• Volume 22,Issue 2,2013 Table of Contents
    Select All
    Display Type: |
    • >Survey
    • Survey of Human Motion Analysis

      2013, 22(2):1-4,52.

      Abstract (1617) HTML (0) PDF 1.26 M (4057) Comment (0) Favorites

      Abstract:With the rapid development of computer vision, analysis of the human movement has been widely noted in computer vision areas. This research on the human movement is about the whole human motion, including extracting joint points first, then trcking the feature points and calculating the 3D coordinates of the points and display. The paper introduces from current situation of the three aspects.

    • >专论·综述
    • Web Application Development Security

      2013, 22(2):5-9.

      Abstract (1493) HTML (0) PDF 850.04 K (4035) Comment (0) Favorites

      Abstract:Web application security issues have become increasingly prominent, to improve the security of software source code and control the security risk during software development process becomes an urgent problem.This paper analyzes common web applications security vulnerabilities, including defect forms, causes preventive measures. This paper also puts forward some measures and methods in the prevention of security vulnerabilities during the software development life cycle. This paper also gives a method which can reduce security risk from two aspects-software development process management and technical measures. These means effectively imporove the security of web application we delivered.

    • A New Network Covert Channel Based on Web Access Model

      2013, 22(2):10-14.

      Abstract (1506) HTML (0) PDF 1.11 M (3495) Comment (0) Favorites

      Abstract:Network covert channel is a transmission scheme which hides the confidential information to normal network channel. Network covert timing channel does not modify the network packets, therefore it is more difficult to detect and more dangerous. This paper presents a new network covert timing channel based on Web access model. Malicious users transfer the confidential information by regularly access the Web server in this channel. We implement the prototype of the covert channel, and analyze the channel performance.

    • >系统建设
    • Defense of Infectious Viruses

      2013, 22(2):15-18.

      Abstract (1525) HTML (0) PDF 836.64 K (2978) Comment (0) Favorites

      Abstract:After designing a simple infectious virus, we find the Active Defense Strategy of mainstream anti-virus software can’t intercept the infectious operations effectively. Under normal circumstances, the original PE files of the system cannot be modified. According to this characteristic, the following article develops a way to realize initiative recovery by monitoring illegal write operation of original PE file and design a system–PEPS. The simulation experiments show that the method is more effective on the defense of infectious viruses than mainstream anti-virus software.

    • Green Cloud Computing Platform on Micro-server Cluster Architecture

      2013, 22(2):19-25.

      Abstract (1460) HTML (0) PDF 1.27 M (3058) Comment (0) Favorites

      Abstract:With the development and popularization of computer and network technology, IDC, as a unit with lots of computers and networks centralized installation and operation, has become an independent industry with a complete business model. Because in the IDC, there were thousands of computers running in a sealed environment, cost of power consumption of IT equipments and cooling air conductions accounted for more than 50% of total operation cost of the IDC. Andthe huge power consumption limited scale of the IDC construction. So a green energy saving machine room has become an inevitable choice for today’s IDC. At present, most of reducing power consumption measures are taken to external facilities, but not to servers which are a major part of the power consumption. The paper proposed a complete IDC solution based on reducing the server power consumption, solar main power supply and optimizing distribution system. Thenthe article discussed its principle and proposed Irene technical standards and Irene room construction specifications. Finally the green performance was validated through testing results and commissioning situation.

    • Small and Medium-Sized Enterprises Logistics Information Sharing Platform

      2013, 22(2):26-29,60.

      Abstract (2231) HTML (0) PDF 1.68 M (2968) Comment (0) Favorites

      Abstract:In view of the small and medium-sized enterprises in building their own logistics information system are in the capital and the technical difficulties, task group using PaaS mode for small and medium-sized enterprise develop-ment of logistics information sharing platform. It describes the small and medium enterprise logistics information sharing platform of the operation mode, clear the system function. Platform structure contains multi-layer, using Force data model and two data isolation method building database, through the server cluster and database vertical slit realize system extension. Through to the system prototype trial found that user experience is good, the system of small and medium-sized enterprises can improve circulation of commodities management efficiency, and effectively reduce enterprise logistics information construction threshold.

    • Targeted Customer Marketing and Maintenance System for Retail Industry

      2013, 22(2):30-33.

      Abstract (1316) HTML (0) PDF 1.05 M (2489) Comment (0) Favorites

      Abstract:According to the characteristics of the retail industry and the requirement of the domestic retailers group company, we propose and implement a solution of targeted customer marketing and maintenance system for retail industry based on data mart. It has been proved that this is a good solution. The pluggable software development framework based on business components proposed in the paper has been widely used in other software projects. It cannot only economize on a lot of manpower and material resources, but also accelerate the pace of software development.

    • Vehicle Accident Self-Rescue System Based on Smart Mobile Phone Groups

      2013, 22(2):34-37.

