• Volume 21,Issue 11,2012 Table of Contents
    Select All
    Display Type: |
    • >系统建设
    • Construction of User Interest Model in Personalized Search Engine

      2012, 21(11):1-6.

      Abstract (1544) HTML (0) PDF 504.55 K (3848) Comment (0) Favorites

      Abstract:This paper presents a way to construct user interest model in personalized search engine. The user interest model takes the registrated interest and user browse behavior into consideration. It consists of long-term and short-term which is stored in user interest tree. Forgetting mechanism is provided to timely refresh user interest. Simulated experiments verify the user interest model proposed in this paper is effective and competitive.

    • Fuzzy Evaluation in the Comprehensive Review of the Information Systems Security

      2012, 21(11):7-10,160.

      Abstract (1745) HTML (0) PDF 1.00 M (2549) Comment (0) Favorites

      Abstract:With the rapid development of Chinese information technology, information security becomes more and more important, the information level of security protection, risk assessment and security check as an important means of information security in China. Through the accumulation of years of information security evaluation experience, we combined with the risk assessment of the financial industry and the State Administration of Taxation of the national network system, grade protection evaluation and security check of three integrated work experience presented in the triple integration of information systems Information Security Information Security Evaluation, which operability and guidance based on fuzzy comprehensive evaluation methodology. Then we get fuzzy evaluation information security model.

    • Intelligent Plan Model in the System of Emergency Command

      2012, 21(11):11-14.

      Abstract (1703) HTML (0) PDF 859.45 K (3640) Comment (0) Favorites

      Abstract:The emergency plan in the process of implementing cannot effectively carry out. To solve this problem, this paper puts forwards a model of intelligent emergency plan which is the core part of emergency command platform. The main function includes plan model established, tasks config, resources config, Implementation plan generated, implementation plan dispatched and so on. Through this kind of thought called Model- Instantiation, it can improve the response speed of the plan, which will form the dynamic executive plan by extracting model from text plans. In the process of emergency command, the system will execute the structured data from plan model, which realizes intelligent emergency plan. This paper mainly describes the principle and functions of this model and how to apply for the emergency command with the model plan. At last, the article recommends the main technical characteristics and expansibility of the system of emergency plan.

    • Framework Design of MRO Oriented Manufacturing Service Industry Support System

      2012, 21(11):15-18.

      Abstract (1473) HTML (0) PDF 605.48 K (2290) Comment (0) Favorites

      Abstract:The information system can’t communicate well and heterogeneous problem of areas knowledge expression in semantic and grammar of large manufacturing services enterprise have been researched. This paper discusses the features of system should be built, analysis of defects of the current enterprise application integration. Based on this, by divide the A enterprise equipments knowledge into data layer, basic model layer, static knowledge layer, danamic knowledge layer, knowledge expression layer, realize the knowledge management level planning. It instroduces the ontology model construction in detail. At last, it establishes a SOA and semantic Web service based system architecture framework. It focuses on the SOA hierarchical structure diagram and the large manufacturing enterprise service management system framework, and describes the main module.

    • Campus Information Services System Based on Mobile Application

      2012, 21(11):19-23,33.

      Abstract (1443) HTML (0) PDF 1.07 M (2639) Comment (0) Favorites

      Abstract:In order to make teachers and students enjoy more timely campus information service on the web, this paper proposed a campus information services system based on mobile application, as a supplementary of web-based campus information service system. Meanwhile, communication protocol based on XMPP is designed and relevant information is captured by the server. Finally, the Android platform-based simulation obviously shows some feasibility and effectiveness of this campus information service mode.

    • Class “Cloud Services” Visual Information Publishing System

      2012, 21(11):24-28.

      Abstract (1457) HTML (0) PDF 802.78 K (2326) Comment (0) Favorites

      Abstract:To target the publishing needs some workshop information, on the basis of KAIMU process information systems, combined with the SOA architecture, WebService, cloud services and 3D models of lightweight processing technology, classes that implement the cross-application system based on user permissions agent “cloud services” integrated framework structure workshop of Visual information publishing system of hybrid architecture. Application indicates that, based on hybrid integrated structure, the application proxy technology, better solved two architecture application heterogeneous integration and complementary issues.

    • Building Cluster of Proxy Based on LVS and Squid

      2012, 21(11):29-33.

