• Volume 21,Issue 9,2012 Table of Contents
    Select All
    Display Type: |
    • Multi-Core Virtual Machine Monitoring System

      2012, 21(9):1-6.

      Abstract (2017) HTML (0) PDF 683.92 K (3094) Comment (0) Favorites

      Abstract:With the era of multi-core processors, virtualization technology is widely used, and multi-core virtual machine is one of them. The current multi-core virtual machine monitors are generally used hardware virtualization technology through simulating a number of virtual serial ports to monitor for the purpose. This inventive, given based on shared memory multi-core system-level monitoring system virtualization solution, and gives a complete design and implementation.

    • Food Security Traceability System Based on SaaS Model

      2012, 21(9):7-9,31.

      Abstract (1779) HTML (0) PDF 1.06 M (3006) Comment (0) Favorites

      Abstract:As the important service show way of cloud computing, SaaS has been the rise completely innovative software application mode in the market. It uses the Internet to provide calculation service, and uses the SaaS service software for specific industries and areas, no matter from the technical or business will save a lot of human and financial resources cost, also more conducive to improving the utilization rate of social resources and sharing. To further enhance the safety of domestic food, comprehensive promotion food monitoring and food management software application, this paper puts forward the food security traceability system based on SaaS Model. The article combines the food industry business requirements and SaaS model of service features, and probes into the system in the process of implementing the difficulties SaaS technology, finally successfully reach maturity of the SaaS model 4 system, this system can not only ensure the safety of the domestic food distribution, but also effectively promote the SaaS model of business system platform in the cloud in the calculation of the application.

    • Analysis System of Notebook Computers' Comments Based on Opinion Mining

      2012, 21(9):10-13,42.

      Abstract (1321) HTML (0) PDF 1.12 M (3074) Comment (0) Favorites

      Abstract:With the commercial demand and application background, this paper creates an analysis system of notebook computers’ comments, which aims at those unstructured and freestyle online comments. It can classify the text sentiment orientation and conclude products features. The system uses data mining and business intelligence methods to analyze huge amounts of feedback from online customers and help corporate executives to realize the market needs, make commercial decisions. Finally, the experimental results prove that this system can obtain a relatively accurate result.

    • Digital Orchard Management System

      2012, 21(9):14-18.

      Abstract (2002) HTML (0) PDF 550.77 K (4082) Comment (0) Favorites

      Abstract:A digital orchard management system (DOMS) plays an important role in implement orchard precision management. With single fruit tree as minimum management unit and rich internet application (RIA) as framework, DOMS structure was established using WebGIS application service provided by ArcGIS Server. Data table and entity relationship was designed. The function of DOMS was implemented with ExtJS. An apple orchard in Shandong province was selected for applying DOMS. An orchard map was created by recording the coordinate location of fruit trees and environment monitoring equipments in the apple orchard. Integrating with the map, various entities such as orchard, fruit trees, and equipments and so on were managed with DOMS. The application result shows that DOMS can improve management efficiency, enhance analysis capacity and provide visualization management means. It is a new attempt that information technology is applied in orchard management.

    • Color Planning of Mobile Phone 3D Animation Automatic Generation System

      2012, 21(9):19-26.

      Abstract (1924) HTML (0) PDF 675.94 K (3375) Comment (0) Favorites

      Abstract:The Mobile phone 3D animation automatic generation system implements the technology that automatically generates a 3D animation and sends the message with animation to the receiver according to the content of message. Color planning is an important segment of the system, consider of the topic of the message and the animation scene’s information, plan in color domain for the animation, and change the models’ color in the animation scene. In this paper, a Semantic Web technologies based approach is proposed. A knowledge base in the domain of color is built. In the process of the planning, firstly the color matching plans suitable for the topic of message after plot reasoning are built. Then, according to the information of animation scene, the plans are filtered. Finally, the color of each model in the scene is decided. Instead of the visual effects is invariable and tedious for automatic generated animation, color planning makes the animation more flexible and variable.

    • Passive RFID Attendance System Based on MSP430

      2012, 21(9):27-31.

      Abstract (1611) HTML (0) PDF 519.42 K (4250) Comment (0) Favorites

      Abstract:With the developing of information technology, smart attendance system has been an essential facility for modern enterprise. In this paper, a low-power RFID system based on MSP430 and TRF7960 is designed. The reader can inquire passive tags which support ISO14443A protocol and has been planted with anti-collision algorithm. It has a read range of 8cm and can read 2 tags at the same time. Experimental results verify that the RFID reader is stable and reliable. Combined with the development of middle-ware and Web service application at the server, a complete solution of attendance system is achieved.

    • Application of Preprocessor Plug-in to IPv6 Intrusion Detection System

      2012, 21(9):32-37.

