• Volume 19,Issue 7,2010 Table of Contents
    Select All
    Display Type: |
    • Design and Implementation of Inter-Process Communication on Minix

      2010, 19(7):1-5.

      Abstract (1888) HTML (0) PDF 4.22 M (3917) Comment (0) Favorites

      Abstract:Inter-process communication (IPC), as one of the most important primitives in the operating system, provides the possibility of exchanging data with several different processes. This paper proposes a new design of the inter-process communication system. And this system is implemented on Minix operating system which lacks the support of IPC before. With the implementation, it eases the developers’ porting and developing useful programs based on this feature. It is extensible and efficient as seen from the experiment. The design of this inter-process communication system can be studied for other operating system.

    • Study and Design of Spam Call Control System

      2010, 19(7):6-9.

      Abstract (1706) HTML (0) PDF 4.41 M (3323) Comment (0) Favorites

      Abstract:The Spam Call Control System is a system to find out those spam calls and intercepts them. It is effective in reducing spam calls and making customers get better mobile services. This paper firstly proposes a net- work topology and an overall architecture of Spam Call Control System. Secondly, it focuses on designing the procedure of finding out and intercepting spam calls.

    • Video Moving Vehicle Detecting System Based on DM6446

      2010, 19(7):10-14.

      Abstract (2108) HTML (0) PDF 4.27 M (3148) Comment (0) Favorites

      Abstract:This paper gives a method of realizing a video moving vehicle detecting system based on DM6446 processor, and describes the system’s hardware architecture and software design ideas. The methods of ARM-side and DSP-side communication and double-buffer switch are given combining the characteristic of dual-core of DM6446 processor. Background modeling is made on the traffic video data from DM6446 via difference accumulation. Background subtraction is used to detect vehicle movement areas. With the adoption of other algorithms such as Otsu, morphological filtering and region growing, the system is finally completed on this hardware platform. Experimental results show that the system is good in moving vehicle detection.

    • Design of Image Acquisition System for Sucrose Crystallization Based on ARM9

      2010, 19(7):15-18.

      Abstract (2927) HTML (0) PDF 6.04 M (5395) Comment (0) Favorites

      Abstract:In process control theory, image processing is the core of industrial sugar crystallization. It lays a solid foundation for the later part of the modeling and optimization of image processing system. Using a visual sensing method, this design is based on S3C2440 embedded processor hardware platform and Windows CE 5.0 operating system image information acquisition system of sucrose. This paper introduces the design of image sensor interface and the Implementation Stream Interface Driver in detail. This design has a friendly man-machine interface, and has functions like real-time monitoring, camera, storage and others. The design reduces system complexity, saves space and reduces costs.

    • Design of Distributed Display and Control Simulation System for an Aircraft Based on C/S Structure

      2010, 19(7):19-22.

      Abstract (1802) HTML (0) PDF 4.18 M (3276) Comment (0) Favorites

      Abstract:For real-time simulation of the complicated display and control system of aircrafts in a simple and quick way,a design scheme of distributed display and control simulation system based on Client/Server structure is presented with its functional features. Through using C/S structure, the system is divided into one server and multi clients,between which communication interfaces are established. And multithreading technology is applied to the division of the system software into modularized threads, to improve the real-time performance of system. The simulation results show that both display rate and communication rate meet the real-timere quirements, which lays the foundation for the simulation of a more complex display and control system.

    • Design of Non-CoalMines MIS Based on Authentication and Electronic Signature

      2010, 19(7):23-27.

      Abstract (1627) HTML (0) PDF 4.34 M (2592) Comment (0) Favorites

      Abstract:This paper describes the importance of safety information in safe management of mines and compares traditional safety information management modes with modern ones. For all disadvantages of the traditional management modes, it designes a non-coal mines MIS based on authentication and electronic signature. The function of system, system platform, the DC role, the distribution of competences are designed. It also elaborates the design of system module-function in detail. The comprehensive use of authentication and electronic signature technology based on USB-Key effectively guarantees information’s integrity, reliability and security and prevents identity theft and operation denying. It has improved the efficiency of supervision and monitor accuracy, increased the strength and breadth of supervision, standardized business processes. The non-coal mines MIS is simple, efficient, safe and scientific.

    • Research and Design of E-Government Intelligent System Based on Administrative Service

      2010, 19(7):28-31.

      Abstract (1579) HTML (0) PDF 4.27 M (2518) Comment (0) Favorites

      Abstract:With the increasing amount of data in Administrative Service Center, how to handle these vast data has become a key issue. Thus, this paper introduces the Business Intelligence and its related technologies, taking the actual data in Administrative Service Center as background. It proposes the E-Government Intelligence System architecture, system framework, functional module, and explains in detail. Finally, it analyzes the process of building data warehouse.

    • Design and Development of Global Positioning and Navigation System for Mobile GIS

      2010, 19(7):32-36.