      Abstract (1173) HTML (0) PDF 877.50 K (2589) Comment (0) Favorites

      Abstract:Considering the deficiency that the existing automobile accident self-rescue system requires to assemble the specific sensor, GPS and communication module, the author designed a vehicle collision or crash detection and accident self-rescue system based on the smart mobile phone groups. Taking the acceleration signals of physical moments from the smart mobile phones in the accidents car as the input samples and the assembly of acceleration data as the calculating thresholds, the system can not only improve the accuracy rating of the judgments about the accidents, but can also reduce the unusable distress signals due to the damages to individual vehicle-borne device or mobile phone in severe accidents. When the signals exceed the threshold value, the system can draw support from the functions of video, GPS positioning and 3G networking in the mobile phones automatically to call for help from the rescue centre. Meanwhile, a prototype system has been implemented on Android platform. The results of the experiments indicate that the system possesses the advantages of high accuracy of collision or crash recognition, low energy consumption and low cost.

    • Architecture of PDM Based on Partner-Collaborative-Design Oriented

      2013, 22(2):38-41,9.

      Abstract (1193) HTML (0) PDF 1.21 M (2372) Comment (0) Favorites

      Abstract:To cater to the trend of enterprise business model converting from vertical integration to horizontal integration, the management platform based on partner-collaborative-design was designed to upgrade the original PDM system, and the Web Services-based system architecture was constructed to adapt for the change of the business model. The high-level architecture and service structure of the system were described in detail.

    • Crane Parameter Collaborative Design System Based on Cloud Infrastructure

      2013, 22(2):42-47.

      Abstract (1165) HTML (0) PDF 1.70 M (2780) Comment (0) Favorites

      Abstract:To solve the problem of lower degree of information sharing, the slower responsing market ability and the more duplicate work in the process for crane design. The shortcomings of the existing network collaborative design were analyzed, a new network design model--cloud design had been raised. The information sharing mechanism, cloud computing, cloud infrastructure was researched thoroughly. Based on it, the crane cloud design platform was constructed. Because of the characteristic that the crane has a higher structure type degree, parametric variant design and cloud design were combined organically, developed Crane parameter collaborative design system based on Cloud Infrastructure, and took a girder design of casting crane car frame as an example to verify it.

    • Speech Analysis GUI System Based on the Local Polynomial Fourier Transform

      2013, 22(2):48-52.

      Abstract (1364) HTML (0) PDF 1.03 M (2962) Comment (0) Favorites

      Abstract:Since the speech is nonstationary and time-varying, the time-frequency analysis is a useful tool to process the speech. However, the linear short-time Fourier transform (STFT) suffers from low resolution in the time-frequency domain, and the bilinear Wigner-Ville distribution (WVD) suffers from the cross terms when processing multi-component signals. Therefore, in this paper, the generalization of the STFT, that is, the local polynomial Fourier transform (LPFT) is employed to process the speech, and a speech analysis GUI system based on the LPFT is proposed. In the proposed GUI system, the analysis and comparisons for speech are realized in the time domain, the frequency domain, and the time-frequency domain. It is shown by the example that the LPFT is more suitable to process the speech. The proposed system is user-friendly, and is a good platform to process the speech.

    • CAD System for Aircraft Structure Static Test Design

      2013, 22(2):53-56,79.

      Abstract (1450) HTML (0) PDF 1.66 M (2753) Comment (0) Favorites

      Abstract:The ASSTDS system is a special graphical interactive CAD software for the aircraft structure static test design. The paper introduces the requesting analysis, function decomposing and object abstracting for the sofeware based on object-oriented technology and the object architecture in the software development. The main objects and their relationships are also described. ASSTDS is developed in the programming language VC++ on the Windows operation system.

    • Power Meter Detection System Based on Computer Vision

      2013, 22(2):57-60.

      Abstract (1196) HTML (0) PDF 923.26 K (2640) Comment (0) Favorites

      Abstract:This paper improved the template matching algorithm through the study of the basic algorithm of template matching on computer vision. Based on OpenCV open-source platform, a smart meter detection system is designed by VC++6.0. The system utilizes the improved template matching algorithm and detects multiple information of the power meter in effect and calculates defects. It’s very helpful to improve the quality of the power meter and ensure the reliability of the power meter. The experiments show that the system detects fast and real-time.

    • Electrocardiograph Detection System Based on STM32 and μC/OS-II

      2013, 22(2):61-63,25.

      Abstract (1470) HTML (0) PDF 1.34 M (3490) Comment (0) Favorites

      Abstract:The introduction of this paper is based on STM32 and μC/OS-II for ECG data detection system design and implementation. Using STM32F130ZET6 as the microprocessor, with TFT LCD screen Graphical display module and SD card data storage/read and write module and so on, and usingμC/GUI for managing graphical interface. The system implements the acquisition and processing of ECG signals, displaying in real-time on the LCD screen, control of touch screen, and storing the data in the SD card in order to transfer the date to PC and other functions.