      Abstract (1305) HTML (0) PDF 687.25 K (2848) Comment (0) Favorites

      Abstract:Snort is one of a light wight, powerful NIDS. It can detect many different kinds of attack behaviors, and give real-time alerts. Because Snort does not support the detection of IPv6 address prefix spoofing, this paper supplies a solution to implement the intrusion detection preprocessor plug-in and provides the detection process. The experimental result proves that the preprocessor has a higher detection ratio to the spoof of IPv6 address prefix, and it is an effective plug-in on the intrusion detection system.

    • Embedded Positioning System Based on nanoLOC

      2012, 21(9):38-42.

      Abstract (1446) HTML (0) PDF 476.07 K (3325) Comment (0) Favorites

      Abstract:This paper mainly studies the target positioning system based on nanoLOC transceiver. An embedded positioning system consists of S3C6410A microprocessor of Samsung, nanoPAN 5375 wireless communication module and LCD. Linux operating system based on Linux 2.6.38 kernel is used as embedded software platform. The symmetrical double-sided two-way ranging algorithm is designed which has a high accuracy of positioning system. A lot of experiments show that the accuracy of positioning system is less than one meter, the system can achieves in indoor and outdoor as well as the high precision positioning in harsh environments, and be used in handheld mobile positioning equipment. The system has a great application and promotion value.

    • EPC IS Design Schema of Rights Management

      2012, 21(9):43-47.

      Abstract (1273) HTML (0) PDF 504.09 K (2871) Comment (0) Favorites

      Abstract:The EPC IS is the core of the Internet of Things and it’s responsible for the tasks of analyzing EPC datas and PML documents. Thus, this paper discusses a new EPC IS design scheme of Rights Management based on the traditional EPC IS while combined with eXtensible Access Control Markup Language (XACML). This new EPC IS design scheme of Rights Management aims to resolve the security issues of the EPC IS when it is accessed across companies. The architecture and role of the EPC IS with potential security problems come first. Then, XACML, which focus on analyzing how to realize rights management is talked. Finally, an EPC IS design schema of rights management solution of the cross-enterprise supply chain management system is put forward.

    • Preview Fuzzy PID Control System for an Embedded Wheeled Robot

      2012, 21(9):48-52.

      Abstract (1509) HTML (0) PDF 450.72 K (3647) Comment (0) Favorites

      Abstract:The design of a wheeled robot with automatically tracing process based on ARM for core device is introduced. This article proposes a multiple-point preview fuzzy PID control algorithm which is based on imitating artificial driving. By debugging, the wheeled robot can track the straight lines and the dotted lines. And the wheeled robot can automatic search for roads. The design of the controller and the main hardware circuit diagram are given. Experimental results show that the robot can meet performance requirements and provide programme for the design of the new kind of wheeled robot.

    • User-Space Device Driver Framework Based on USB Device

      2012, 21(9):53-57.

      Abstract (1458) HTML (0) PDF 392.20 K (3912) Comment (0) Favorites

      Abstract:In order to achieve high performance, traditional linux operating system run device drivers in kernel space. Unfortunately, this architecture inevitably decreases reliability and stability of the system. Based on commonly used equipment USB devices, this paper presents a new driver architecture which run device drivers as unprivileged user-level code, encapsulated into a process, this architecture also support features such as hotplug, driver management and so on. Experiments on several usb devices show it works well in user space without significant performance degradation.

    • Optimization of the Depth Information Based on Stereo Vision in Multi-Target Scenarios

      2012, 21(9):58-63.

      Abstract (1382) HTML (0) PDF 990.24 K (3997) Comment (0) Favorites

      Abstract:Aiming at the filed of robot grasping using binocular vision, a new method for dealing with the depth information is proposed in the multi-target scenarios. By setting a threshold in pixels and traversing the depth information image similar to clustering method can obtain the coordinates of the object and pass the coordinates to the robot arm to grasp the object accurately. In this paper, the principles of binocular vision, camera calibration, stereo recertification and stereo matching are described. Their difference between the original depth information and the depth information after optimization can be acquired by utilizing the optimization algorithm. The approach for grasping object for robot in multi-target scenarios is proved to be effective in the experiments. Research directions for future improvements are also presented.

    • Semantic-Based Web Service Discovery

      2012, 21(9):64-67.

      Abstract (1528) HTML (0) PDF 483.89 K (3016) Comment (0) Favorites

      Abstract:The traditional Web services discovery technology mostly used keyword-based service matching mechanism, due to lack semantic Web services description, it affect the recall rate, precision rate and intelligent search of Web services.In this paper, we research on semantic-based Web service matching Algorithm. By improving the classical matching algorithm for Web services, study the concept of Semantic Web services single matching algorithm, and get the optimal order of concept of Multi-concept semantic Web service matching, then combining with the input and output parameters. Finally, get the results of semantic Web service matching.

