

      2010, 19(12):155-159.

      Abstract (1747) HTML (0) PDF 383.10 K (3239) Comment (0) Favorites

      Abstract:To improve the efficiency of training the T-S fuzzy model based RBF neural network, the Levenberg-Marquardt algorithm is introduced into it, which speeds up the convergence and reduces the probability for the training to get into the local minimum point. Next, a kind of more efficient algorithm, named hybrid learning algorithm,is proposed. At last, the efficiency and practicability of the Levenberg-Marquardt algorithm for the training of the T-S fuzzy model based RBF neural network are tested through an experiment.

    • Topic Spider with Postgresql Datebase Cluster

      2010, 19(12):160-163.

      Abstract (1584) HTML (0) PDF 459.30 K (3278) Comment (0) Favorites

      Abstract:In respect to the characteristics of hugeness of net information and request for spider efficiency in topic net, this paper applies postgresql database cluster to the topic net spider, meets the need for huge storage space by spider, and also tackled the bottleneck of efficiency with cache technology when the cluster technology is applied in spider..

    • DDoS Detection Algorithm Based on Cluster of Entropy

      2010, 19(12):164-167.

      Abstract (1616) HTML (0) PDF 596.66 K (4369) Comment (0) Favorites

      Abstract:The entropy is used to represent the feature of DDoS, and the entropy is clustered by K-means algorithm. The threshold of DDoS detection is gotten from analyzing statistical normal network packets, then the normal characteristics training set is updated, and the DDoS is recognized on the basis of threshold. The experiments show that the measure can implement trainings and testing processes rapidly, and it can detect existence of DDoS effectively.

    • Feedback Tracking System of Network-Aided Teaching Resources Based on DM

      2010, 19(12):168-171.

      Abstract (1537) HTML (0) PDF 572.68 K (2721) Comment (0) Favorites

      Abstract:The feedback tracking system of network-aided teaching resources is an important method to promote the quality of teaching, this article design the system from the student perspective. In this paper, we use the rough sets and association rules in the DM technique to data collection about students’ online learning behavior, data preprocessing, construction decision-making table, association rules extraction based on rough set, finally, we get the results. The system has an important significance to promote the modernization of teaching and teaching quality.

    • Application of Ant Colony Optimization to the Bohai Sea Container Transportation Network

      2010, 19(12):172-175.

      Abstract (1671) HTML (0) PDF 1014.66 K (3027) Comment (0) Favorites

      Abstract:The purpose of this paper is to solve the NP problems of the container sea transport network system.An ant colony optimization algorithm was proposed to search the shortest path of the transportation networks. An ant colonies optimization model for Bohai Sea Container transportation network was constructed.by experimental analysis and optimization calculation.It is concluded that the ant colony optimization algorithm obtains the optimal navigation .It provides a reference route configuration for container transportation network.

    • Application of PDA to Geographical Information System for Forestry

      2010, 19(12):176-179.

      Abstract (1496) HTML (0) PDF 769.12 K (2110) Comment (0) Favorites

      Abstract:According to the practical requirement for photo, coordinates and azimuth angle in forest pest investigation, a forest pest investigating system is designed and implemented. Within the system, remote sensing images and forest maps are used as base maps, the embedded GPS is used for navigation and location data collection, the embedded camera is used to take photos in field, the electronic compass is used to capture azimuth angles, and an interface is used to input descriptive attribute data. The result of investigation which be directly saved as Spatial data format. This system can greatly improve the work efficiency and provide an advanced methodology for forest pest investigation.

    • Collaborative Filtering Recommender Systems Based on Clustered Users Using AntStream Algorithm

      2010, 19(12):180-184.

      Abstract (1424) HTML (0) PDF 629.48 K (3203) Comment (0) Favorites

      Abstract:Expansion of the scale to the traditional collaborative filtering recommendation systems and changes of users’ interest bring problems of decreased accuracy and real-time responsiveness. Collaborative filtering recommender systems based on clustered users using K-Means Algorithm can solve these two problems in some extent, however, with a local optimum defects. Under the premise of ensuring the real-time responsiveness, AntClass algorithm applied to users is proposed to overcome the shortcomings of K-Means algorithm. This paper also proposed to take the users’ ratings as a data stream, and use the pyramid time frame for data preprocessing, thus it reflects the change of users’ interest with the time. As a result, AntClass algorithm and the data stream filtered by pyramid time frame were combined to form the AntStream algorithm in this article. The experiment result shows that AntStream algorithm has improved not only the real-time responsiveness and also the accuracy to a greater extent.