      Abstract (1591) HTML (0) PDF 4.40 M (3562) Comment (0) Favorites

      Abstract:This paper analyzes the key technologies of GPS-positioning and navigation system for Mobile GIS and designs the system based on Smart Client Architecture. Through the GPS Intermediate Driver and embedded development, it realizes the GPS-positioning and navigation on PDA.

    • An Improved Image Coding Algorithm Based on EZW and HVS

      2010, 19(7):37-41.

      Abstract (1687) HTML (0) PDF 4.17 M (2634) Comment (0) Favorites

      Abstract:This paper analyses the basic theory of the EZW algorithm, and proposes an improved EZW based on eight symbols instead of four symbols used in EZW. In this method, giving the definition of zero-tree structure anew does not only reduce the complexity of encoding and decoding, but also saves the storage space and improves compression ratio. In e-classifying the significant symbols, the edge information is considered. At the same time, the number of zero tree roots is geatly redued and compression ratio is improved. Experimentsal results show that the improved algorithm performs better than EZW in reconstructing image quality .

    • Shortest Path Smoothing Algorithm for the Real-Time VBR Video Based on Funnel

      2010, 19(7):42-46.

      Abstract (2431) HTML (0) PDF 4.19 M (3167) Comment (0) Favorites

      Abstract:To optimize online smoothing of real-time VBR video streaming, this paper proposes a SPSF(Shortest Path Smoothing based on Funnel) algorithm. In the SPSF, the real-time VBR video is piecewise processed by sliding window. Each video frame is read and cached into the window and the shortest path for the data transmission in the window is calculated based on funnel principle. When the window is filled with data, data start transmission according to the obtained shortest path. Window simultaneously slides according to the characteristics of the path to start smoothing and transmission of the next piece, and so complete the smooth transmission of the entire video. The experimental results show that compared with conventional online smoothing algorithm, SPSF has better bit-rate peak, valley, and variance. Compared with traditional shortest path algorithm, SPSF takes less time in computation of shortest path so as to be able to meet the real-time requirement.

    • Formal Verification and Improvement of an Authentication Protocol

      2010, 19(7):47-49.

      Abstract (1582) HTML (0) PDF 3.89 M (2611) Comment (0) Favorites

      Abstract:Password-based remote user authentication is a hotspot in authentication protocol research. The security of a proposed remote user authentication scheme, the Lee-Kim-Yoo protocol, advanced by Sung-Woon Lee is analyzed, which used nonce random and had very low computational costs. However, this scheme still has many security faults. The weakness of the scheme is demonstrated. This paper proposes an improved scheme, a novel nonce and hash-based remote user authentication scheme using smart cards and analyses the amended protocol with BAN logic. It indicates that the amended protocol can reach the goal of the protocol.

    • A DNS Redirect Protocol for Domain Name Errors

      2010, 19(7):50-53.

      Abstract (1922) HTML (0) PDF 4.19 M (2833) Comment (0) Favorites

      Abstract:Domain name system (DNS) redirect is expected to be the emerging functionality to perform a value added services for users by the Internet Service Providers (ISP) and the DNS Application Service Providers (ASP). This paper specifies the error description as the list of suggested domain names other than the original one, which are sorted by their relevance. Two handover processes for the redirected server is proposed, which can facilitate finding the suggested domain names both correctly and timely. Besides, the request handling algorithm is proposed using the prolonged resource records. The message structure of the redirect is defined to accommodate the redirect IP information in the DNS protocol.

    • Storage Management in OODB Based on ODMG Java Binding

      2010, 19(7):54-59.

      Abstract (1884) HTML (0) PDF 4.45 M (3127) Comment (0) Favorites

      Abstract:The paper studies the storage management for object-oriented database, and a new scheme based on the ODMG3.0 standard. is presented by Java binding. By studying the typical storage structure of persistent objects, it proposes a layered storage structure that takes into account the characteristics of diversified data type. Combining with the architecture here, it transforms a file structure based on Slotted-Page Structure, substituting storage unit from page to database file. After analyzing the introduced indexes for OODB, the paper presents a uniform indexing scheme, based on a B+-Tree and with both the inheritance and the aggregation hierarchy.

    • Video Moving Vehicle Detecting System Based on DM6446

      2010, 19(7):60-64.

      Abstract (1442) HTML (0) PDF 4.02 M (3232) Comment (0) Favorites

      Abstract:Generating three-dimensional landscape model is a hot topic in the field of GIS in recent years. It can convert aerial survey data into three-dimensional visual maps, which can show the terrain of the routevividly, and have broad application prospects. In this paper, basic spatial data that three-dimensional landscape modeling needed are obtained by the microstation software and ImageStation SSK based on aerial image, and the data are analysed and processed. The collected data are optimized so that the errors can be found and revised. Existing buildings in the city are modeled by using the IMAGIS 3D geographic information system software, and the application of real photos veneer them made the results closer to the reality. Finally the three-dimensional urban landscape maps are generated, and AVI video is created with 3Dbrows .