    • Emergency Drills Program Dynamic Deduction System

      2013, 22(2):64-67.

      Abstract (1531) HTML (0) PDF 948.72 K (4125) Comment (0) Favorites

      Abstract:Simulation has become an important means to evaluating the feasibility and value of programs made by emergency command and rescue department. At present, there has no detailed study for the simulation exercise programs deduction system. This paper focuses on the program reasoning process in the emergency simulation exercise program, and designed a program based on Delta3D simulation engine deduction system. This paper also discussed the system architecture, the logical structure of the key modules and key technologies in detail. Using this system can be extended and build a variety deduction system of simulation exercises, effectively improve the ability of quantitative analysis for the program and rescue efficiency of the commanding officers and rescue personnel.

    • Distributed Data Stream Log Service System Built with Node.js

      2013, 22(2):68-71.

      Abstract (1451) HTML (0) PDF 827.09 K (4003) Comment (0) Favorites

      Abstract:This paper introduces a distributed log service System treating logs as data streams built with Node.js. and provides a solution to the problem that with the service number increases, the operation based on files gives rise to disadvantages that files I/O have performance bottleneck and have to be checked at multiple places. Logs are considered as a sort of data stream rather than files. Write a new log service system named octoLogStreamlet which collects the streams to a central storage with Node.js. Combining Node.js’ non-blocking I/O model and outstanding performance of NoSQL database, the system meets the requirements to cope with distributed data streams. The system is suitable for computer clusters needing centralized storage of logs, which provides great convenience for processing and utilizing logs.

    • Modeling and Control Scheme Design of Automatic Submerged Arc Welding System

      2013, 22(2):72-75.

      Abstract (1273) HTML (0) PDF 944.86 K (2342) Comment (0) Favorites

      Abstract:In allusion to the current situation that there is not yet mathematic model of describing the submerged arc welding system accurately, the mathematical model is established on the basis of mechanism modeling. Welding wire voltage drop son model, molten drop voltage son model and electric arc voltage drop son moder are established, which are regarded as the theoretical basis of the theoretical basis of the submerged arc welding system to control electric arc. And the corresponding variable speed wire control scheme is proposed according to the established model. By the control system simulation, it proves that the control scheme can maintain the stability between the wire feeding speed change and welding electric arc in the submerged arc welding process.

    • >软件技术·算法
    • Design and Implementation of the Software Pipelining Scheduling Framework for Multi-cluster Architecture

      2013, 22(2):76-79.

      Abstract (1221) HTML (0) PDF 712.59 K (2484) Comment (0) Favorites

      Abstract:This article describes the framework of the software pipelining scheduling for BWDSP100 multi-cluster architecture which is based on compile basic facilities IMPACT. The framewokr can fully exploit the hardware resources of Multi-cluster architecture and get better performance improvement in the application of the DSP features.

    • Application Security of Oracle Databas Stored-Procedure

      2013, 22(2):80-83.

      Abstract (1314) HTML (0) PDF 885.01 K (2911) Comment (0) Favorites

      Abstract:In the process of management information system applications, a small number of non-compliance staff without authorization to modify the stored procedure decompile the business logic in stored procedures or crack the database cryptographic checksum algorithm illegal to conduct business. This paper presents an oracle database stored procedure decompile and abnormal detection methods to solve these problems, it given the system design principles and implementation of a database stored procedure security application monitoring platform and gives a concrete realization of the key technologies.

    • Improved Learning Algorithm for RBF Neural Network

      2013, 22(2):84-87,47.

      Abstract (1454) HTML (0) PDF 1.04 M (4153) Comment (0) Favorites

      Abstract:This paper introduces a hybrid learning algorithm for Radial Basis Function neural network(RBFNN) based on subtractive clustering, K-means clustering and particle swarm optimization algorithm(PSO). The algorithm can be used to determine the number of hidden layer nodes and initial clustering centers of K-means by using subtractive clustering; Then the initial particle swarm of PSO can be formed by K-means clustering algorithm.The basic PSO algorithm are optimized and developed to improving convergence and stability of the algorithm, and finally the improved PSO algorithm is used to train all the parameters of RBFNN. The simulation for IRIS data set classification problem is executed, the experiment results show that the improved hybrid algorithm has higher accuracy and better stability than several other popular methods.

    • Bus Transport Transfer Algorithm

      2013, 22(2):88-91,137.

      Abstract (1295) HTML (0) PDF 1.24 M (4377) Comment (0) Favorites

      Abstract:Public transportation is not only a significant symbol of the urban modernization,but also an optimal approach of solving urban crowded traffic problem. The bus line search algorithm is the key technical query system. This paper summarizes the algorithm of public transportation optimum route choice of foreign and urban cities, and analyses the realization conditions and influence factors for effective running. The paper introduces the shortest path problem and Dijkstra algorithm and analyzes the drawbacks of its application in bus line query. Then the optimal travel route choice algorithm of mathematical model based on the smallest transfer is proposed, and the implementation of the algorithm is given. Based on the data of the public transportation company Yinchuan, a bus information query system design and development is completed.