      Abstract (1478) HTML (0) PDF 532.33 K (3725) Comment (0) Favorites

      Abstract:LVS is an excellent open source software for cluster and IP Load balancing. Squid is also the most popular system for proxy service. This paper discusses how to set up efficient and reliable system based on LVS and Squid.

    • Multi-point Flow Information System Based on WSN

      2012, 21(11):34-37,75.

      Abstract (1562) HTML (0) PDF 954.33 K (2547) Comment (0) Favorites

      Abstract:Aim at the two major problems of current object flow information collection which can not take multi-point monitoring and distinguish object type, this paper designs a system of object flow information collection based on WSN. The system is composed of the monitor nodes, the base depot node and the superior machine. The monitoring nodes send the monitored data to the base depot node through a chain topology structure. And then the data are sent to the superior machine. The superior machine will take traffic statistics and data analysis according to the data. This system can realizes multi-point monitoring and distinguishing object type with no any auxiliary labeling. It has broad application prospects.

    • Multi-gateway System in Single ZigBee Network

      2012, 21(11):38-42.

      Abstract (1865) HTML (0) PDF 571.55 K (3246) Comment (0) Favorites

      Abstract:Single ZigBee network usually has only one single gateway. Single gateway system may have some problems, for example, network time delay caused by the large amount of data, and paralysis of the whole network due to the dysfunction of one gateway node. In order to solve these problems, the design method of multiple gateways in a single ZigBee network is proposed. Firstly, Data sending to the single gateway are divided into several parts and sent to multiple gateways. Then, gateways convert the received data and transmit them to the Ethernet. PC server gathers data via TCP/IP protocol and processes them eventually. The architecture and working principle of the designed multi-gateway system are introduced first. The hardware and software designs of the system are presented, and the route selection process for the best gateway is described in details. The final testing results indicate that the multi-gateway system works stably and can make up the deficiency of the single gateway ZigBee network effectively.

    • Shopping-Cart Design Based on Session State

      2012, 21(11):43-46.

      Abstract (1847) HTML (0) PDF 492.11 K (2497) Comment (0) Favorites

      Abstract:Shopping-cart is a very popular module in the field of E-commerce, its designing related to the entire system's effective operation. Shopping-cart, as the most used interactive module, whether from the aspect of user experience or functionality, cannot be ignored. Sometimes, in order to create a better user experience, some adjustments to the structure are made to accommodate the functional requirements. Although these adjustments are not necessary, it's very useful. Only understand the features and principles behind the system can build shopping-cart that meet the needs of most people, otherwise it may lead to poor performance to the whole system. In this context, this paper analyzes the pros and cons of different options, then put forward some improvements. At last, it talks about some exceptions during the daily use and gives a remedy.

    • Applying Frameworks-Oriented Technology in Management Information System

      2012, 21(11):47-53.

      Abstract (1595) HTML (0) PDF 897.76 K (2415) Comment (0) Favorites

      Abstract:With Promotion of information technology in the Enterprise, independent development mode or unreasonable framework design of many management information system cost a lot of time and human resources. This article researches object-oriented frameworks technology in management information system, it reduces cycle of development, saves cost, improves quality of software, it’s flexibility and scalability can adapt increasing and changing of information technology requirements very much. This technology can be reference resources of building office management system in large enterprise.

    • >研究开发
    • Improved LVS Load Balancing Algorithm Based on Cloud Adaptive Genetic Algorithm

      2012, 21(11):54-57,115.

      Abstract (1425) HTML (0) PDF 848.14 K (2909) Comment (0) Favorites

      Abstract:Aimed at the problem of load skew in LVS system, this article improves load balancing algorithm with weight parameter of system. It first calculates server node’s load according to parameters fedback by server node, then distributes weight to every server node according to its load by using cloud adaptive genetic algorithm, further realizes the improved algorithm. Experiment shows that, the improved algorithm is better about 10% than traditional algorithm in performance, and can make the system effectively realize dynamic load balancing.

    • Community Partition Algorithm Based on Timing Characteristics Under Internet of Things

      2012, 21(11):58-62.

      Abstract (1728) HTML (0) PDF 469.29 K (2759) Comment (0) Favorites

      Abstract:In order to solve service community dividing problems in the IOT environment, a new community partition algorithm which is based on timing characteristics on community was proposed. First, the paper gives the definition relevant to time series data; then presents timing data pre-processing schema. Finally, the proposed algorithm performance was analyzed. The simulation results show that the proposed algorithm is feasible.

    • Optimization of LAPACK Based on Loongson 3A

      2012, 21(11):63-67.