    • A Protocol Based on Password Resilient to Devices Capture

      2010, 19(7):65-68.

      Abstract (1522) HTML (0) PDF 4.01 M (2664) Comment (0) Favorites

      Abstract:The cryptographic algorithm is public in modern cryptography. The security of user’s file relies on the protection of the user’s private key. Common practice of protecting private key is to encrypt it with a password and store it in the user’s device. However, the private key is vulnerable to offline dictionary attack when the device is captured by an adversary. In this paper, we analyze the S-RSA protocol and propose an SS-RSA protocol which can resolve the problem of S-RSA that can’t resist the DOS attack and can’t get back the user’s private key after the user cancels the ticket.

    • Adaptive Test Process Based on Extension of Knowledge Space Theory

      2010, 19(7):69-73.

      Abstract (1604) HTML (0) PDF 4.00 M (3374) Comment (0) Favorites

      Abstract:Skill test was proposed in the extension of Knowledge Space Theory, but it gave nothing about the process of skill test. This paper defines question function, skill function, skill state function, and completes the mapping of knowledge structure onto skill structure. It also proposes a concrete process of skill adaptive test and gets the skill level of the testees. Furthermore, it introduces neighbor and boundary of knowledge state and optimizes a key process about selecting strategy in adaptive test, which helps tests to adapt to testees in knowledge.

    • A Stack-Allocation Based JVM Garbage Collection Algorithm

      2010, 19(7):74-78.

      Abstract (1454) HTML (0) PDF 4.04 M (2991) Comment (0) Favorites

      Abstract:In order to reduce the cost of java virtual machine garbage collector, we propose a stack-allocation based garbage collection algorithm. We improve the stack frame and make it support object storage, analyse and identify stack-allocation object when compiling the java source code, and mark the object with new byte command. Stack-allocation object will be allocated from java stack and released immediately when leaving its scope. Other object will be allocated from heap and released by garbage collector. Experimental results show that, compared with traditional garbage collector, the new algorithm improves the performance of allocating and releasing, reduces the burden of garbage collector and runs faster.

    • Fine-Grained Privilege Management Model and Its Application in B/S Application System

      2010, 19(7):79-82.

      Abstract (1561) HTML (0) PDF 4.04 M (4846) Comment (0) Favorites

      Abstract:To meet the actual demand of oil network information system in B/S model, and to improve dynamics of users’ authority management and security of authorized access, this paper presents a fine-grained privilege management model combining the role-based access control principle for the fact that users are complicated and they change jobs frequently in B/S application system. This model decomposes the access privilege of sources by fine-grained, and realizes access control of different levels from coarse-grained to fine-grained, and this model cannot only authorize the role but also authorize the user directly, which greatly improves the flexibility and scalability.

    • Application of Balanced Scorecard to Major S&T Program Performance Evaluation

      2010, 19(7):83-86.

      Abstract (1834) HTML (0) PDF 4.51 M (2134) Comment (0) Favorites

      Abstract:The evaluation of major S&T program is of significance for implementing the national S&T plans. However, with the complexity of major S&T program, the evaluation would be faced with a lot of problems. This paper structures and perfects evaluation index system based on balanced scorecard, and explains the relationship of evaluation index briefly. Then, the evaluation index carries out factor analysis with primary component analysis method. Thus, the primary components are obtained. Subsequently, the evaluation model is constructed via GA-BP neural network. Finally, taking provincial S&T program of Tianjin city as the case, the paper proves that the model is not only scientific but also practical.

    • Categorization Algorithms Based on M-SVMs—DDAG

      2010, 19(7):87-90.

      Abstract (1467) HTML (0) PDF 3.47 M (3543) Comment (0) Favorites

      Abstract:With the development of SVM,its application has been extended from binary class classification problem to multi-class classification problems. Its concepts and algorithms become various and different. The main study in this paper is DDAG, which is one of the popular algorithms, whose principle is combining the binary class classifiers with multi-class classifiers. This paper also points out the strengths and weaknesses of DDAG, when it is used in multi-class SVM text classification, and presents an improved algorithmic concept to make up for the weaknesses.

    • A Disk Energy Saving of Perfecting Algorithms in Linux

      2010, 19(7):91-94.

      Abstract (1670) HTML (0) PDF 3.98 M (2951) Comment (0) Favorites

      Abstract:Data prefeching is used to improve system performance and thuoughput, which ignores the disk energy comsumption. As for this problem,a delaying asynchronism prefeching, clusting disk I/O handle way is proposed based on tradition prefeching to reduce the disk state switching and extend the length of disk idle phases for saving power. We also validate and evaluate this algorithm based on the really running simulator. Our simulations show that compared to stand prefeching with negligible loss performance, our algorithm saves 17% more disk energy.

    • Design of an Encryption Method of Telemetry Data in UAV System

      2010, 19(7):95-97.