    • Viewshed Algorithm Based on DEM Database

      2012, 21(9):68-73.

      Abstract (1718) HTML (0) PDF 574.54 K (4320) Comment (0) Favorites

      Abstract:Visibility analysis is widely applied to military and project fields, of which viewshed computing is the important factor. This article discusses the common algorithms for viewshed computing, analyses the advantages and disadvantages of them, and puts forward a improved Xdraw algorithm based on the old one to reduce obviously the frequency of access to database aiming at a large scale DEM database. Then the continuous research direction is shown through analysis of this algorithm from correctness and efficiency in practice.

    • Event Manager Based on WebGIS

      2012, 21(9):74-78.

      Abstract (1803) HTML (0) PDF 491.02 K (2591) Comment (0) Favorites

      Abstract:Along with RIA technology introduced in developing WebGIS,more and more events are used. Traditional way of event use has low efficiency and great mistakes,so it can’t meet practical needs.According to researching the mechanism of event process and the experience of WebGIS development,a new idea that all events should be managed totally was brought forward, and a framework of event manager was designed. Through the application in the LiaoHe River water environmental management system, it turns out that applying event manager simplifies the procedure of WebGIS development,avoids mistakable events, obtains satisfactory results. Also the framework of event manager is a good way to solve event management in traditional GIS and application program.

    • Design and Optimization of Micro-mouse Solving the Maze Algorithm Based on Central Method

      2012, 21(9):79-82.

      Abstract (2298) HTML (0) PDF 430.30 K (4353) Comment (0) Favorites

      Abstract:Micro-mouse is an autonomous mobile robot(AMR) with self-maze search, the short sprint after the search, sensing and controller. In this paper, the maze search algorithm is designed and implemented based on the central method. The method and maze search process was optimized. Experimental results proved that the optimized algorithm improves on the efficient of the original method, and it has a better local effect. Finally, compared with other algorithms, we found that the central method is a very efficient maze search algorithm

    • Mathematical Modeling of Control System in High Pressure Saturated Air Generator of Saturated Room

      2012, 21(9):83-86.

      Abstract (1262) HTML (0) PDF 430.59 K (2854) Comment (0) Favorites

      Abstract:It is about high pressure saturated air generator of saturated room. It researched the mathematical modeling of control system about the saturated room. Using of the mathematical formula of thermodynamics and heat transfer deduced the transfer function of pressure--flow and temperature control process. According to the analysis of model are given control plan, make matlab simulation diagram. The result of simulation proves good control effect of this control strategy which based on the model.

    • Design and Implementation of Embedded Assembler Based on IMPACT

      2012, 21(9):87-91.

      Abstract (1281) HTML (0) PDF 376.47 K (2714) Comment (0) Favorites

      Abstract:DSP low-level features is very different from traditional C language features because of specific instruction set in DSP domain which is difficult to be generated by the complier or couldn’t be generated by the complier. The basic framework of the IMPACT is expanded to support embedded assemble.

    • SIFT Matching Algorithm Based on Diffusion Distance

      2012, 21(9):92-96,52.

      Abstract (1585) HTML (0) PDF 2.02 M (2799) Comment (0) Favorites

      Abstract:The SIFT(Scale Invariant Feature Transform) algorithm is now regarded as the best local feature extraction and matching algorithm. However, in the traditional SIFT algorithm, the Euclidean distance which could not change the high-dimensional feature vector into a low-dimensional geometry structure is used to measure the SSD(Sum of Square Differences) between two image features to match and results into mismatching. To overcome the shortcoming, an SIFT matching algorithm based on diffusion distance is proposed in this paper which replaces the Euclidean distance with the diffusion one. At the same time, RANSAC(Random Sample Consensus) is presented to exclude the mismatching points. Experimental results show that the proposed algorithm has more efficiency to deal with image deformation, illumination change and image noise than the traditional one.

    • Conformance Testing Method and Instrument Design of 6LoWPAN Protocol

      2012, 21(9):97-102.

      Abstract (1380) HTML (0) PDF 485.20 K (2924) Comment (0) Favorites

      Abstract:Aiming to MAC layer, Adapter layer, Network layer and Router protocol of 6LoWPAN protocol stack, this paper studies the conformance testing method of 6LoWPAN protocol stack, introduces the TTCN-3 testing standard into the conformance testing of wireless sensor network, and designs a 6LoWPAN protocol conformance testing instrument, which uses both TTCN-3 as protocol testing description language and protocol conformance testing model defined in ISO9646 as method.

    • Selection of Clustering Algorithms Based on Grid-Connected Graph

      2012, 21(9):103-107.