      Abstract (1879) HTML (0) PDF 454.82 K (3143) Comment (0) Favorites

      Abstract:According to the characteristics of Loongson 3A architecture, this paper shows three ways to improve the performance of LAPACK: optimization of the underlying BLAS library, the selection of the best block size of the block algorithm in LAPACK and optimization of the specific LAPACK functions. By running the LAPACK Timing Programs, experimental results are obtained and it shows that the performance of 240 LAPACK functions, which account for 81% of all the LAPACK Timing Programs, is increased by more than 30%.

    • Web Information Extraction and Knowledge Presentation System

      2012, 21(11):68-71.

      Abstract (1393) HTML (0) PDF 523.25 K (2365) Comment (0) Favorites

      Abstract:This article summarizes 3 basic characteristics of 3-1 Split Web Report, summed up 3 key problems to be solved about the generation 3-1 Split Web Report, gives the strategy to solve these problems, describes take generation technology, including the algorithms hypothesis and algorithm design, and application in practical engineering. This paper studies the generation algorithm complexity reduction, and only one SQL statement operation, with good efficiency.

    • Attribute Extraction Algorithm of Seismic Coherence Based on Multi-Threading

      2012, 21(11):72-75.

      Abstract (1525) HTML (0) PDF 433.98 K (2816) Comment (0) Favorites

      Abstract:For taking full advantage of multi-core computers and improving computing speed of coherent cube of seismic data, a coherence parallel algorithm with the research of multi-core parallel technology has been designed and implemented. The comparison test of the performance between the serial and the parallel algorithm has been completed. The result shows that using Pthread can make full use of multi-core resources and achieve an ideal linear speedup. The result also indicates that using Pthread can improve the computational efficiency of the system and be very suitable for processing large-scale seismic data.

    • Scheme for Optimizing P2P Traffic Between Networks Based on BitTorrent

      2012, 21(11):76-79.

      Abstract (1442) HTML (0) PDF 416.54 K (2677) Comment (0) Favorites

      Abstract:With the popularity of P2P software, P2P has become critical applications affecting Internet network structure. In the long distance backbone networks of China ISP, P2P traffic accounts for more than half, not only to bring the huge pressure for ISP, also make the network congestion increasingly serious. So this paper puts forward an optimization scheme for agreement BT. With compositing cooperation of users and analog the topology structure of bottom network, it has no impact on the performance. And it guides traffic more happened in local networks, so that reduce the P2P traffic between networks. The tests show that the system can not only as far as possible to achieve the purpose of the whole optimization by traffic localization, and more can enhance the performance of the user system.

    • Dynamic Characteristics Simulation of Intelligent Three-dimensional Parking Spaces Falling Protection System

      2012, 21(11):80-83,130.

      Abstract (1363) HTML (0) PDF 1.17 M (2870) Comment (0) Favorites

      Abstract:The impact of intelligent three-dimensional parking spaces falling protection board dropping on falling protection obstacle is a nonlinear structure problem. The reliability of falling protection system has been confirmed through a physical test. Drop impact of falling protection system was simulated by nonlinear finite element method. Mechanical properties and dynamic characteristics of the falling protection system in the drop impact process were analyzed by ANSYS/LS-DYNA. The stress, deformation, velocity, and acceleration were obtained. Security and reliability of the devices were confirmed. It is referred to design the three-dimensional parking spaces falling protection system.

    • A Method of Venous Extraction in Leukoaraiosis’s MR Image

      2012, 21(11):84-88,144.

      Abstract (1634) HTML (0) PDF 1.00 M (2641) Comment (0) Favorites

      Abstract:The venous’s information show in Leukoaraiosis’s MR image is complex, on account of this characteristic, a multi-threshold venous extraction method was proposed in this paper. First, the venous detail information was enhanced by using morphological top-hat transform; Second, the image’s histogram was processed by using multilayer wavelet decomposition, then threshold processing and reconstruction were used at different levels by wavelet detail information and approximation information to extract venous gray feature; Finally, the multi-threshold segmentation method was used to obtain venous regions. The results show that this method can extract venous information automatically and quickly, furthermore, it realized the venous’s quantitative analysis. It provided a quantitative criterion for doctors’ diagnosis of venous expansion in white matter regions of Leukoaraiosis and had clinical assistant diagnosis value.

    • Non-Functional Attributes of Embedded Components

      2012, 21(11):89-93,164.