      Abstract (1729) HTML (0) PDF 407.05 K (2683) Comment (0) Favorites

      Abstract:Considering the structure characteristic of telemetry data frames of UAV wireless communication and the requirements of real time and high quality, this paper presents an encryption method based on self- synchronizing stream cipher. This encryption method is not only higly secure,but can also be easily realized with few error-spreading and no message-spreading. The realization of FPGA shows that the design of the scheme has higher feasibility and trustiness.

    • Optimization Combination Genetic Algorithm Based on Two New Operators

      2010, 19(7):98-102.

      Abstract (2175) HTML (0) PDF 554.31 K (2981) Comment (0) Favorites

      Abstract:In order to resolve the contradiction between global searching and local searching of genetic algorithm, matrix genetic operator and Boolean genetic operator are proposed based on binary code describing search space fine and calculating fitness easier. Global searching of genetic algorithm is improved by the matrix genetic operator making good use of colony information to find new space, while local searching of genetic algorithm is improved by the Boolean genetic operator making good use of chromosome information. An optimization combination genetic algorithm is constructed through combining the two new genetic operators. It does not require parameters of crossover probability and mutation probability, which are important to general genetic algorithm. The constructed genetic algorithm is proved to be convergent, and its better searching efficiency is shown by experiments results. It is a significant reference for other optimum problem resolved by genetic algorithm based on binary coding.

    • License Plate Location in Complex Vehicle Images

      2010, 19(7):103-106.

      Abstract (1476) HTML (0) PDF 4.08 M (2996) Comment (0) Favorites

      Abstract:An edge detection and color segmentation-based algorithm to locate the plate region is proposed for complex vehicle images, which makes use of high frequency characteristics and the background color of the plate. The algorithm can quickly find the accurate position of license plate from the whole vehicle picture with all kinds of interference factors. Experimental results show that the method is accurate and robust.

    • Research and Design of a Data Persistence Model Based on DAO Pattern

      2010, 19(7):107-110.

      Abstract (1515) HTML (0) PDF 311.46 K (2905) Comment (0) Favorites

      Abstract:Designing a software to connect an object-oriented business system with a relational database is a tedious task. This article proposes a data persistence model based on DAO Pattern. It completely makes the access to underlying data independently encapsulated, and makes object model and relational database independent of each other by Variable Mechanism. In addition, the data accessing efficiency is greatly improved through the buffering mechanism.

    • Concept Extraction in Tea Ontology Learning

      2010, 19(7):111-114.

      Abstract (1503) HTML (0) PDF 606.52 K (3483) Comment (0) Favorites

      Abstract:A concept extraction method is presented based on tea dictionary and statistics. The method takes tea dictionary as basis. Firstly, unstructured data source is in Chinese word segment processing, and then, two statistics algorithms are applied to extracted tea concept from Chinese segment results. The approach improves the precision and efficiency of Chinese segment and concept extraction by reducing the time complexity of statistical algorithms with the rich tea dictionary. The experimental results show that the degree of dictionary richness determines the efficiency of tea concept extraction, and can be improved by updating tea dictionary.

    • Production Rule-Based Decision Expert System

      2010, 19(7):115-118.

      Abstract (1589) HTML (0) PDF 4.10 M (2570) Comment (0) Favorites

      Abstract:The production rule-based decision expert system takes drilling oil well as an example. It adopts the methods of production knowledge presentation based on the data of drilling oil well. It stores the experience and knowledge of experts into knowledge base, gives reasonable proposal through efficient reasoning and then improves the efficiency of the project.

    • Design and Implementation of Embedded Image Detection System for Liquid Reagents Based on Color Character

      2010, 19(7):119-121.

      Abstract (1448) HTML (0) PDF 4.20 M (2662) Comment (0) Favorites

      Abstract:An embedded image detection system for liquid reagents based on color character is designed and implemented. System fitting the concentration of liquid reagents by color characters includs detection image. The core hardware of system is embedded microprocessor, and CCD camera is used to acquire detection image. The design of image acquisition function and color image processing algorithms is important to the system. The experiment of content detection for DNA shows the feasibility of system.

    • Research and Implementation on the Embedded Data Acquisition System Based on the Ethernet

      2010, 19(7):122-125.

      Abstract (1518) HTML (0) PDF 4.23 M (2727) Comment (0) Favorites

      Abstract:In this paper, a data acquisition and transmission system based on the Ethernet technology has been proposed. It adopts the single-chip solution, exchanges information between the Ethernet and other channels, and implements a variety of measures to improve system stability. Its parameters are configurated by a configuration software running on the computer through TCP connection. The system has the advantages of low cost, high reliability, easy to use and so on.

    • A Solution of Data and Program Management Based on WMI in Windows

      2010, 19(7):126-129.

      Abstract (1538) HTML (0) PDF 4.17 M (3006) Comment (0) Favorites

      Abstract:A solution based on WMI is introduced to solve the problem of data and program management in Windows system. Based on the research work of WMI’s structure, functions and application methods, we summarize the specific WMI methods for data management, program management and applications integration. This solution is simple, clear, and powerful and can be used by plenty of interfaces. A successful use of this solution in an enterprise project is also introduced.