    • Information Project Surveillance Based on Multi-Objective PSO

      2013, 22(2):92-95.

      Abstract (1156) HTML (0) PDF 679.49 K (2452) Comment (0) Favorites

      Abstract:In order to solve the complexity of the integrated management of information engineering surveillance, considering the control of the surveillance process about the quality, investment, and the progress. Resources as decision variables, optimize the overall duration as the goal, the establishment of the information engineering surveillance process multi-objective optimization model. Information engineering surveillance control to optimize the objective function of the multi-objective decision making problems the model constructed the objective function of the multi-objective decision that is the control of information engineering surveillance, combining with a multi-objective discrete particle swarm evolutionary(DPSO) algorithm, According to the characteristics of the specific problem, we define and design new particles evolution equation, and solve multi-objective optimization Control Objectives of information engineering surveillance.

    • Game Path Finding Algorithm Based on the Optimal Path Storage

      2013, 22(2):96-99.

      Abstract (1223) HTML (0) PDF 818.10 K (2517) Comment (0) Favorites

      Abstract:Researching some path finding algorithms used in the game, as well as some of the features of game path finding, and giving the routing algorithm based on the optimal path storage. Storing part of the optimal path through the optimal matrix to reduce the large number of repeated path computation, and improve the efficiency of path computation in the game. For the role movement in game scenes changing the state of path points to pass lead to the optimal path of the optimal path matrix invalid. Path update algorithm is given to update the optimal path of the optimal path matrix. As map path points become larger and larger, map paths are divided; then paths are stored for each sub-block using the optimal path matrix.

    • Application of the Finite State Machine to Simulation Training System

      2013, 22(2):100-103,124.

      Abstract (1211) HTML (0) PDF 1.08 M (2590) Comment (0) Favorites

      Abstract:In the study of the basic theory of the finite state machine and the application of the game development, combined with the actual needs of the emergency simulation training system, solve the system role of state controlling problem with a finite state machine controller components in Delta3D engines. This paper first introduces the basic theory of the finite state machine and the characteristics of the Delta3D engine architecture, designs a finite state machine example and describes in detail the finite state machine controller components of the overall structure,the basic functions and specific implementing way.

    • Moving Object Tracking Based on RSA-FCM Algorithm

      2013, 22(2):104-107,95.

      Abstract (1552) HTML (0) PDF 1.46 M (2620) Comment (0) Favorites

      Abstract:The research on tracking moving objects commonly uses color histogram as the main statistical characteristic which has a good result but is also vulnerable to illumination changes. The fuzzy color histogram in tracking can solve the above problems. Since fuzzy clustering has some inherent disadvantages, RSA-FCM algorithm was proposed to track moving objects, which used random sampling strategy in fuzzy clustering. Meanwhile, the proposed tracking method based on the adaptive fuzzy clustering model improved tracking accuracy. The experimental comparisons show that this algorithm behaves better than traditional method both on tracking accuracy and real-time performance.

    • Parallelization of Naive Bayes Algorithm Under MapReduce Framwork

      2013, 22(2):108-111.

      Abstract (1620) HTML (0) PDF 672.31 K (3640) Comment (0) Favorites

      Abstract:This article focused on the realization of the parallelization of Naive Bayes. When it comes to large-scal data or multi-attributes, the traditional singal node algorithm has a low efficiency,or even is unable to host large-scale computing. All of these make the traditional algorithm cannot fit the need to deal with massive data. Therefore, based on the basic theory of Naive Bayes and the framework of MapReduce, this paper proposed a parallelization method of Naive Bayes, which is efficient and cheap.At the end, it is proved by experiments that this method can effectively improve the efficiency of the algorithm so as to meet the need of peoople to deal with massive data.

    • Character Similarity Calculation of Community Site Based on User's Interest Change

      2013, 22(2):112-115.

      Abstract (1469) HTML (0) PDF 741.52 K (2536) Comment (0) Favorites

      Abstract:In view of SNS, the way to achieve friends recommended by measures the consistency of user’s static information or the number of common friends. But it ignores dynamic information and the change process of it. For this problem, this paper based on interest sets, the duration of interest and the interest sequence to structure a character model. Compares the similarity to achieve character similarity judgment. The results show that it is a good model to get friends.

    • Information Fusion Algorithm in Wireless Sensors Network

      2013, 22(2):116-120,205.

      Abstract (1327) HTML (0) PDF 1.44 M (2969) Comment (0) Favorites

      Abstract:Wireless sensor network(WSN) is the front line of technique. To reduce the energy consumption and extend the network’s survival time is the key research problem in WSN. It is proposed that multi-sensor information fusion is an effective way to reduce the communication data and save the energy consumption. This paper introduces three information fusion algorithms in WSN, and summarizes the improving methods.