    • Image Fusion Algorithm Based on the Nonsubsampled Contourlet Transform

      2010, 19(12):185-189.

      Abstract (2061) HTML (0) PDF 768.62 K (4505) Comment (0) Favorites

      Abstract:A new image fusion algorithm is proposed based on the nonsubsampled Contourlet transform (NSCT). After the NSCT of images, the adaptive regional energy as the regular for the low frequency subband coefficients, the high-frequency detail images in different levels are processed by different fusion rules. The absolute maximum based on detail coefficients as the regular for the high level high-frequency and the weighted regional strength ratio as the regular for the others levels high-frequency. The experimental results show that the presented algorithm obviously improves the visual quality and objective indexes.

    • Model of Agile Software Development Method Based on Online Detection Technology

      2010, 19(12):190-194.

      Abstract (1883) HTML (0) PDF 791.15 K (2922) Comment (0) Favorites

      Abstract:In consideration of control hysteresis which still consists in agile software development method, the paper using online detection and feedback control technology, sets three control objective functions and several test parameters and control parameters, establishes model of Agile software development method based on on-line detection and feedback control technology, researches on the relationship among control variables, measurable variables and control objective functions, radically removes control hysteresis and optimizes the Agile software development process.

    • Entropy Method for DNS Abnormal Detection

      2010, 19(12):195-198.

      Abstract (1985) HTML (0) PDF 680.20 K (3508) Comment (0) Favorites

      Abstract:This paper propose a method of detecting DNS abnormalities by calculating the entropies of the DNS query types observed in consecutive windows of fixed-size. Applied to the DNS query data targeting .CN on May 19th 2009 when there was a major DNS accident happened, this method demonstrates ability of detecting the abnormal behavior towards DNS before the event was observed and reported.

    • Model and Benefit Analysis on Database Integration for Application System of SG186 Business

      2010, 19(12):199-203.

      Abstract (1802) HTML (0) PDF 347.64 K (3575) Comment (0) Favorites

      Abstract:According to the status of database about application system of SG186 business in the Electric Power Company, Gansu province, we compared and analyzed three models of Oracle database integration in typical design, and analyzed key issues and technology in the process of database integrations. Then we proposed the optimization method on database integration of application system of SG186 business, and analyzed the economic benefit and social benefit after the database integration.

    • Improved Locking Protocol in Main Memory Database

      2010, 19(12):204-207.

      Abstract (1494) HTML (0) PDF 431.09 K (2974) Comment (0) Favorites

      Abstract:Locking protocols between transactions have long been an important field in database research. In a classic main memory database system, transactions tend to be short and small so that the system usually adopts some simple locking protocols like single-write-multiple-read. Transactions are executed in an almost serialized sequence. In a system of heavy transaction concurrencies but relatively small overlapping data sets between transactions, locking protocol could be improved by introducing coarse-grained intent share lock and lock granularity transformation in order to boost concurrencies between transactions, raise transaction throughput and improve overall system performance.

    • Framebuffer Driver Based on Embedded Linux

      2010, 19(12):208-211.

      Abstract (1446) HTML (0) PDF 458.38 K (4074) Comment (0) Favorites

      Abstract:This paper introduces the systematic structure of embedded Linux framebuffer device driver, and gives a detailed analysis of the key data structures and writing method. Through the example of Linux framebuffer device driver based on ARM9-CPU S3C2440, implementation principle and development process of Linux framebuffer device driver based on Platform bus in the Linux2.6.33 kernel is analyzed. Finally, it gives the general methods about the access to framebuffer device by user-space application.

    • Department of Automation, University of Science and Technology of China, Hefei 230027, China

      2010, 19(12):212-215.

      Abstract (1419) HTML (0) PDF 692.60 K (2933) Comment (0) Favorites

      Abstract:In this paper, a modified KCP algorithm is presented to replace single delay parameter by an aggregate function when we decide which path to choose, the aggregate function takes nodes’ and links’ comprehensive performance parameters such as the nodes’ delay, available resource and the links’ delay, bandwidth into consideration, besides, a new adjusting factor is proposed to give attention to both load-balancing and node-multiplexing. The simulation results verify the validity of this new algorithm in the service routing selection, it can also adjust the whole system to a well load-balancing and high node-multiplexing state at meanwhile.

    • Application of Anesthesia Monitoring by EEG Entropy Algorithm

      2010, 19(12):216-218.