    • Design and Implementation of the Real-Time Data Dump Gateway for Serial Communication

      2010, 19(7):130-134.

      Abstract (1589) HTML (0) PDF 4.38 M (2019) Comment (0) Favorites

      Abstract:To address the disunity proplem of sheugang communication protocol when SCADA processes data frames from serial communication in the engineering of SCADA , a real-time data gateway developed with VC++ is proposed to complete the analysis of communication protocol and data dump.

    • Design and Implementation of UMXGIS

      2010, 19(7):135-139.

      Abstract (1538) HTML (0) PDF 4.46 M (2617) Comment (0) Favorites

      Abstract:WebGIS develops along with the web applications. The traditional model of the independence between server-side services and desktop-side services cannot meet the modern needs. Therefore, this paper proposes 2N model based on Web Services. It makes data exchange more easily between the server and the client. Through the selection, integration, optimization of related technologies, an UMXGIS system is designed and implemented based on the 2N model.

    • Vending-Machine Communication Based on Dex/Ucs

      2010, 19(7):140-143.

      Abstract (2127) HTML (0) PDF 4.30 M (5109) Comment (0) Favorites

      Abstract:The paper introduces the communication system of vending machine based on Dex/Ucs and how to realize communication and data acquisition between terminal and vending machines on Platform Vb6 + Borland according to feature and communication theory of Dex. The core of the system is communication between terminal and vending machine which is realized via three-way handshake of Dex session layer. The format of data during transmitting is also based on Dex session layer Protocol. Implementation platform of the system is Vb6+C module which is a perfect combination of advantages of the two.

    • Design of Vending Machine Monitor System Following EVA-DTS

      2010, 19(7):144-147.

      Abstract (1803) HTML (0) PDF 4.22 M (4658) Comment (0) Favorites

      Abstract:At present, the data transfer protocol of vending machine monitor system in our country is not unified. There is no compatibility in these management platforms developed by different vending machine factories. To tackle this problem, a vending machine monitor system based on EVA-DTS(European Vending Association Data Transfer Standard) and GPRS(General Packer Radio Service) is researched and designed. This paper completes the network construction between vending machines and data center by the use of GPRS,builds the data format of information by the use of EVA-DTS,and finally works out the monitor system which is real time and safe. The system ensures the steady communications between vending manchines and data center. It is easy to help managers run the machines and good in its compatibility. It can handle any vending machine which obeys the EVA-DTS.

    • Implementation of Remote Meter Reading System Concentrator Based on Embedded Linux

      2010, 19(7):148-152.

      Abstract (1602) HTML (0) PDF 4.64 M (3027) Comment (0) Favorites

      Abstract:This paper firstly introduces the background and current situation of Remote Meter Reading Systems, and points out their merits and shortcomings. Then, a design and implementation of a Remote Meter Reading System’s concentrator based on embedded Linux is illustrated in detail according to the author’s development experience in this field. This paper contains the architecture of the whole Remote Meter Reading System, the structure of the concentrator and its software design method.

    • Design and Implementation of Intelligent Roaming Algorithms Based on New Virtual Scene Model

      2010, 19(7):153-157.

      Abstract (1493) HTML (0) PDF 4.46 M (2692) Comment (0) Favorites

      Abstract:Based on the analysis of the relevant intelligent prediction algorithm, it is found that existing algorithms don’t consider the potential relevance of the relationship among the virtual scene node, and they reduce the prediction accuracy of the algorithm. To tackle this problem, based on a new cube virtual scene model,an intelligent roaming algorithm is proposed. The algorithm establishes complete BiTree structure for each node, uses the potential association between the nodes to predict the object which may be operated next, protracts the predicted object in advance and then transfers it into the memory. This algorithm effectively compensates for the shortcomings of the related algorithm, thereby imptoves the efficiency and real time of roaming virtual scene. The algorithm is highy accurate.

    • A Video Retrieval System Framework Based on SVM

      2010, 19(7):158-161.

      Abstract (1562) HTML (0) PDF 469.32 K (3488) Comment (0) Favorites

      Abstract:Transformation from feature to semantic info is the important step of Video Retrieval. Based on the improved SVM procedure for Video Retrieval according to relevance feedback, reranking and BOOST, this paper proposes a framework. Using the data of TREC2007, the experimental result shows the framework has sufficient improvement in AP and MAP.

    • Method and Realization of Accessing Large Object in Database Based on OCCI-Technology

      2010, 19(7):162-165.

      Abstract (1597) HTML (0) PDF 252.72 K (5476) Comment (0) Favorites

      Abstract:In the development of database application, it is a technologic difficulty to access large object (LOB) data quickly and efficiently. In this paper, a simple and easy method for storing and getting large object data in Oracle database based on OCCI is presented. The process of implementing in technology is also expatiated by some examples. The codes have been debugged and provided under Visual C++ 6.0 environment.