    • Simulation Operation Software Design of Submarine Launcher Control System

      2013, 22(2):121-124.

      Abstract (1169) HTML (0) PDF 724.13 K (2445) Comment (0) Favorites

      Abstract:In order to reduce the cost of training, improve the training efficiency, the paper suggests to develop the simulation operaion software of submarine launcher control system. Operators can operate with the software instead of real the control console, so as to facilitate the operator to quickly familiar with the work flow of system, control method of operation. Based on the basic function of simulation operation software, the paper put forward to comprehensive use of VC, FLASH and 3DSMAX, to develop the simulation software. The configuration of the software is built by modular design. The function of each modular is analyzed. The software flow diagram is summed up at last.

    • Strong Designated Verifier Signature Scheme under Standard Model

      2013, 22(2):125-128.

      Abstract (1135) HTML (0) PDF 758.60 K (2446) Comment (0) Favorites

      Abstract:Strong designated verifier signature scheme enables the designated receiver to identify the source of a received message and prevent a third party from identifying the source of the message, which is well suitable for E-commerce and E-government applications. Based on decisional bilinear Diffie-Hellman assumption and gap bilinear Diffie-Hellman assumption, using bilinear pairing, a new strong designated verifier signature scheme is proposed. The security of the scheme is proved under standard model. The analytical results show that the new proposed protocol has unforgeability, non-transferability, privacy of the signer’s identity and non-delegatability for signature verification. This scheme is based on bilinear pairing, which means that it needs no certificate and has a simple key management. On the other hand, it is efficient in communications and computation, and implementation is simple, so that it could be implemented in mobile devices with low power and small processor.

    • Efficient Short Certificate-Based Signature Scheme

      2013, 22(2):129-132,145.

      Abstract (1654) HTML (0) PDF 1.08 M (2838) Comment (0) Favorites

      Abstract:Aiming at the construction problems of the efficient certificate-based signature scheme, based on the computational Diffie-Hellman assumption, an efficient short Certificate-Base signature scheme is proposed with provable security under the random oracle model. Moreover, compared with the available provable security certificate-based signature schemes, this scheme is optimal about the efficiency and the length of signature.

    • Application of Sales Volume Forecast of Group Purchase Based on Decision Tree Method

      2013, 22(2):133-137.

      Abstract (1534) HTML (0) PDF 784.46 K (3819) Comment (0) Favorites

      Abstract:Group purchase is a shopping mode that customers buying goods which been selling at a discount in a limited period of time and specific website. Nowadays, facing the large number of application of commodity. Group purchase website as a Platform, which has to intervene a lot of manpower for product review. Also may excessively dependent on the former experience. This paper intends to use the decision tree algorithm to analyse the sales volume of the group purchase goods. Generate readable decision tree to make a strategic decision and select the high quality goods.

    • Improved Adaptive Chaotic Differential Evolution Algorithm

      2013, 22(2):138-141.

      Abstract (1358) HTML (0) PDF 679.87 K (3519) Comment (0) Favorites

      Abstract:In order to improve the differential evolution algorithm for optimum speed and overcome the heuristic algorithm common premature convergence problem is proposed based on a Tent mapping (Tent) of adaptive chaotic embedded differential evolution algorithm (CLSDE). Tent mapping algorithm using of the generation of chaotic sequence to replace basic DE algorithm to select the operation of the random, and make full use of the chaotic motions of the randomness, ergodicity and regularity, so it can smooth out the problem of local precocious and rapid speed up its global convergence speed. Through the and chaos PSO algorithm and the ordinary DE comparison algorithm, the simulation results show that the new algorithm in the solution precision, stability and convergence borrows and good performance.

    • Automatic Signature Generation Algorithm of Polymorphic Worm

      2013, 22(2):142-145.

      Abstract (1247) HTML (0) PDF 682.98 K (2503) Comment (0) Favorites

      Abstract:This paper researches the feature description and automatic signature generation algorithm of polymorphic worms. It proposes a new signature generation approach for polymorphic worms-MS-PADS (multiple separated string position-aware distribution signature), which integrate the advantage of PADS and Polygraph. It solved the problem of PADS signature width determination under strong background noise conditions. This method could generate high quality signatures of polymorphic worms with low false-positive rate and high detection precision rate.

    • Char Drive Procedures Based on SPI Bus Protocol

      2013, 22(2):146-150.

      Abstract (1768) HTML (0) PDF 782.82 K (4216) Comment (0) Favorites

      Abstract:The paper describes the conceptions,classification and key_points of the char drive procedures.The most important is that the summary and analysis the details of SPI bus device driver. At the same time, this paper uses the mini2440 ARM9 development board as the realization platform.And the program listed in the paper has been tested successfully.

    • CSBTT: An XML Document Coding Schema Based on Binary Tree Traversal

      2013, 22(2):151-154.

