• Volume 22,Issue 3,2013 Table of Contents
    Select All
    Display Type: |
    • Operation and Maintenance Management of IT Systems

      2013, 22(3):1-5.

      Abstract (2487) HTML (0) PDF 871.75 K (3696) Comment (0) Favorites

      Abstract:Based on all aspects of the ITIL service support management processes, this paper has analyzed IT operation and maintenance service management, and proposed a operation and maintenance management framework from project development to eventually run on the basis of the original process. The framework includes the development maintenance and operation maintenance, the development phase record the project development tasks and solutions and control the progress of the development through the document management, project dynamic management, progress monitoring and knowledge management. In the maintenance stage, according to incident management, problem management, configuration management and knowledge management processes to monitor the operational status of the system, resolve the failure quickly and in a timely during the runtime of IT system. IT systems feedback information to the operation and maintenance department through the Help-Desk, and it is convenient for operation and maintenance department to manage IT systems uniformly.

    • Prospects of GPU Using in Oil and Gas Exploration

      2013, 22(3):6-10.

      Abstract (1512) HTML (0) PDF 517.78 K (3428) Comment (0) Favorites

      Abstract:Oil and gas exploration data processing involves a lot of calculations thus needs high performance computing technology. GPU as a new kind of high performance computing technology can cooperate with CPU completed some computing intensive tasks. The GPU programming features make it more suitable for medium and small scale intensive computing environment. When introducing this technology the careful consideration of configuration model should be taken. The cooperation of GPU/CPU is a better way to enhance the efficiency of processing system.

    • Literature Review on Automatic Metadata Extraction of Scientific Paper

      2013, 22(3):11-15.

      Abstract (1327) HTML (0) PDF 342.18 K (2742) Comment (0) Favorites

      Abstract:From the perspectives of metadata attributes and metadata granularity, the metadata of scientific paper is analyzed. On this basis, the research on metadata extraction of scientific paper in domestic and international are analyzed and synthesized from two aspects of the theoretical research and application in practice. Finally, the features and shortcomings of the current research are pointed out.

    • Energy Efficiency Comparisons for PostgreSQL Under Different Governors

      2013, 22(3):16-20,24.

      Abstract (1412) HTML (0) PDF 1.04 M (2524) Comment (0) Favorites

      Abstract:Energy-efficient DBMS has become a hot research topic for recent years. CPU DVFS is an effective dynamic power management scheme. This paper looks into the relationships between performance, energy and power in PostgreSQL under different governors with the aim to discover the power saving effectiveness in DBMS from hardware perspective. After running 22 TPC-H benchmark queries, we summarize the effects of 4 governors on different query processing operators. The experiment results show that CPU DVFS is effective on DBMS energy-efficiency, and different query operators have their respective power usage characteristics and can be exploited to design more efficient customized governors.

    • Hadoop Cloud Computing Model Based on Parameters Optimization

      2013, 22(3):21-24.

      Abstract (1512) HTML (0) PDF 582.38 K (2993) Comment (0) Favorites

      Abstract:The traditional data analysis, it is difficult to meet data processing efficiency requirements at this stage. Application of Hadoop cloud computing technology, realization of data storage and analysis, improve the efficiency of data storage and analysis. This paper is on the basis of summing up the pros and cons of traditional system, with Hadoop Distributed File System (HDFS) to replace the existing stand-alone data storage, map/reduce application instead of the traditional stand-alone data analysis, and make the optimization. The experiment approves that the feasibility of Hadoop system architecture in the production deployment and using.

    • Emergency Drill Role System

      2013, 22(3):25-28.

      Abstract (1528) HTML (0) PDF 713.63 K (3164) Comment (0) Favorites

      Abstract:Emergency drill system for accidents in production practice of emergency management has important guiding significance, and role system is the core of the drill system, which provides the scene interactive objects for drill system. This paper, which based on the emergency drill system requirements and architecture, uses object-oriented design method to design a universal role system structure, including the design of role class, the design of skills as well as the design of data of the algorithm of management. This paper expounds the main function of role system and designs process of role system and solves the role of the reusability, coupling. At the same time, it can be dynamically bound role skills and data attributes, improve and enrich the role system through the data configuration. Finally, this paper introduces the specific application of the model and advantage of role system.