    • Implementation of Information Acquisition Solution Based on Windows Script

      2010, 19(7):166-170.

      Abstract (1438) HTML (0) PDF 348.90 K (4579) Comment (0) Favorites

      Abstract:This paper introduces a database-supported information acquisition application and its implementation using Windows Script programming. It proves the strong functionalities the database-supported Windows Script application could provide in web development environment. This technique could also facilitate daily maintenance for systems and increase working productivity.

    • Ant Colony Algorithm Based on Entropy for Customer Segmentation

      2010, 19(7):171-174.

      Abstract (1594) HTML (0) PDF 481.82 K (3540) Comment (0) Favorites

      Abstract:The ant-based clustering algorithm needs to set several parameters and cluster for a long time.The ant- based clustering algorithm based on entropy, which uses entropy to amend the ants picking and dropping rules, can reduce the number of parameters and shorten the time of clustering. This paper intends to apply it to the customer segmentation, and compares the segmentation results with the traditional ant-based clustering algorithm. The experiment shows that the ant-based clustering algorithm based on entropy can accelerate customer segmentation.

    • Application of TRBAC Model to Office Automation

      2010, 19(7):175-178.

      Abstract (1551) HTML (0) PDF 290.23 K (3138) Comment (0) Favorites

      Abstract:Growing attention has been paid to access control in information system, especially the access control of resource access requires in office automation area. However, traditional role-based access control model and task-based access control model cannot satisfy the workflow changeable requirements. To solve these problems, the task-role-based access control mode is introduced, which can satisfy the requirements of authority managements from business fields related to office automation. At the end of the paper, combined with the practical development of office automation system, the detailed implementation instance of task-role-based access control mode is provided.

    • Workshop Manufacturing Process Information System Based on UML

      2010, 19(7):179-182.

      Abstract (1646) HTML (0) PDF 271.68 K (2953) Comment (0) Favorites

      Abstract:Workshop Manufacturing Process Information System is the information platform for supporting the operation of workshop manufacturing process. It is the information bridge between manufacturing enterprise’s management decision-making and equipment executive. And it also has functions for workshop production information management. This paper uses object-oriented analysis and design method. And after analying the business processes of workshop manufacturing process information system, the conceptual model, case model, dynamic model and physical model are built by using UML modeling tool.

    • An Improved Information Fusion Technique in Wireless Sensors Network

      2010, 19(7):183-185.

      Abstract (1604) HTML (0) PDF 3.80 M (2664) Comment (0) Favorites

      Abstract:In view of the security threats in the coal mine environmental monitoring system, this paper proposes a method for distributed hierarchical information fusion based on improved Kalman filter and SVM. The sensors in the system are divided into source nodes and sink nodes. In the source, the Kalman filtering are used, and in the sink SVM is used. The algorithm can reduce the energy consumption and data collision. Simulation result verifies the reliability of this algorithm, and it improves the fusioning precision of the wireless sensor network .

    • A New Approach of Enclosure Test for Ancestor Parcel

      2010, 19(7):186-192.

      Abstract (2105) HTML (0) PDF 520.68 K (2923) Comment (0) Favorites

      Abstract:A number of digital cadastral maps that act as the GIS data sources are based on the AutoCAD platform. Different from GIS data, they do not pay much attention to closure property, topological property and other issues. The closure property test of ancestor parcel is an important component of the conversation of CAD data and of Standardization GIS data and that of Vector Data before cadastral data populated the database. In this paper, the ancestor parcel closure property test is conducted from the technological and theoretical base and the reason is investigated why the ancestor parcel is not closed. It also discusses the flow of testing ancestor parcel closure property, and introdnces a new method by using the technology of AutoCAD ActiveX. The second development is made under AutoCAD 2005, and the ancestor parcel test and the human-computer interaction revision are illuminated. And the problem of results output and ancestor data entering under AutoCAD is addressed. The discussion and research on ancestor parcel test has practical significance for GIS data standardization, and can accelerate cadastre information system construction.

    • A New Way of Extracting the Topic Information in Web Pages Based on DIV Tag-tree

      2010, 19(7):193-196.

      Abstract (1568) HTML (0) PDF 4.20 M (3252) Comment (0) Favorites

      Abstract:Since CSS+DIV Topological Mode has become the major trend of the structural layout of web pages, the efficient extraction of the topic information in these web pages has become one of the urgent tasks for all professional surfing engines. This paper puts forward a new way of extracting the topic information in web pages based on the DIV tag-tree. It divides HTML files into DIV-forest with the help of DIV-tag. Then it filters the noise nodes in DIV tag-trees and sets up STU-DIV model-trees. Finally, it crops the DIV tag-trees irrelevant to the topic information by Topic Corelation Analysis and Cut-Tree Algorithm. It proves that this method can efficiently extract the topic information in web pages by analyzing several news web pages .