      Abstract (1532) HTML (0) PDF 896.75 K (2515) Comment (0) Favorites

      Abstract:Component has become a key research object in the field of embedded, a high quality embedded component includes not only its functional attributes,but also its non-functional attributes(abbreviation ADL). However, it lacks the research on the non-functional attributes of embedded components. This paper mainly studies the non-functional attributes of embedded component, and describes them by using Architecture Design Language (abbreviation ADL) and elaborates the correspondence relations between the embedded components development process and the non-functional attributes, so as to guarantee the quality of the embedded components. At last, this article gives an example to verify it.

    • Obstacle Avoidance of Intelligent Vehicle Based on Multi-sensor Information Fusion

      2012, 21(11):94-97,169.

      Abstract (1358) HTML (0) PDF 552.44 K (3794) Comment (0) Favorites

      Abstract:Aimed at the problem of obstacle avoidance of intelligent vehicle in uncertain environment, several ultrasonic sensors and infrared sensors are used for unifying the sensation of environmental information,and a novel approach of multi-sensor information fusion based on neural networks and fuzzy logic, i.e. T-S fuzzy neural networks method is presented. The simulation experiment indicates that the method which is used in avoiding the obstacle is flexible.

    • Sliding Window Iteration and Hysteresis Control Algorithm For UPQC Parallel Side

      2012, 21(11):98-101,182.

      Abstract (1218) HTML (0) PDF 839.25 K (2186) Comment (0) Favorites

      Abstract:In this paper, according to unified power quality conditioner (UPQC) parallel side, an algorithm based on a coordinate transformation of discrete Fourier (DFT) sliding window iterative harmonic current detection and a constant frequency hysteresis control algorithm are proposed. The detection and control algorithm can improve the harmonic detection speed, strengthen the harmonic detection synchronicities, real-time good points. Finally through Matlab/Simulink platform is simulated. The condition of the laboratory design a set of small power UPQC device, and successfully applied to the UPQC, simulation and experimental results demonstrate the above test and control algorithm is effective and feasible.

    • Resource Allocation for Multiuser OFDM System Based on Branch and Bound

      2012, 21(11):102-105,178.

      Abstract (1164) HTML (0) PDF 842.57 K (2445) Comment (0) Favorites

      Abstract:Branch and bound (BnB) approach, a new algorithm for solving resource allocation in multiuser OFDM system is introduced. It is used in Rate Adaptive allocation. With the classic Genetic Algorithm, the calculation accuracy has been improved, but the complexity is higher. On the other hand, through the branches, bound and cut branches, when used branch and bound algorithm, the complexity is reduced obviously. Simulation results show that it is similar to Genetic Algorithm on the performance, lower complexity than GA, better than Linear Algorithm on the performance.

    • >实用案例
    • Specialized Meteorological Service System for Chengdu Area Cascade Dispatching Center

      2012, 21(11):106-110,136.

      Abstract (1223) HTML (0) PDF 1.17 M (2836) Comment (0) Favorites

      Abstract:This paper introduces overall design and implementation techniques for Chengdu Area Cascade Dispatching Center, Proposed a general logical structure is complete, Reasonable flow of information, the function of each subsystem is clear, and fully reflects the overall design of a combination of meteorology and hydrology. This is an automated system, it can for the development and construction of similar meteorological service of the hydropower industry provide practical experience and technical drawing. Using oracle database and c# and jsp and c++ language , Completed the development and construction of Specialized Meteorological Service System for Chengdu Area Cascade Dispatching Center.

    • WinCC Network Report System Based on Ajax Technology

      2012, 21(11):111-115.

      Abstract (1167) HTML (0) PDF 727.94 K (2964) Comment (0) Favorites

      Abstract:Considering the report function of WinCC configuration software is not perfect, the network report function have to carry out by the expensive component of the Web Navigator, though it is powerful. According to the deficiency of WinCC report function, this paper puts forward to realize WinCC network report system using the technology of Ajax, ASP and so as the other web technologies, after the investigation of the archiving structure of WinCC variable. Directly read the SQL Server archive database system, remote viewing WinCC reports and tendency chart, also has a similar user experience of desktop applications. WinCC network report system has been successfully applied to the process of sewage treatment.

    • Automatic Management System for Multi-Media Classroom

      2012, 21(11):116-119.