      Abstract (1303) HTML (0) PDF 729.37 K (2743) Comment (0) Favorites

      Abstract:XML document data encoding scheme is foundation of XML document query processing. A good document encoding mode can improve the efficiency of XML document query. In order to resolve the inefficiency for XML data query and support dynamic updates, etc, this paper has proposed an improved method to encode XML document nodes. On the basis of the binary traversal, it introduces the trigeminal linked list storage structure of binary tree for encoding. It takes natural number as the serial number of the node encoding, so the encoding length is shorter. Besides, node parent pointer is used for encoding, which will facilitate to determinate the relationship between element nodes. Due to trigeminal linked list storage of nodes, the operation of the document update is more convenient.

    • Design and Implementation of Exporting Complicated Excel Report

      2013, 22(2):155-157.

      Abstract (1604) HTML (0) PDF 570.48 K (3223) Comment (0) Favorites

      Abstract:It’s a common feature in Management Information System that to export report to an Excel file. By analyzing the general structure of report, this paper shows an approach to export complicated report to an Excel file through Java Excel API based on a dynamic template.

    • >研究开发
    • Key Technology of Logistics Network Monitoring Based on Internet of Things

      2013, 22(2):158-160,213.

      Abstract (1518) HTML (0) PDF 1.46 M (2334) Comment (0) Favorites

      Abstract:The current safety management of transport logistics distribution mainly relies on the GPS technology, lacking of overall safety management technique. This article puts forward a logistics network monitoring technology. This method realizes the networking sensor systems, video surveillance systems, personal video communication command system, driver and passenger terminal, communication system and the comprehensive application of technology. Through the actual project application proves that the technology in the realization of security transportation safety, improve transport efficiency, management of transport performance, processing emergency function ability.

    • Adjacent Tree Trunks Scattering Characteristics Analysis Based on the Non-independent Model

      2013, 22(2):161-164,185.

      Abstract (1306) HTML (0) PDF 1.46 M (2611) Comment (0) Favorites

      Abstract:In this paper, the non-independent model is construted to study the scattering characteristic of the adjacent tree, which is particularly well adapted to the two tree trunks’ characteristic because of the complexity of the scatter. And in the dence forest, the characteristic of the adjacent trees is more important. The finite-length multi-layer dielectric cylinder was used to model the trunk,and the electromagnetic scattering model for two adjacent trunks was analyzed. This paper presented the excitation source, the ABC, the modeling and simulation’s process, then it provided the amplitude’s change according to the different distance between the two adjacent trunks and the RCS fluctuation because of the different incident angle. At last, the comparison between the two trunks and the single trunk was gived.

    • Signal Compensation Based on Fiber Optic Gyroscope

      2013, 22(2):165-168.

      Abstract (1329) HTML (0) PDF 844.33 K (2734) Comment (0) Favorites

      Abstract:The fiber optic gyroscope is an inertial instrument, which is used widely, but there are still many problems in the application of the FOG. The disadvantages of the fiber optic gyroscopes such as such as temperature effect, non-linearity of scale factory and disturbance. This paper analyses the principle and the signal output of the fiber-optic gyroscope. It establishes the compensate model of nonlinearity error and linearity error, uses signal processing algorithm and signal filtering algorithm to compensate variety of error. The signal processing algorithm is proved to be effective through actual experiments.

    • Design of Message Mechanism in the Simulation Training System

      2013, 22(2):169-172.

      Abstract (1203) HTML (0) PDF 1.12 M (2409) Comment (0) Favorites

      Abstract:There are many modules in the Emergency Rescue Simulated Training System, and information exchange between them is complex. This paper studies a set of message mechanism suitable for the simulation training system, which includes how the message is composed of message body and message type, how the message is created by message factory, message manager how to manipulate the message interacting with components, roles, and other parts. Finally, give an example for the analysis of the request synchronous message processing during the system and illustrate the relevance of messages with the system and the role it played in the system.

    • Recognition of 2D Character Barcode Image

      2013, 22(2):173-177,229.

      Abstract (1730) HTML (0) PDF 1.55 M (2767) Comment (0) Favorites

      Abstract:This paper takes 2D character barcode as the research object, makes the recognition problems of 2D character barcode. Because of 2D barcode image having the image blurring problems, This paper enhances image with piecewise linear grey level transformation,and uses improved 2D OTSU method to compute the interval boundary points according to the gray level distribution. The ButterWorth band stop filter is made to deal with the stripe nose appeared in the 2D barcode image. At last use the round-degree method to locate 2D barcode region. Experiments show that, this approach has a good performance on solving the image blurring and noise problems, and it could locate the 2D barcode region quickly and effectively.

    • Network Storage System Based on Spring MVC

      2013, 22(2):178-181.