    • Realization of Colors Gradient in Simulating Section Dyed Yarn

      2010, 19(7):197-200.

      Abstract (1937) HTML (0) PDF 5.59 M (2951) Comment (0) Favorites

      Abstract:In simulating section dyed yarn, how to achieve the transition between two colors is the core. In this paper, we finish it by using the linear interpolation and the cubic spline interpolation in numerical analysis to establish the basic color gradient model. Then, taking the 2 colors and 3 colors-sections dyed yarns for example, we combine the existing yarn model with the color gradient model in the paper, in the way of texture synthesis to achieve the simulation of section dyed Yarn. At last, based on the specific process parameters in dyeing process, we optimize the established model to make it more practical and more widely.

    • User-Attribute Based Search Algorithm

      2010, 19(7):201-203.

      Abstract (1436) HTML (0) PDF 256.95 K (2760) Comment (0) Favorites

      Abstract:How to improve the accuracy of the search algorithm is important for its search algorithm improvement. This paper researches an algorithm based on the user’s model. First, it defines a group of Search-Models.Each Search-Model contains a User-Model and an information resequence tactic. When the user does a searching, Vector Space Model will be used to choose an optimal Search-Model, and then uses the information resequence tactic defined in the Search-Model to resequence the information found by user’s input. Finall, it sends the information to the user making user attribute as the premise to filter and re-sequence the information. It provides accurate search service according to the user’s specific conditions. Results show that the algorithm can improve the accuracy with an acceptable time consumption.

    • A Seed Point-Growth Algorithm of Image Edge Detection Based on SUSAN

      2010, 19(7):204-206.

      Abstract (1858) HTML (0) PDF 356.83 K (2819) Comment (0) Favorites

      Abstract:Corner is a special edge point, which is the important geometrical features of digital image. This article uses the characteristic that edge is continual and proposes the algorithm based on the growth of the seed point SUSAN edge detection. It obtains the images of the corner points by using the Susan algorithm, and then gets the corner points as seed points, carries on the growth according to the criteria to determine the edge points. The paper realizes the edge detection finally. The experimental results based on this method was proved to be feasible.

    • Fast Algorithm of Affinity Propagation Clustering under Given Number of Clusters

      2010, 19(7):207-209.

      Abstract (1604) HTML (0) PDF 1.08 M (4358) Comment (0) Favorites

      Abstract:To enhance the low efficiency of producing the clustering result with given number of clusters by Affinity propagation clustering (AP), the fast multi-grid searching method is proposed. The proposed method uses multi-grid searching to reduce the calling times of AP, and improves the upper bound of preference parameter to reduce the searching scope, so that it can largely enhance the speed performance of AP under given number of clusters. The experimental results show that the proposed method is very effective and reduces the running time by 22%-90%, compared with the existing method.

    • A Face Region Detection Approach

      2010, 19(7):210-212.

      Abstract (1301) HTML (0) PDF 4.10 M (2461) Comment (0) Favorites

      Abstract:This paper first defines the average slope of curve and makes use of it together with the curved projection to find out the left and right boundaries of human face in the picture. It then finds out the upper and lower boundaries in accordance with other characteristics such as the colour of hair or skin, or the characteristics of eyes. It finally detects the whole human face region in the picture.

    • Flash Data Reading Function Based on Windows Mobile Smartphone

      2010, 19(7):213-216.

      Abstract (2008) HTML (0) PDF 457.49 K (3632) Comment (0) Favorites

      Abstract:This paper explains how to read data from OneNand Flash bypass the file system in Windows Mobile 5.0 smartphone. Firstly, the characteristics of OneNand Flash and Windows Mobile 5.0 operation system are briefly introduced. Then, the paper elaborates the method of reading data from OneNand Flash with blocks and transmiting the data to PC. At last, with the instance of developing a GHOST sorftwore on Windows Mobile system, this paper explains the method in detail and shows part of the key source code.

    • Skill Operation Paper of Skill Points Combination Distribution

      2010, 19(7):217-220.

      Abstract (1460) HTML (0) PDF 4.36 M (2471) Comment (0) Favorites

      Abstract:According to characteristics of the Skill operation paper, this paper proposes to build constraint mode around the skill point. It achieves the skills item bank automated test paper using the combination of the distribution. It designs skill point matrix constraint model. It discusses three key components: parameter validation optimization, the program generates combinations of skill points and becoming the skills test paper. The example indicates the this method can achieve the skills item bank to satisfy the skills points test paper. The method is simple, highly efficient and of excellent quality. It is very suitable for application of the Skill operation paper.

    • Image Retrieval Based on Improved Texture Spectrum Descriptor

      2010, 19(7):221-223.