      Abstract (1664) HTML (0) PDF 475.68 K (3460) Comment (0) Favorites

      Abstract:For the problem that multi-media classroom management is faced with nowadays, an automatic management system for multi-media classroom which is low cost and easy to popularize is designed. .NET Framework and SQL Server is used as the platform. The software of the system is developed by C#, used database technology and remote control technology. The hardware is based on Single chip microcomputer technology, and uses serial ports to control the devices in classroom automatically. Administrators’ work efficiency is greatly improved and investment cost of equipment in school is saved since the system has been put in use. It is worth popularizing and improving.

    • Synchronization of Audio and Video in Dynamic Network

      2012, 21(11):120-122,178.

      Abstract (1288) HTML (0) PDF 723.95 K (2950) Comment (0) Favorites

      Abstract:In view of the problem that audio and video are not synchronized, which is caused by factors such as delay, shaking and the change of network condition in transmission, this paper designs a solution for the synchronization of audio and video which adapts to different network. By use of the property of various rates of the codec AMR-WB and H.264,and RTP time stamp and RTCP feedback detection QOS, this synchronization scheme is realized by controlling the codec of audio and video. In the paper, the design process of synchronization algorithm which works in reliable and dynamic network is emphasized, and the feasibility of the scheme is verified through actual test. The results show that this design can guarantee the synchronization of audio and video in different network environment.

    • Seamless Integration of LabVIEW and MATLAB in the Virtual Instruments

      2012, 21(11):123-126.

      Abstract (1220) HTML (0) PDF 676.67 K (5903) Comment (0) Favorites

      Abstract:LabVIEW and MATLAB are two kinds of popular software that widely used in the engineering project technical, by calling the MATLAB in LabVIEW to implement the seamless links, and make full use of Matlab’s rich functions, strong scientific computing and data processing ability, complement each other, which can greatly improve the development of the virtual instrument function. aslo the LabVIEW by calling in the MATLAB Script node is introduced in detail. Finally, Realized the seamless links between LabVIEW and MATLAB, using two examples shows the superiority of feasibility of LabVIEW and MATLAB seamless links as well as the two complementary advantages.

    • Library Sort Number Management System

      2012, 21(11):127-130.

      Abstract (1368) HTML (0) PDF 576.90 K (3178) Comment (0) Favorites

      Abstract:The creation and utilization of sort number has substantial connection with the work in library cataloging and circulation department. Its validity affects the veracity of bibliography data and collection circulation directly. After the research on improvement of some sort number, this article utilizes the VB language to develop the computer sort number management system, based on the SQL Server database, which effectively improve the efficiency and accuracy of the library catalog.

    • >应用技术
    • Hot Word Extraction for Microblog Based on Massive Data Filtering

      2012, 21(11):131-136.

      Abstract (1704) HTML (0) PDF 513.23 K (4297) Comment (0) Favorites

      Abstract:This paper presents a Chinese microblog hot words extraction algorithm based on massive data Filtering. Firstly, it chooses the user behaviour characteristics and text characteristics to create user behavior models, and filters massive data to create topic-trees by a fast algorithm based on rules. Then, it uses hot words extraction algorithm to get the hot topic of topic-trees by word frequency feature. The experiment results show that the proposed algorithm can reduce the scale of the input data, with keeping lots of important information to extract hot words.

    • Realization of Tennis Eagle Eye System Based on the Virtual Instrument

      2012, 21(11):137-139,169.

      Abstract (1397) HTML (0) PDF 874.28 K (2843) Comment (0) Favorites

      Abstract:The Labview virtual platform,Matlab nodes and three-dimensional control are used to achieve calculation and processing of data and build three-dimensional scene. We calibrate camera accurately by Quantum Particle Swarm Optimization Algorithm, get discrete center by denoising and achieve three-dimensional coordinates by threedimensional matching, obtain a smooth curve by Gaussian fitting. According to fitting curve, we accomplish the build of virtual tennis scene, the running track playback of tennis and the judgement of whether tennis is out of line. By detecting that the system is a reasonable amount of computation and the determine correct rate is higher than 92%.

    • ReInForM-CS Routing Algorithm Based on CS in Wireless Sensor Network

      2012, 21(11):140-144.

      Abstract (1408) HTML (0) PDF 517.98 K (3374) Comment (0) Favorites

      Abstract:When the wireless sensor network explores the target, it may come across the question of treatment capacity and power deficiency. The traditional router can’t meet with the needs of data collecting and restructuring when importing of the theory of CS to achieve it. In accordance with the features of ReINForm router, we introduce a kind of ReINForm-CS router calculation, which sets up the relevant routes according to the observing matrix numbers needed by renewing signals currently. The results of Simulation experiment not only indicate the calculation fulfills accuracy transmission, but ensure the corresponding image observing matrix simultaneously.