      Abstract (1966) HTML (0) PDF 762.17 K (3608) Comment (0) Favorites

      Abstract:The monitoring of anesthetic depth is an absolutely necessary procedure in the process of surgical operation. Anesthesia can be reasonable so that in the absence of pain in patients with the conduct of surgical treatment, The right to judge and control the depth of anesthesia has become a clinical problem to be resolved urgently.In this paper, EEG Signal Analysis Based on the depth of anesthesia Detect Method. Adopting a new method of EEG entropy——EEG will be simulated and processed by the fast algorithm of sort entropy on the computer, Experimental results show that sort entropy has a shorter computing time, high efficiency, strong anti-interference, high precision computation.

    • Improved DDAGSVM Multi-Class Classification

      2010, 19(12):219-221.

      Abstract (1501) HTML (0) PDF 948.16 K (3207) Comment (0) Favorites

      Abstract:support vector machine is originally designed for binary classification. How to effectively extend it for multi-category classification is still an on-going research issue. This paper presents a general overview of existing representative methods for multi-category support vector machines. The processes of making decisions on the decision directed acyclic graph support vector machines were random. For this reason this paper inducts an internal-class degree of dispersion. An external-class separate measure is defined based on the distribution of the training samples to form the classes’ separating sequences. An improved algorithm having greater classification distance for decision directed acyclic graph support vector machines is proposed. The experimental results show that it has higher multi-class classification accuracy than the original decision directed acyclic graph multi-class support vector machines.

    • Arnold Inverse Transformation’s Normative Expression and Multi-Dimension Extend

      2010, 19(12):222-224.

      Abstract (1629) HTML (0) PDF 782.84 K (2676) Comment (0) Favorites

      Abstract:The periodicity of the Arnold transformation is widely used in image encryption aspect. This transformation is provided with normative expression, but its inverse transformation does not. In this paper, a new normative expression which enable all kinds of Arnold transformation and its inverse transformation formally unify is proposed, in good order and concise, and extend it on multidimensional space as well..

    • Energy-Efficient and Delay-Sensitive Data Gathering Protocol for Wireless Sensor Networks

      2010, 19(12):225-229.

      Abstract (1630) HTML (0) PDF 666.44 K (2705) Comment (0) Favorites

      Abstract:Using mobile sink to gather data is one of the comprehensive trends in wireless sensor networks. This paper proposes an energy-efficient and delay-sensitive data gathering protocol (EEDS)for wireless sensor networks. In EEDS, The mobile sink traverses in the entire network to upload the sensed data from agent nodes. In order to reduce the length of path which mobile sink traverses the network, the solution of TSP-like is proposed, which ensures mobile sink always choose the shortest path to walk through the network. Simulation results have demonstrated that the proposed data collection strategy has a significant advantage in extending the network life time and reducing data transmission delays.

    • Matching of Semantic Web Service Based on Context Constrains and Enhanced Sematic

      2010, 19(12):230-234.

      Abstract (1546) HTML (0) PDF 673.06 K (2236) Comment (0) Favorites

      Abstract:Aimed at lacking of considering the service context constraints and the deficiency of traditional reason matching whose result can’t tell the semantic difference between the same degree in current matching algorithm of semantic web service, a new matching approach of semantic web service with service context constraints based on the reasoning and the enhanced computation of semantic similarity was proposed. First, this method filtered out the irrelevant services by checking compatibility of the service context constraints, then reasoning is applied to get different rank services, on the basis of rank services, the computation of semantic similarity was carried out by ontology to get more semantic infomation , in this way, the precise matching degree of services was gained; Finally, the evaluation of gained services which satisfied with the user’s requirement was given. Compared to the traditional algorithm of OWL-S/UDDI, the experiment results showed that the approach could increase recall and precision ratio greatly.

    • Edge Detection Algorithm of Gray Scale Image Based on the Center of Gravity

      2010, 19(12):235-237.

      Abstract (1832) HTML (0) PDF 694.04 K (2761) Comment (0) Favorites

      Abstract:An algorithm of edge detection of gray scale image based on the center of gravity is introduced in this paper. The gray scale value of each pixel is seemed as the “quality” or the z coordinates of three-dimensional space in the gray scale image. Whether a pixel is a boundary point or not, is depending on the size of the offset of center of gravity in the center of the rectangular area. The algorithm has some noise immunity. It is compared to the canny operator of edge detection, the algorithm is tested better actually on the B-ultrasound image.

    • Transfer Learning Algorithm for Text Classification Based on Clustering

      2010, 19(12):238-241.

      Abstract (1874) HTML (0) PDF 695.78 K (3435) Comment (0) Favorites

      Abstract:Transfer learning can improve the performance of classifier effectively, when the training data are out of date, but the new data are very few. In this paper, we propose a transfer learning algorithm for text classification based on clustering. We describe the main idea and the step of the algorithm. Then have experiment on text corpus of Chinese, and compare the algorithm with transfer-unaware algorithm. The experiments demonstrate that this algorithm significantly outperforms the others.