      Abstract (1796) HTML (0) PDF 520.24 K (3206) Comment (0) Favorites

      Abstract:A new texture description method of an image is proposed in the paper. Firstly, a binary image which reflects the image’s low frequency is defined by comparing the image’s gray mean with the region’s. Then, the statistic features are extracted based on the co-occurence matrix of the binary image. Finally, the new texture feature and the traditional texture spectrum are used as an index. The experimental results show that the new method is efficient and it provides noticeable improvement to the performance of texture spectrum descriptors.

    • Distributed Search Engine Using Hadoop

      2010, 19(7):224-228.

      Abstract (1514) HTML (0) PDF 596.85 K (4833) Comment (0) Favorites

      Abstract:Initially, the architecture of Hadoop is analyzed, and an improved PageRank algorithm is proposed. Then, we design system modules using Map/Reduce. The implementation presents that the distributed search engine using Hadoop is good in its performance, reliability and scalability.

    • Research and Implementation of Uigur-Chinese Dictionary Based on J2ME

      2010, 19(7):229-231.

      Abstract (2126) HTML (0) PDF 286.43 K (2945) Comment (0) Favorites

      Abstract:This paper Researches and implements the Uigur-Chinese electronical dictionary with J2ME technology on the WTK platform. It analyzes and designs structure of word file and well UI on the electronical dictionary, implements the rapid search word with Binary Search Method. In this paper Uigur word can be input with cellophane keyboard and touch screen.

    • JMX-Based Software Auto Testing Model

      2010, 19(7):232-235.

      Abstract (1467) HTML (0) PDF 333.01 K (3056) Comment (0) Favorites

      Abstract:This paper makes an introduction to requirement of software auto testing system and JMX network management architecture. It proposes an approach to build software auto testing system with JMX framework. In the end, the advantages of JMX-based software auto testing model are pointed out.

    • Research and Design of OPC Data Access Server Based on .NET Framework

      2010, 19(7):236-239.

      Abstract (1607) HTML (0) PDF 326.24 K (3619) Comment (0) Favorites

      Abstract:This paper introduces the OPC technology in connection with the need for rapid development of OPC, and studies the similarities and differences between the .NET Framework and the COM. It demonstrates a .NET Framework-based framework design for developing out-of-process OPC Data Access server, introduces the realization approach and key technologies and the practical application of case, which can be used as reference for OPC development.

    • Design of Intelligence Home Wireless Transmission System Based on Qt / Embedded of Touch Screen

      2010, 19(7):240-243.

      Abstract (1773) HTML (0) PDF 361.12 K (4763) Comment (0) Favorites

      Abstract:This paper designs the intelligence home control platform based on Qt/Embedded of touch screen, realizing the intelligence control of home by way of zigbee networking. Interface designer of intelligence home uses Qt/Embedded. At the same time, interface will be transplanted to the control platform for microprocessor of ARM9, and achieve the touch-screen features of interface. Finally, the paper connects the interface of a touch-screen features with zigbee networking through the serial port driver, to realize wireless transmission about the intelligence home.

    • >Survey
    • A Survey on Network Measurement and Analysis

      2010, 19(7):244-249.

      Abstract (2402) HTML (0) PDF 435.01 K (6911) Comment (0) Favorites

      Abstract:Network measurement and analysis provides vital means for people to know, understand and better utilize the internet. Also it offers the scientific basis for scientific management, effective control and development and utilization of internet. In this paper, the chief research of the network measurement and analysis and its research situation in the world are introduced. And the key techniques are also explored. Commonly used measurement and analysis tools are presented. Lastly, the application examples of the measurement of Global Ring Network for Advanced Applications Development (GLORIAD) are given.

    • ERP Application in Project Manufacturing Enterprise

      2010, 19(7):250-254.

      Abstract (1634) HTML (0) PDF 1.70 M (3629) Comment (0) Favorites

      Abstract:Project Manufacturing has both project features and the nature of manufacturing, and these two aspects decide that the business of project manufacturing enterprise is different from others. Especially in a complex products structure and mass production environments, the business has great impact on ERP system. Currently,the functions of ERP software have many shortcomings in satisfying the project manufacturing requirement, so it has to be customized in ERP implementation process, which caused a large number of duplication work in enterprise ERP projects. This article first goes through a typical project manufacturing companies to find out business problems, and next analyzes the special business requirement of project manufacturing. Finally, it matches one of the most advanced ERP software, Oracle EBS with the business requirements, finding out the shortcomings of ERP in supporting project manufacturing business and providing some reference to continuous improvement of ERP.

    • Hidden Markov Model and Its latest Application and Progress

      2010, 19(7):255-259.

      Abstract (2799) HTML (0) PDF 497.83 K (10008) Comment (0) Favorites

      Abstract:Hidden Markov Model (HMM) is an important probabilistic model of sequential data processing and statistical study. It has already been successfully applied in many projects in practice. Firstly, this paper introduces the basic principles of the Hidden Markov Model, and then gives a review to its latest application in the human activity analysis, network security and information extraction. Finally it summarizes the theory and latest progress of the recently proposed infinite Hidden Markov Model (iHMM).

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063