    • Management and Controlling Platform for New-Generation Graphical Terminals of Bank Counter

      2013, 22(3):29-33.

      Abstract (1727) HTML (0) PDF 558.49 K (3456) Comment (0) Favorites

      Abstract:This article highlights the issues of management of graphical terminals, such as high complexity of management, lack of monitoring. A security framework of terminal management and controlling is provided with the focus on the building of management and controlling platform to solve the issues. The importance of secutiry strategies, procedures and standards is emphasized in the framework. Practice has proved that the management and controlling platform can help IT manage and control the terminals in all its aspects, effectively supporting bank business innovation.

    • Safety Analysis and Construction of Government Financial Management Information System

      2013, 22(3):34-36,72.

      Abstract (1521) HTML (0) PDF 1.24 M (2574) Comment (0) Favorites

      Abstract:Based on codes and standards of China's information syetem security level system, the paper analyzes security evaluation of government financial management information system (GFMIS), and discusses the design of classified network security pmtection of government financial management information system including protection of security domain classification. The Paper presents some convenient and effective ways to further improve measures of government financial management information system security safeguards.

    • Tumor Diagnosis WEB Platform Based on Mass Spectrum Data

      2013, 22(3):37-41.

      Abstract (1400) HTML (0) PDF 762.48 K (3140) Comment (0) Favorites

      Abstract:With the development of proteomics mass spectrometry and intelligent algorithm, using intelligent algorithm to analysis clinical mass spectrum data had showed a good application prospect in the tumor early diagnosis. Based on the study of MATLAB Builder JA Toolbox and intelligent algorithms which are used to analyze protein mass spectrum data, and combing with JavaEE technology, we design and achieve a tumor diagnosis web platform based on protein mass spectrum. The platform mainly achieves three big functions which are mass spectrum data visualization display, intelligent matching and intelligent diagnosis algorithm. While still providing patients' basic information and tumor data management, mass spectrometry biological characteristics site settings and the analysis results data storage such as additional functions.

    • College Enrollment Management Information System Based on the PowerBuilder' Distributed Application Architecture

      2013, 22(3):42-45.

      Abstract (1352) HTML (0) PDF 1.03 M (2625) Comment (0) Favorites

      Abstract:According to the current situation of college enrollment management, based on the PowerBuilder' Distributed application architecture, this paper constructs college enrollment management information system. This system uses C/S structure to realize the enrollment information centralized data processing and B/S structure to realize information any query. Based on C/S structure' internal business function and B/S structure external access to the WEB server, this system also realizes the business division of inside and outside.

    • Applying Workflow Technology to China Patent Electronic Approval System

      2013, 22(3):46-50.

      Abstract (1520) HTML (0) PDF 678.44 K (3310) Comment (0) Favorites

      Abstract:This paper introduces the application of workflow technology in China Patent Electronic Approval System. Starting from an overview of industrial characteristics, it covers an analysis and description to workflow definition, model design and the process design respectively. This paper is based on the principle of partially ordered set. The business process in patent examination has been provided as an example. In the end some existing problems in the application of workflow technology is stated.

    • Design and Implementation of the Open Experimental Teaching Management System Based on Entrace Guard System

      2013, 22(3):51-54.

      Abstract (1476) HTML (0) PDF 759.36 K (2585) Comment (0) Favorites

      Abstract:The new open experimental teaching management information system integrates entrance guard system technology, computer network technology, database technology and web technology. The paper mainly introduces the general plan of this system, the integration with entrance guard system and its newly subsequent function.

    • Power Generation Control System of Biogas and Solar Integration

      2013, 22(3):55-58.

      Abstract (1529) HTML (0) PDF 726.19 K (3053) Comment (0) Favorites

      Abstract:Based on the analysis of biogas, solar integration system structure, and its working principle, this paper designs and realizes a power generation control system design of biogas and solar integration. The system CPU is Atmega88, and its remote controller is GSM wireless communication module. Meanwhile, this paper presents the structure, schematics, components selection, technical indicators of the system hardware circuit design, and also the workflow of the system software design.