    • Strain Gauge Image De-Noising Based on Fuzzy Morphology

      2010, 19(12):242-245.

      Abstract (1460) HTML (0) PDF 746.14 K (2231) Comment (0) Favorites

      Abstract:Suppressing the noise of strain gauge in acquisition and transmission is the key in identification and installation. For blurring the details while using the morphology to de-noise. This paper introduces a new algorithm for de-noise the strain gauge image by dividing the image and giving the fuzzy morphology operation, then open and close operation are applied to image to realize de-noise. The simulations in this paper prove that it can perfectly restrain noise and keep image details.

    • Study of Chameleon Clustering Algorithm and Implementation in Weka

      2010, 19(12):246-250.

      Abstract (1971) HTML (0) PDF 734.73 K (5183) Comment (0) Favorites

      Abstract:To overcome the Weka’s weakness in clustering algorithms, the clustering algorithm was developed based on the Weka open source environment. An introduction is made on the basic principle and construction steps of the Chameleon algorithm which was described concretely and embedded into Weka platform whose inner class and visualization function were exploited adequately. The newly built Weka system was tested by comparing the embedded and the already existed K-means algorithm. The result shows that Chameleon algorithm acquires better clustering effect.

    • Design of Embedded IPv6 Firewall Based on S3C2440

      2010, 19(12):251-254.

      Abstract (2006) HTML (0) PDF 345.08 K (2716) Comment (0) Favorites

      Abstract:With the continuous development of network applications, network security becomes increasingly important. Boundary firewall based on x86 architecture is expensive and difficult to protect each terminal equipment .It can not build comprehensive security network. So this paper designs an embedded IPv6 firewall based on S3C2440 processor to solve the problems. This paper also gives a solution which combines SPI ( Stateful Packet Inspection) and intelligent packet filtering into dynamic packet filtering mechanism. The solution optimizes packet filtering rule set by using intelligent access control technology. It also enhances the throughput of firewall and security.

    • Vibration Signal Acquisition System Based on DSP and ARM

      2010, 19(12):255-259.

      Abstract (1883) HTML (0) PDF 440.81 K (3363) Comment (0) Favorites

      Abstract:This paper introduces and designs a Vibration Signal Acquisition System that it is able to achieve adaptive gain control. This system uses digital signal processor (DSP) and embedded processor (ARM).The feature of this system is that it can automatically adjust the gain of amplifier, which makes the system has a wider adaptability. Besides, it uses SPI interface for communications and data transmission between the DSP and ARM, which achieves high-speed vibration data acquisition.

    • Research and Design of Windows CE Display Driver Based on DM6446

      2010, 19(12):260-264.

      Abstract (1464) HTML (0) PDF 416.63 K (3274) Comment (0) Favorites

      Abstract:As a Multi-media processing chip in possession of rich resource and powerful computing peripherals, DM6446 usually manages effectively the complex resource through an operating system. Since most multimedia applications require a graphical interface, the existing platform operating system is Linux whose kernel and graphical interface is separate, needing to transplant one.and as opposed to Linux, Windows CE itself comes with a GUI, just aquiring a GUI by the development of display driver simply. This paper describes the design and implementation of Windows CE display driver on DM6446.After the system's startup, graphical interface runs stablely, indicating that the driver is fine.

    • >Survey
    • A Survey of Network Management in Wireless Sensor Network

      2010, 19(12):265-270.

      Abstract (1730) HTML (0) PDF 326.22 K (4117) Comment (0) Favorites

      Abstract:As a new network paradigm, Wireless sensor networks (WSN) have promised us a new monitoring and controlling model. Owing to its Characteristics, Sensor networks pose unique challenges for network management that make traditional network management techniques impractical. Until now there still doesn’t emerge a considerable, common agreed network management solution for WSN. This article summarizes some of the current management system and framework, and presents the supporting of IPv6 and the ZigBee-Based wireless sensor network management.

    • Review of Multi-Target Tracking

      2010, 19(12):271-275.

      Abstract (2060) HTML (0) PDF 345.48 K (8512) Comment (0) Favorites

      Abstract:Multi-target tracking have a very wide range of applications in military and civilian. Data association is one of the difficulties in multi-target tracking based video. This paper summarized and compared the main multiple targets tracking technology commonly used at home and abroad, based on multi-feature fusion and adaptive template, sports information, 3D space, data association and multi-algorithm mixture. It also pointed out the improvement of the multi-target tracking algorithms.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063