    • Rapidly Generating Algorithm for Minimum Test Case Set on MC/DC Based on Graph

      2012, 21(11):145-148.

      Abstract (1465) HTML (0) PDF 470.33 K (3387) Comment (0) Favorites

      Abstract:For the problem of efficiency for Minimum Test Case Set on MC/DC, based on MC / DC criteria and the complex relationships of combination of conditions and decision, the paper turnned a original boolean expression into a syntax tree, then turned the syntax tree into a graph. According to the effect on nodes of the graph to the decision, the paper proposed the graph-based fast algorithm to generate the smallest set of test cases. Finally, the paper verified and compared the algorithm with others, the results show that the algorithm has practicality and superiority.

    • Construction and Practice of the Integration of Higher Vocational Technology Based on EDA Teaching Mode

      2012, 21(11):149-152.

      Abstract (1300) HTML (0) PDF 449.47 K (2524) Comment (0) Favorites

      Abstract:Higher vocational education needs to raise the “strong ability, high quality” technology applied talents and, therefore, to develop the students’ vocational ability to train the criterion of “teaching, studying, doing one” the integration course teaching mode. This paper expounds the stratification of the teaching mode theory basis, features and implementation principle, and integration course design in higher vocational technology education in the teaching of necessity, and with electronic technology course teaching effect that the practice of using the feasibility.

    • Improved K-Means Algorithm and Its CRM in Telecom Customer Segmentation Application

      2012, 21(11):153-155,186.

      Abstract (1235) HTML (0) PDF 804.02 K (3174) Comment (0) Favorites

      Abstract:The telecommunication market competition is the competition for customers, in the fierce competition to maintain advantage, must be customer segmentation, for different customers, work out the corresponding marketing strategy. K-means algorithm for large data sets for efficient classification, but the " noise" sensitive, clustering result is not accurate, the algorithm is improved, which can achieve a more accurate and comprehensive customer segmentation.

    • Underlying Simulation for c/c++ Unit Testing

      2012, 21(11):156-160.

      Abstract (1376) HTML (0) PDF 562.72 K (3521) Comment (0) Favorites

      Abstract:The goal of unit testing is to cover the functional logic of code unit, and internal inputs is the key of unit testing. Stub code has been used in most of the tools for c/c++ unit testing existed to solve the problem of internal inputs, while stub code may cause distortion of function, and it is difficult to solve these problems such as the uncontrollability and hard-initializing of underlying functions, the static inputs, the interrupt inputs, etc. To solve these problems, this paper proposed the underlying simulation technology for c/c++ unit testing, simulating and controlling the behavior of the sub-function in test cases, making the data generated by underlying function can be set in cases as the parameters, and it can simulate the local data and interrupt, avoid wasting time to write stub code, promote the testing efficiency.

    • Plant Similarity Analysis Based on Fourier Spectrum and Its Angular and Radial Features

      2012, 21(11):161-164.

      Abstract (1369) HTML (0) PDF 541.00 K (2872) Comment (0) Favorites

      Abstract:A new texture feature extraction method is proposed, which is based on Fourier Spectrum Features Using Angular and Radial Partitioning, conducting the similarity measure experiment on microscopic image of vine. compared with two common texture feature extraction method, the results are more accurate to define and describe texture characteristics and similarity measure of the vine image.

    • Fault Diagnosis Based on Improved Tabu Search Algorism and ANN

      2012, 21(11):165-169.

      Abstract (1187) HTML (0) PDF 512.30 K (2612) Comment (0) Favorites

      Abstract:Aiming at the traditional artificial neural network (ANN) has the problem of easily falling into the local minimum and the slow convergence, a fault diagnosis model based on Tabu search algorism combined with ANN was proposed. Firstly, the fault diagnosis model was defined, then the trained data was used to train the weight and the threshold of the network, and the trained result was used as the initial solution of the improved tabu search algorism, the definition and description of the algorism were given. Finally, the global optimization result was set to the neural network, and the test data was used to as the input of the neural network to diagnose. The simulation result shows that our method in this paper conquers the defects of the traditional methods, has the advantages of high diagnosis accuracy, rapid diagnosis speed and fast convergence.