      Abstract (1387) HTML (0) PDF 627.37 K (2874) Comment (0) Favorites

      Abstract:Each clustering algorithm has its suitable treatment of specific distribution data set. The SCGG method based on the Grid-Connected Graph is proposed to select suitable clustering algorithm for unknown distribution data set. The SCGG method analyses the potential structure of the data set. If the data set has ring clustering structure, the method select a single hierarchiral clustering algorithm, otherwise it selects the k-means. Experiment results show that SCGG is very efficient and successful.

    • Colored Petri Net-Based Service Composition Modeling and Verification

      2012, 21(9):108-112,63.

      Abstract (1564) HTML (0) PDF 887.10 K (2887) Comment (0) Favorites

      Abstract:Using web service composition technology, business demand can be meet quickly and flexibly, formal description and verification of web services and their composition are very important research issues. A colored Petri net(CPN) based model is proposed to formally define and descript Web services and Web services composition, four structures of composition are mainly descript: sequence, choice, concurrent and loop, an example of web services composition modeled by Colored Petri net is proposed, the accuracy of the model is simply analyzed. The result shows that the demand of accuracy of the model is satisfied.

    • Memory Management and Optimization of iOS Development

      2012, 21(9):113-118.

      Abstract (3400) HTML (0) PDF 827.94 K (14817) Comment (0) Favorites

      Abstract:This paper describes the knowledge of memory management and cache of iOS development in detail, and introduces methods of debugging memory problems using tools which is provided by Apple IDE Xcode, for the memory problems when UITableView contains large amounts of network pictures, with the goal of memory optimization and best user experience. It proposed network of asynchronous-download pictures and the local cache solution. Finally, test results show that the memory allocation is safe and stable, the app runs more smoothly, and have a better user experience.

    • Algorithm for Constructing Task DAGs of Serial Programs

      2012, 21(9):119-123.

      Abstract (4435) HTML (0) PDF 475.97 K (5132) Comment (0) Favorites

      Abstract:Task DAG is a mean of depicting dependency among tasks of a program. Apart from dependency between tasks, amount of computation and traffic between tasks are also reflected on DAG. All these information together provides a basis for scheduling. There are much research on scheduling base on DAG both domestic and abroad, but research on constructing task DAG based on analysis of correlation among serial program is rare. This paper focuses on analysis of data dependency and control dependency and discuss respectively on sequential, branch and loop structure, propose an algorithm for constructing task DAG of serial programs.

    • One-Time Password Authentication System Based on B/S

      2012, 21(9):124-127,78.

      Abstract (1451) HTML (0) PDF 822.73 K (2791) Comment (0) Favorites

      Abstract:In the condition of the B/S mode, the authentication server is difficult implemented by a client. This paper puts forward to use.NET Remoting program to verify the authenticity of Web site and reaches storage safety of authentification message by useing neural network weight and also realizes mutual authentication between the client and the server, every time the authentication produce different session keys so on. Safety analysis shows that the proposed scheme can effectively prevent fishing websites against common attack, increase the system security. The scheme is achieved by using ASP.NET, It proved to be feasible.

    • Critical Problems about FFT Core Reuse in GLONASS Acquisition System

      2012, 21(9):128-132.

      Abstract (1755) HTML (0) PDF 540.97 K (3219) Comment (0) Favorites

      Abstract:According to the characteristics of GLONASS satellite signal and the principles of PR code acquisition, the acquisition of GLONASS signal using parallel code phase acquisition algorithm based on FFT are simulated in MATLAB, on the basis of simulation platform established in MATLAB, the FPGA implementation of GLONASS PR code signal acquisition system based on the parallel code phase acquisition is designed; Meanwhile, the Sinc data interpolation filter is used to implement the precise data interpolation to satisfy the demand for FFT transformation by interpolating the inputted 62000 points to 4096 points which is transferred to FFT-IFFT module, and in order to reuse the FFT core, the method of accelerating the read speed of the C/A code and the method of using the state value of the FSM and the exponent of the data to intercept the data bits are used. At last the whole acquisition module are verified by the simulation of Xilinx’s ISE calling ModelSim software. The simulation results show that the system can acquire the GLONASS signal. It is concluded that the designed system can satisfy the requested function and performance of receiver system, and can be used in the real-time GLONASS receiver system.

    • Formal Representation of Natural Disaster Emergency Plan

      2012, 21(9):133-136,26.

      Abstract (1647) HTML (0) PDF 1.18 M (2628) Comment (0) Favorites

      Abstract:Natural disaster emergency plans describe the domain knowledge of natural disaster emergency and it is the basis of high-efficient emergency response. However, most of the current emergency plans exist in the form of unstructured text, which hinders decision makers from obtaining emergency knowledge quickly and accurately. For the above problem, based on the analysis of disaster emergency plans and organization coordination processes, this paper proposes an ontology-based knowledge representation method for natural disaster emergency plans. Finally, many efforts are made for the actualization of the emergency plan digital management system of natural disaster. The result shows that this method provides valuable reference to the formal representation of emergency plan.