      Abstract (1327) HTML (0) PDF 921.66 K (4033) Comment (0) Favorites

      Abstract:Network storage provided for user is the useful function for many application.The paper discuss the solution of Spring MVC. Users can create sub directory freely, upload files and manage directories as well as files on line. The system effectively solves the problem of the Chinese characters coding conversion about directory name and file name, as well as it solves the URI matching problem caused by the slash in current path. The application is used for information save at student personal space and group space in network teaching system,it provide the basics for group collaborative learning.

    • Application of Hough Transform to Detection of Flying Line for Digital Printing

      2013, 22(2):182-185.

      Abstract (1298) HTML (0) PDF 1.06 M (2697) Comment (0) Favorites

      Abstract:Aiming at flying line for digital printing, with the combination of image processing, this paper presents a technology based on Hough transform to build a automatic detection system of flying line for digital printing. Through extraction of characteristic linear information in fabric image based on Hough transform, flying line for digital printing can be detected by the cross-correlation coefficient. Finally, through comparing with manual inspection, the technology can fairly well detect flying line for digital printing.

    • Model and Simulation of BIT Fault Information for an Airborne Radar

      2013, 22(2):186-189,239.

      Abstract (1348) HTML (0) PDF 1.68 M (2629) Comment (0) Favorites

      Abstract:The model and simulation of the airborne radar BIT(built-in-test) fault information display is well realized based on VC++. The fuzzy subordination method is introduced in the model of the radar fault generation. Which is attached to the relevancy of the radar generated the practical fault. Display the fault on the platform, it is based on the difference of the operation and threshold of the radar high and low priority faults. Software design the page information of the radar fault, the model has been applied in the radar simulator and approved effective.

    • Implementation of IP Fast-Reroute Based on BFD

      2013, 22(2):190-193.

      Abstract (1195) HTML (0) PDF 887.61 K (3638) Comment (0) Favorites

      Abstract:IP network is widely applied in internet nowadays, Further be applied in a variety of telecommunications service bearing. but the design principles of the traditional IP network is to provide the service of best effort, and can’t meet the high reliability requirements of real-time business such as IP telephone and video conference. This paper will introduce the IP FRR of BFD rapid detection mechanism, which is presented to repair failure rapidly, reduce the packet dropout. And also the detection technology of BFD and the principle of IP FRR will be introduced in detail. At last, the result of experimentation is provided.

    • Design and Implementation of Automation Testing Framework Based on CUnit

      2013, 22(2):194-197.

      Abstract (1527) HTML (0) PDF 844.60 K (3042) Comment (0) Favorites

      Abstract:To XUnit, as a representative of the software to be automatic test framework has tended to mature. Based on embedded system application characteristics, this paper proposed a test automation framework based on the CUnit, and introduced the relevant implementation technology. The CUnit unit test framework was secondary developed, was made suitable for use in SPT6608A sunplus single chip microcomputer. In practice, the framework is proved effective, it can achieve to SPT6608A software modules of test automation.

    • Wavelet Image Compressed Sensing Based on Bayesian Model

      2013, 22(2):198-201.

      Abstract (1413) HTML (0) PDF 879.14 K (3109) Comment (0) Favorites

      Abstract:Most image compressed sensing algorithms improve the reconstruction quality by utilizing the correlation of parent-child wavelet coefficients. However, few people study the compressed sensing based on the fraternal relationship of the high-frequency coefficients. In this paper, a Bayesian-based image compressed sensing algorithm using joint reconstruction of high-frequency wavelet coefficients is proposed. Firstly, the high-frequency coefficients of the horizontal, vertical and diagonal directions in the same scale are sampled separately when executing compressed sensing. Then, a hierarchical Bayesian model is presented and the correlation is used when reconstruction is performed. Experimental results show that our proposed algorithm has higher image reconstruction quality than the existed MCS.

    • Design of Temperature-Humidity Monitoring System Based on Multi-thread Technique

      2013, 22(2):202-205.

      Abstract (1335) HTML (0) PDF 1023.77 K (2719) Comment (0) Favorites

      Abstract:The paper presents a multi-thread temperature-humidity monitoring system.The system uses SHT11 as the sensor and P89C52X2BN as the hypogenous machine, and realizes host computer software by multithread programming using MFC Socket. It excels at multipoint supervising, real time operation and accurate reflection of circumstances. Due to all the strengths mentioned above, it have been put into practical use.

    • Research and Application of the AAR Archive

      2013, 22(2):206-209.

      Abstract (1252) HTML (0) PDF 1.13 M (2406) Comment (0) Favorites

      Abstract:The AAR (After Action Review) archive technology is a tool to assist users in implementing qualitative analysis by providing quantitative information to them. This paper first introduces the principle of AAR theory, and then from the point of view of simulation exercises, simulation exercise system AAR filing system design, focusing on data collection, data analysis, drill playback of three core functions of the AAR system. Finally, the technical characteristics and scalability of the simulation exercise AAR archive is introduced.

    • Research and Design of Router of Enterprise Service Bus

      2013, 22(2):210-213.