    • Fingerprint Image Segmentation Based on Particle Swarm Optimization and Directional Image

      2012, 21(11):170-173.

      Abstract (1279) HTML (0) PDF 810.46 K (2484) Comment (0) Favorites

      Abstract:Fingerprint recognition as one of the most successful applications of biometric technology in recent years has been rapidly developed and become more and more popular. Fingerprint image segmentation technique is the basis of fingerprint processing feature point extraction, and is the key to the efficient identification of fingerprints, which directly affects the performance of the fingerprint identification system. This paper is based on the analysis of the fingerprint image segmentation methods, and develops a hybrid segmentation method by considering the advantages of the particle swarm algorithm and directional image algorithm. Computational results have shown that the hybrid method can obtain a good fingerprint image segmentation.

    • >经验交流
    • Combined Tool for Measuring of Available Bandwidth and Locating Internet BottleneckiPathneck

      2012, 21(11):174-178.

      Abstract (1306) HTML (0) PDF 579.39 K (2709) Comment (0) Favorites

      Abstract:Presently, most of the network measurement tools are active. But they bring heavy overhead and impact the measurement accuracy. We concern how to ensure measurement accuracy with reducing the overhead. In this work, a new measurement scheme iPathneck based on Pathneck is proposed to perform better than Pathneck on measuring ABW by using probe rate model. iPathneck combines tasks to measure ABW and to locate Internet bottleneck. Experiment will show that iPathneck achieve shorter convergence time, lighter measurement overhead and higher accuracy.

    • Efficiency of Storaging Small Files in HDFS Based on MapFile

      2012, 21(11):179-182.

      Abstract (1742) HTML (0) PDF 422.56 K (4372) Comment (0) Favorites

      Abstract:The Hadoop distributes file system(HDFS) which can process large amounts of data effectively through large clusters. However, HDFS is designed to handle large files and suffers performance penalty while dealing with large number of small file. An approach based on MapFile is proposed to improve storage efficiency of small files in HDFS.The main idea is to add a file type judgment module while uploading a file, and create a small file queue, put the small file serialization in a MapFile container.and establishes the index file. Experimental results show that, the storage efficiency of small files is improved contrast to Hadoop Archives(HAR files).

    • Steganalysis Method Based on the Difference of Adjacent Pixels

      2012, 21(11):183-186.

      Abstract (1514) HTML (0) PDF 554.76 K (2376) Comment (0) Favorites

      Abstract:This dissertation first introduces the structure and characteristic of BMP file. Based on the features of adjacent pixels, a steganalysis algorithm for the replacement of LSB is proposed. Scanning and counting the difference of adjacent pixels horizontally and vertically are the first step, and then this thesis judges whether the image contains secret information according to the ratio of odd and even. The development environment is VS2008, and the experiment shows that the algorithm can be simply applied with a small statistics. In addition, the new algorithm has a high detection capability with a large amount of secret information.

    • Decompilation-Based Static Analysis for Malware on Android Platform

      2012, 21(11):187-189.

      Abstract (1657) HTML (0) PDF 439.75 K (3925) Comment (0) Favorites

      Abstract:Android platform predominates a big market share, but its openness introduces an exploding increase of malwares. So it proves quite essential to perform analysis and detection for these malwares. Static analysis plays a vital role in detecting traditional computer malwares, thus according to characteristics of Android and smart phone, this dissertation focuses on the static analysis method for Android malware based on decompilation and obtains valuable results by experiments.

    • Lifetime Bounds of Wireless Sensor Networks Concealing Sink Location

      2012, 21(11):190-193.

      Abstract (1290) HTML (0) PDF 408.39 K (2574) Comment (0) Favorites

      Abstract:An attack to the base station (sink) in wireless sensor networks (WSNs) may make the entire network to be invalid, Therefore, it is very necessary to conceal the physical location of the sink in certain circumstances. In view of previous studies has all assumed a weak adversary model. Through a Linear Programming (LP) framework we present two different sink hiding methods: fake sinks (FS) method and balanced flows (BF) method. By simulation we analyzed and compared two methods with respect to their impact on network lifetime. Our results show: (1) The impact of preserving sink unobservability on network lifetime is considerable; (2) Network lifetime with BF is better than with FS in large networks.

    • Design and Implementation of a Smart DNS System

      2012, 21(11):194-197.