    • Cross-Platform Time Synchronization Technology in SCADA System of Product Oil Pipeline

      2012, 21(9):137-140.

      Abstract (1228) HTML (0) PDF 809.83 K (2796) Comment (0) Favorites

      Abstract:Real time character is the common request of a pipeline SCADA system, as the own BIOS clock of the Cross-platform devices are not same and the transit delay of the network, time accuracy cannot be guaranteed which influent the product data transit in time and valid. This paper introduces a method of using the GPS clock source, NTP protocols and CIP protocols to achieve the initiative synchronizing system for Cross-platform SCADA system, which can ensure time accuracy and consistency with all the network devices, servers, clients and programmable logic controllers. Practice proved this method is valid.

    • Reviewing System for Solicited Articles

      2012, 21(9):141-143,102.

      Abstract (1222) HTML (0) PDF 914.24 K (2761) Comment (0) Favorites

      Abstract:The Chinese Academy of Sciences (CAS) has recently launched an articles-soliciting campaign to seek advise and suggestions worldwide on the future development of CAS. In order to ensure that the campaign proceeds in an efficient, fair and smooth way, the CAS Computer Network Information Center designs a JAVA+Oracle -based reviewing system to evaluate and select well-written articles. The system possesses a range of functions such as online article submission, experts and public review and evaluation, exhibition of award-winning articles, netizen online comments. The paper begins with a brief introduction of the campaign and then elaborates on the article reviewing system, including its design ideas and framework, function constitution, score-given methods by experts, and cheat-preventing methods, hoping to shed light on other articles-soliciting activities of various kinds.

    • PID Control System Based on PLC

      2012, 21(9):144-147.

      Abstract (1773) HTML (0) PDF 532.09 K (5114) Comment (0) Favorites

      Abstract:Using the servo motor control of the numerical control system as the example, based on the ARM microprocessor chip, this paper designs and implements a soft PLC. On this PLC, with the fuzzy control and PID control algorithm, completes parameter setting by MATLAB simulation. The paper designs a motor control system based on PID fuzzy algorithm. This system cannot only be used in numerical control system, but also be used in other industries motor control.

    • Synthetical-Exploit Underground Monitoring System

      2012, 21(9):148-151,132.

      Abstract (1212) HTML (0) PDF 1.09 M (2789) Comment (0) Favorites

      Abstract:Now domestic coal mine synthetical-exploit underground Automaticmonitoring system commonly has many problems such as the relatively independent operation of subsystem, poor real-time communication and stability. Therefore, the paper based on the Synthetical-exploit underground working face process in order to realize the main production equipment’s on-line monitoring and control, environmental parameters’ acquisition and monitoring and fault processing. Through the establishing Siemens S7-300 PLC main control station and the intelligence passive station, design a set of application of synthetical-exploit underground automatic monitoring ystem. The actual test show that the system is provided with good stability, high reliability for coal mine safety and efficiency of the production with the role which cannot be replaced.

    • Application of a Product Image Retrieval Based on Color and Shape Feature

      2012, 21(9):152-155.

      Abstract (1557) HTML (0) PDF 633.41 K (3214) Comment (0) Favorites

      Abstract:For product image retrieval, the method of retrieval based on color feature and shape feature is proposed. To obtain color featrue, Non-interval quantitative measure is used to extract color histogram, and setting a value number is to find the primary color. Implementing the algorithm of two-demensional function moment that is weighted to get the shape feature. As these two features are combined in retrieval, the results of math in product image achieve a highly level.

    • Relational Database Keyword Search Based on E-R Diagram

      2012, 21(9):156-161,140.

      Abstract (1621) HTML (0) PDF 1.20 M (3608) Comment (0) Favorites

      Abstract:With the development of information retrieval technology and database theory, how to achieve information retrieval technology in relational databases to obtain useful information, and the normal user can also be performed in relation database query with keywords, as recent research hot spot. Relation Database query system based on keyword, with which the user don’t need to know the database schema and structured query language, just inputting a few keywords. The article based on a prototype relational database-ER diagram, grouping entity according to different meaning. Following the keywords belonging to relation table, we can ensure the set of query entity, and dividing the range of query, to improve the efficiency of query. This paper presents a new algorithm to improve system precision. Finally, through experiments on the E-RKS system verifies verification.

    • Application of ECC and AES Algorithm to Security of CPU Card

      2012, 21(9):162-165.