      Abstract (1637) HTML (0) PDF 1.03 M (2623) Comment (0) Favorites

      Abstract:Enterprise Service Bus is a kind of software bus based on SOA architecture. It can achieve application integration. We improved the ESB-across router by analyzing the defects of the existing ESB routing. It implements the dynamic message routing based on rules and routing strategies, and can across the ESB to interact. The actual operation of the system shows that the design has good effect.

    • Research and Design of the Enterprise Service Bus Listener

      2013, 22(2):214-217.

      Abstract (1587) HTML (0) PDF 1.07 M (2669) Comment (0) Favorites

      Abstract:ESB system is a software bus which based on SOA architecture to achieve application integration. Listener is an important component in ESB system, whose research and design have an important impact on the performance and availability of the ESB.The main task of listener is monitoring the service-dissemination messages and service request/ response messages, in addition,it provides access-controling and Message-authentication. This paper raises an more efficient concurrent monitoring technology and a safety way of the message-adaptering technology. These technologies have solved the problem of the efficiency of the concurrent monitoring of multi-protocol messages; and have made a deep study in secure authentication modules of the ESB internal message and have raised a high security design.

    • Image Retrieval Method of IQBIC System

      2013, 22(2):218-220,168.

      Abstract (1352) HTML (0) PDF 1.36 M (2871) Comment (0) Favorites

      Abstract:There are mainly three methods in Image Retrieval Based on Content, i.e., retrieval technics based on shape, texture and colour features. Different images and uses require selection of retrieval methods through different featuers. Therefore, in this paper, we first analyze the features of the image itself, trying to find its most obvious features, and then, according to the analysis results, apply suitable Retrieval Method Based on Feature to retrieving this image to make the Image Retrieval Technic more intelligent and thus to get better effects. This paper puts forward calculation methods of Colour Histogram, Shape and Dierction Energy Histogram and Cumulative Run-Length Histogram, then briefly describes the Intelligent Selection Method Based on Image Feature, and states that the final result of the test is satisfying.

    • RESTful Web Services Applied in Information System

      2013, 22(2):221-225.

      Abstract (1328) HTML (0) PDF 942.22 K (2841) Comment (0) Favorites

      Abstract:The RESTful Web Service is a lightweight framework which includes some important ideas such as addressability of resources, statelessness, connectedness, and uniform interface and has good interaction and elasticity by its loose coupling and other distributed components. Since there is no need to introduce the complex SOAP, it is easier to use, easier to combine than RPC-style services and has gained wide spread acceptance across the web. In this paper, it is researched how to use Restlet framework to build RESTful Web Services in a Chinese medicine information system.

    • Development and Implementation of Embedded Digital Megger GUI Based on Qt/Embedded

      2013, 22(2):226-229.

      Abstract (1685) HTML (0) PDF 871.04 K (3450) Comment (0) Favorites

      Abstract:Based on the Qt/Embedded, this paper designs a kind of embedded digital megger GUI. It uses touch screen instead of original mechanical switch, establishes database storage and finally realizes some functions which current digital megger lacks, such as the storage and printing of history datathe history printing.

    • Marine Simulation Based on Particle System

      2013, 22(2):230-232,225.

      Abstract (1390) HTML (0) PDF 1.35 M (3287) Comment (0) Favorites

      Abstract:With the unceasing development of computer simulation technology, Marine environmental simulation becomes more widely used, but it is still a tough and critical issue which work against us to build a vivid environment. The paper detailed analysis of ocean model and bow wave special effect simulation, shows how to build a Virtual Marine environmental by Visual Studio 2003.net and Vega Prime, the introduction of Particle system during the development process makes it more realistic and immersive.

    • New Dictionary Mechanism for Chinese Word Segmentation

      2013, 22(2):233-235.

      Abstract (1352) HTML (0) PDF 749.39 K (3010) Comment (0) Favorites

      Abstract:Word query in Chinese Dictionary is essential part in Chinese information processing system. It has a great impact on system efficiency. The Chinese word segmentation has been studied since the late 1980s. In order to improve the existing word query efficiency, for short word of no more than 4 Chinese characters, a new hash algorithm is proposed, named Zipper-style hash indexing based on the value of each characters in Chinese word. The hash value is calculated according to machine code of each character, the weight of the left character is big than the right. The weight is equal to the maximum value of all Chinese characters minus the minimum value. The speed of word query is improved with this kind of Zipper-style Chinese word value hash indexing.

    • 35KV Dry Type Transformer of Intelligent Temperature Control System

      2013, 22(2):236-239.

      Abstract (1318) HTML (0) PDF 995.72 K (2975) Comment (0) Favorites

      Abstract:35KV dry type transformers due to overload, short circuit causes such as elevated temperature, the use of TMS320F2812 digital signal processing chip design of a smart temperature control system, the hardware circuit is simple, easy, and can be remotely monitored. Successfully test the functionality of the system to achieve the protection of transformers and intelligent control.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063