      Abstract (1308) HTML (0) PDF 421.60 K (3042) Comment (0) Favorites

      Abstract:The paper demonstrates the disadvantage of the traditional strategies of domain name directional resolution including BIND9, then we present a preferable system: SmartDNS. By practice, it is available and flexible, and can get better results than traditional means.

    • Predicate Switching Ordering Based on Branch Spectra Comparison

      2012, 21(11):198-201,207.

      Abstract (1348) HTML (0) PDF 786.70 K (2507) Comment (0) Favorites

      Abstract:Predicate Switching locates and analyses the critical predicate to locate fault through dynamically changing the branch predicate outcomes at runtime and observes the changes in the program results. Predicate Switching Ordering algorithm determines the efficiency of locating the critical predicate. Existing ordering algorithms, such as the LEFS (Last Executed First Switched Ordering, LEFS) algorithm with lower efficiency and the PRIOR (Prioritization-based Ordering, PRIOR) algorithm with higher efficiency, the latter time consuming and complexity of algorithm, are defective. In this paper, we propose a novel and improved algorithm, which first determines the priority of the predicate by comparing different program spectra between the success and failure of test cases, then orders priorities of predicate, according to the reverse order of the predicate executions. To evaluate it, we tested our technique on Siemens Suite. The results have shown that the ordering algorithm is more efficient in locating the critical predicate than the LEFS, and less consuming but more implemented than the PRIOR.

    • Approach for High-speed Transfer of Big File in Web

      2012, 21(11):202-204.

      Abstract (1703) HTML (0) PDF 1.25 M (4433) Comment (0) Favorites

      Abstract:The paper implemented a mechanism for transferring big size file in high speed. The browser leverages Html5 to slice big file into pieces and upload files to web server asynchronously. The web server adopts CGI to handle incoming file pieces, and sends file pieces in order when the file is downloaded. The mechanism reduces I/O cost due to avoiding reunifying file pieces. Comparing other approaches, this method breaks through the limit to file size, transfers files in high speed, and features in no need of third-party plug-ins.

    • Interval Degree Histogram Image Retrieval Based on the Adjacent Corner

      2012, 21(11):205-207.

      Abstract (1374) HTML (0) PDF 417.41 K (2207) Comment (0) Favorites

      Abstract:This paper presents a new image retrieval method based on shape, first the image is divided into central and lateral annular two region, adjacent corner interval degree is calculated in the region, the interval is quantified some grades, and thus calculate each image in each region of the adjacent corner interval histogram, the two images of the similarity depends on the corresponding region histogram Euclidean distance. The algorithm has the translation, rotation and scale invariant features, the experiment proves that it has better image retrieval efficiency.

    • Implementation of Graceful Restart Mechanism in OSPFv3 Protocol

      2012, 21(11):208-211,193.

      Abstract (1492) HTML (0) PDF 778.78 K (2678) Comment (0) Favorites

      Abstract:This paper discusses an approach that supporting GR mechanism in OSPFv3 protocol to avoid the routing oscillation and data forwarding interruption during router restarting, thereby improving the reliability of the network. Based on the realization of OSPFv3 basic functions, it focuses on the working principle and the concrete realization of IETF standard GR mechanism, analysis the running process and message interaction of OSPFv3 GR in detail. The test results show that the GR mechanism can ensure the data forwarding flow without interruption during protocol restarting.

    • >专论·综述
    • Rectangular Form Filter

      2012, 21(11):212-217.

      Abstract (1512) HTML (0) PDF 982.51 K (2997) Comment (0) Favorites

      Abstract:The rectangular form is a basic shape in the gray-scale image, and it’s an important applications in image analysis. In order to effectively detect rectangular form in image, a rectangular form filter is proposed. Firstly, the structuring elements of the rectangular form filter are defined, and then two kinds of filtering mode are defined: order filtering and mean filtering. The experimental results show that our filter can effectively detecte the rectangular form specified the size and direction from binary images, binary images corruted by noise and gray-scale images.

    • Automatic Data Mining Algorithms

      2012, 21(11):218-221,193.

      Abstract (1380) HTML (0) PDF 663.43 K (2813) Comment (0) Favorites

      Abstract:An automatic data mining algorithms based on grammar guided genetic programming(GGP) is studied. The rule induction algorithm is a typical data classification method. The grammar guided genetic programming is used to improve the rule induction algorithm, and then proposed an algorithm of automatic extraction rules. Finally, associated with the TV shopping programs, and gives examples of automatic extraction rules based on the grammar of genetic programming.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063