      Abstract (1389) HTML (0) PDF 389.01 K (3870) Comment (0) Favorites

      Abstract:In order to deal with the safety problem of privacy in CPU card and Radio Frequency Identification (RFID) process, this paper proposes an encryption algorithm that combines the Elliptic Curve Crypto-system (ECC) with the Advanced Encryption Standard (AES). This method firstly uses the high efficiency secret-key to encrypt important information, and then use the AES to encrypt the communication information between CPU card and the reader and writer. Thus the important information will be encrypted double in the process of communication, even though attackers get the Radio Frequency CPU card or intercept the communication information, they can’t obtain useful information as quickly as they need. The experimental results show that the method improves the safety of the CPU card and against the attacks during the communication. The proposed mixed encryption algorithm plays an important role in the safety problem of privacy.

    • General Traceback Technical Framework for Internet

      2012, 21(9):166-170.

      Abstract (1424) HTML (0) PDF 2.45 M (3975) Comment (0) Favorites

      Abstract:In recent years, to deal with cyber threats, in academic community the traceback is proposed and developed, and a variety of traceback technology is researched. However, the majority of these research focuses on the specific traceability technology and algorithms, and traceback technical framework is lessly done. This articles from two aspects of collaboration domain and non-collaboration domain analysis the traceback technology, to track traceability system proposed non-cooperative domain, design a general traceback technical framework for Internet, which involve various traceback techniques or methods and play all kinds of technology advantages, realize traceback in the global Internet space, improve network security initiative and effectiveness.

    • Realization Technology and Application of Three-Dimensional Panorama

      2012, 21(9):171-174,165.

      Abstract (1749) HTML (0) PDF 2.37 M (3430) Comment (0) Favorites

      Abstract:Three-Dimensional Panorama is one method of the most important Scene representation about virtual reality and computer vision, the most simple panorama generation method directly uses the panoramic camera tools to shoot panoramic, but the cost is higher, so limited the universal use. This paper puts forward a kind of low cost method based on image mosaicing technique, a series of image sequences is processed. The method is used in virtual campus system of NanYang Institute of Technology, realized the virtual campus imaging roaming, greatly reduced the cost.

    • Improved Region Growing Method Based on "A Similar Points is Responsible for a Zone" and Its Applications

      2012, 21(9):175-178.

      Abstract (1179) HTML (0) PDF 1.34 M (2984) Comment (0) Favorites

      Abstract:Region growing algorithm is widely used in segmentation of special objects, but the slowly growing speed limits its application in certain area. In this issue, a new method is proposed to improve efficiency of Region growing. This method is based on a mechanism that a certain level zone is described by a single similar point. Only a region with many interior holes can be obtained with this method. Combined with Chain-code edge tracking algorithm, these interior holes can be filled completely and finally get regional compensation. With these two methods, an efficiency application system is established to analyze cells of chain-like algae.

    • Prisoners Location Information System Based on ZigBee Technology

      2012, 21(9):179-181.

      Abstract (1257) HTML (0) PDF 466.14 K (2785) Comment (0) Favorites

      Abstract:Prison is responsible for the social harmony and preventing and reducing crime. It’s self-evident to realize the importance of strengthening the intelligent and informationbased management of prison. Considering the development of the prison using modern management, this paper designs a prisoner location information system based on zigbee technology and makes CC2530/2431 from TI as a core. It states system network topological structure and structure schematic drawing and basic working principles, gives out the hardware circuit and mobile terminal software flow chart, designs prevent removing loop circuit for the mobile terminal emphatically. The system can realize personnel location, low power alarm and anti-demolition etc. Function.

    • Method of Edge Detection of Noise Image Based on Variogram Function and Directional Wavelet

      2012, 21(9):182-186.

      Abstract (1343) HTML (0) PDF 588.93 K (2742) Comment (0) Favorites

      Abstract:For detecting the edge of noise image, a new multiscale edge detection algorithm based on variogram function and directional wavelet is proposed. First, the criterions for the 45 degree and 135 degree directional edge in a image are proposed based on our previous research results and variogram function theory, respectively. Then, based on the direction of edges, an appropriate rotating parameter of directional wavelet is determined. The directional wavelet transform with different scales at different direction is implemented for different subregion. Thus, not only the accurate edge location is obtained, but also false edge points produced by noise and uneven gray scale in image are removed as much as possible. The results of simulation on the image contaminated badly by Gaussian noise indicate the performance of the proposed algorithm outperform the ones of the exist edge detection approaches with respect to maintaining edge and denoising.

    • Light Compensation Algorithm Based on MSRCR

      2012, 21(9):187-191.

      Abstract (1535) HTML (0) PDF 635.85 K (4439) Comment (0) Favorites

      Abstract:Multi-Scale Retinex algorithm is one of the effective traditional algorithms on illumination compensation to face image of poor quality. but the phenomenon such as the white and color distortion, low contrast, which might be produced during process of the retinex algorithm to face images. In order to improve the face recognition rate under complex light conditions, this paper proposes a new and multi-scale retinex with color restoration for light compensation of color images. On the basis of studying of MSRCR theory, bettering the original algorithm, and using the fast Fourier algorithm, so its speed is faster than that of the traditional method. Experiment proved the contrast, brightness, hidden details of images are enhanced by using the improved algorithm. This paper describes the principle and implementation method of the algorithm and at the same time compares it with histogram equalization, Gamma transform methods through experiments. Results of experiments show that good effects can be produced while using the algorithm for light compensation of color images.

    • Improved Genetic Algorithm for Traveling Salesman Problem

      2012, 21(9):192-194,191.

      Abstract (1857) HTML (0) PDF 1.22 M (2770) Comment (0) Favorites

      Abstract:Premature convergence usually appears in basic genetic algorithm. So, new crossover and mutation operators are designed. Greedy strategy is introduced in construction of genetic operator. Diversity of population becomes Rich because of introduction of new operators. New algorithm improves the ability of global search. The simulation indicates that the improved genetic algorithm can jump out of local optimum in a short time, and continue seeking the optimum.

    • Time Series Similarity Based on Discrete Cosine Transform

      2012, 21(9):195-197,186.

      Abstract (1368) HTML (0) PDF 742.92 K (3365) Comment (0) Favorites

      Abstract:In the research domain of time series similarity, there have been many approach that are developed to represent time series in the order of reducing the dimensionality. As one of the classic time domain-frequency domain transformation method, the discrete cosine transform has been widely used in the field of graphics and image processing. In this paper, we used this method to represent time series, and implenmet querying operation etc. on the transformed data. Our experiments indicate that this method obviously improve the performance compared with previous method.

    • Peak Depth Correction of Logging Curves Based on Hausdorff Distance

      2012, 21(9):198-201,170.

      Abstract (1540) HTML (0) PDF 792.37 K (3062) Comment (0) Favorites

      Abstract:An effective method of peak depth correction based on the Hausdorff distance is put forward in this paper. The automatic identification of logging curve peak made up the blank of automated processing of logging curve peak depth correction. In this method, the reasonable peak is selected by using the extremum and variable sequence analysis method, and the position of similar curve segment is selected according to the bidirectional Hausdorff distance, then the best matching peak is defined through computing the unidirectional Hausdorff distance. Finally, the peak depth correction of logging curves is computed. The experimental results demonstrate that the method of peak depth correction has better speed and high accuracy, and it provides reliable and accurate data for petroleum reservoir development.

    • Correcting Approach of Complete Line Drawings with Noises

      2012, 21(9):202-205.

      Abstract (1165) HTML (0) PDF 537.40 K (2501) Comment (0) Favorites

      Abstract:The influence of the noise is more powerful in line drawing’s internal than outline. As to this character, This paper presents a constraint-based approach to correct the line drawings with noises. Establishing the corresponding basic constraint equation from the implicit affiliation of three-dimensional plane and the parallel or vertical relationship between lines. Then, starting the iteration for the optimal location of the junctions unless meets the threshold. The approach has been demonstrated by experiments.

    • CT Image Sequence Segmentation Algorithm Based on Graph Cut and Region Growth

      2012, 21(9):206-209.

      Abstract (1453) HTML (0) PDF 543.45 K (5258) Comment (0) Favorites

      Abstract:Graph Cut algorithm applies to medical image segmentation has the excellence of high precision and high accuracy. But object and background seeds must be selected by intervention in all image. Region growth is good at segmenting small region object, but seeds must be selected first and the result is not accurate when low contrast. According to the strong relativity between medical CT image sequence, GCRGIS algorithm is proposed for the segmentation of medical image. Take the contour of the first image as the edge of the second image and then segmented by region growth after erode the edge. The result shows that this algorithm is high speed and high quality. It just needs to deal with the first image by intervention and to deal with next image automatic.

    • Object Tracking Algorithm Based on Particle Filter and Multi-feature Fusion

      2012, 21(9):210-213,223.

      Abstract (1870) HTML (0) PDF 1.22 M (3011) Comment (0) Favorites

      Abstract:In order to solve the problem that object tracking only based on color information always fails under the conditions of cluttered backgrounds, a tracking algorithm combining the color and structural information was proposed. Weighted color histogram based on HSV was used to describe the color model of the target, a structural model was developed by using target gray level image. The two features were fused in the frame of particle filter, the link is the calculation of the particle weight. Meanwhile, the weighs of fusing for color and structural were adjusted adaptively. The experimental results show that the proposed algorithm has more stability and higher accuracy.

    • Chinese Text Retrieval Method Based on Content

      2012, 21(9):214-216.

      Abstract (1683) HTML (0) PDF 468.00 K (3277) Comment (0) Favorites

      Abstract:With the rapid increase of information, retrieval technology is becoming more and more important. At present, many retrieval techniques are based on index retrieval techniques. This paper studies the search and index technology of lucene and recalculated the similarity of Lucene result and query in the Vector Space Model to improve the sort location of long query search result through the improved index information and the improved method based on content.

    • Watermarking Algorithm for Dual Color Images Based on the Value of Energy

      2012, 21(9):217-219,231.

      Abstract (1462) HTML (0) PDF 1.32 M (2755) Comment (0) Favorites

      Abstract:In this paper, we proposed an adaptive image watermarking by embedding a color watermarking image into a host color image. We divide the R, G, B channel carries on 8*8 blocks separately and makes DCT for the host color image, then insert the value of each component’ energy to three channels. The experimental results show that this algorithm has the good invisibility and robustness.

    • Improved Density Weighted Fuzzy C Means Algorithm

      2012, 21(9):220-223.

      Abstract (1535) HTML (0) PDF 510.07 K (2688) Comment (0) Favorites

      Abstract:Fuzzy C Means algorithm is popular soft clustering algorithm. It has been applied in many engineering fields. Density weighted FCM is its variant, which can solve FCM’s problem: sensitive to outlier and noise data. However, performances of both algorithms are heavily depend on proper initial cluster centers. This paper proposes a novice algorithm: Improved density weighted FCM based on nearest neighbor pair and its density, simulation results show initial center produced by the algorithm are very close to final cluster center. Thus IDWFCM can convergent very quickly and improve the performance.

    • Performance Measurement and Analysis of Communication Protocols

      2012, 21(9):224-227.

      Abstract (1254) HTML (0) PDF 634.11 K (3192) Comment (0) Favorites

      Abstract:In order to explore and demonstrate the advantage of TIPC in communication between processes, the TIPC was briefly introduced first, then the communication performance of TCP and TIPC was measured in full-scale. In the same time, detailed analysis was applied to the measurement data. The result got here could instruct the message package size choosing in parallel program. what’s more, the data got also indicate that the TIPC could get higher bandwidth than TCP. In this way Parallel program can be optimized and efficiency improved with communication in TIPC way.

    • Wireless Data Transmission Aapplications Based on STM32

      2012, 21(9):228-231.

      Abstract (1367) HTML (0) PDF 605.23 K (3676) Comment (0) Favorites

      Abstract:This paper describes the short-range wireless data transmission, achieved by The STM32F10XXX hardware development platform composed of the Cortex-M3 processor and a special wireless transmission chip nRF24L01. At the same time, a brief description of the STM32F microcontrollers and nRF24L01 configuration, given their circuit and the program of nRF24L01. Finally, through the actual test data, it can be used in the field of wireless intelligent home control system and others.

    • Ant Colony Optimization Algorithm with LionKing Competition Parameter

      2012, 21(9):232-235.

      Abstract (1674) HTML (0) PDF 488.79 K (2930) Comment (0) Favorites

      Abstract:The random selection strategy is the basic selection method for ant colony optimization(ACO) algorithm, but it tends toward resulting in the slow convergence and premature convergence. For the above-mentioned problems, this paper proposes a new method called ant colony optimization algorithm with LionKing competition parameter(ACO-). The algorithm profits from the laws of species competition(lion) and MAX-MIN Ant System(MMAS), improved the convergence speed and utilization quality. Meanwhile, in order to avoid stagnation of the search, the range of possible pheromone trails on each solution component is limited to a maximum-minimum interval. In the end, an example of Traveling Salesman Problem(TSP) is given in the paper, which is simulated by using MMAS and ACO-. The simulation resules show that the kind of advanced ant colony algorithm improves the nature of random search, so the algorithm can converge more rapidly to the optimization answer.

    • TCP Enhancement For Cognitive Wireless Network Based on MAC and TCP Cross-Layer

      2012, 21(9):236-239.

      Abstract (1307) HTML (0) PDF 659.14 K (2690) Comment (0) Favorites

      Abstract:In order to have a little affect on primary users’ transition, the second users have to be switched to another channel by the time the primary users come, therefore, the function of sensing should be attached to cognitive code in cognitive wireless network. The slow-start in TCP of cognitive code, however, is caused by the sensing and switching delay, which slow down transit-rate sharply. In this paper, TCP-CWN was proposed to get rid of the frequently slow-start. The algorithm was simulated in NS2, the experimental result illustrated that the TCP-CWN has better performance improvement than TCP when comes to transition in terms of reducing the influence of spectrum handoff in cognitive wireless network.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063