    • Teaching Resources Sharing Platform

      2013, 22(3):59-63,84.

      Abstract (1968) HTML (0) PDF 1.42 M (3751) Comment (0) Favorites

      Abstract:In view of professional teaching resources repository construction of complex, high cost and other issues, development of the higher vocational school teaching resources sharing platform. The article elaborated the higher vocational school teaching resources sharing platform operation mode, the system function. Platform uses PaaS model, through the atomic function combination and distribution field to realize the personalized configuration and horizontal expansion. Design of database of the "shared database, data structure" model for the management of sensitive data, data layer extends horizontally using the read/write separation technology, convenient to extend through the platform, the actual trial found teaching resources, convenient search, the user experience is good, can reduce the higher vocational school teaching resources repository construction technology.

    • Real Arms Maneuver Reappearance System Driven by Flight Data

      2013, 22(3):64-68.

      Abstract (1862) HTML (0) PDF 657.03 K (3498) Comment (0) Favorites

      Abstract:To meet the demand of different angle visualization on real arms maneuver flight data, a real arms maneuver reappearance system driven by flight data was proposed. The system constitute, Primary function and realization method were introduced. The system constitute diagram and signal floor diagram were provided, and some key technologies were analyzed including flight data interpreting, flight data singularity omitting, flight data interpolating, two-dimension simulation based on MapX and three-dimension flight reappearance based on Mantis. The system has realistic scene and abundant information, and it bases on fact. The system provides army and department with new platform to evaluate the real arms maneuver and to study new tactics.

    • Distributed Honeynet Based on Virtualization Technology

      2013, 22(3):69-72.

      Abstract (1575) HTML (0) PDF 758.85 K (3426) Comment (0) Favorites

      Abstract:Build honeynet reasonably can help administrator capture the hacker behavior successfully to enhance network security. It will cost much people and material resources to deploy multiple honeypots in a distributed environment, we can use virtualization to do it. This paper use low interaction honeypot build a distributed virtualize honeynet based on Vmware, share attack log using XMPP server, and visualize the data sets with carniwwwhore.

    • On-Board Vehicle Monitoring and Fault Diagnosis System Based on SAE J1939

      2013, 22(3):73-77.

      Abstract (1649) HTML (0) PDF 826.73 K (5667) Comment (0) Favorites

      Abstract:A solution of monitoring vehicle conditions and fault diagnosis based on the SAE J1939 protocol is proposed. The system is mainly composed of the master controller S3C2440 and the stand-alone CAN controller MCP2510; and the software is developed in embedded Linux platform. The system can monitor the operating parameters of vehicle and do fault diagnosis on-line, which improves the safe operation of vehicles.

    • Construction of the Platform Based on the Marine Environment and CRIO Labview Measurement

      2013, 22(3):78-80,99.

      Abstract (1386) HTML (0) PDF 1.10 M (2562) Comment (0) Favorites

      Abstract:With the deepening of the marine research, the marine variety of environmental physical field attract more and more attentions, which requires comprehensive measurement of multi-physics of the marine environment. Traditional testing methods is far from being able to meet the requirements for the investigation of marine resources, especially in the need for the simultaneous measurement of multiple physical field, the range of a variety of physical field acquisition system hardware will greatly reduce the flexibility of the measurement and system security and reliability. Therefore, the development of miniaturized, intelligent measurement system has become a new challenge.

    • Pressure Information of Bridges Collection System Based on IoT

      2013, 22(3):81-84.

      Abstract (1725) HTML (0) PDF 625.73 K (2615) Comment (0) Favorites

      Abstract:The pressure information collection of bridge buildings is important to monitor the healthy status of the bridge buildings. For the defects of traditional pressure information collection system, the paper designs a system for collecting the pressure information of bridges based on the IoT. To meet the demand of real time, the system sends the pressure information collected by pressure sensors to the data processing center through the CAN bus. Before storing the pressure information into the database, the system will fill the incomplete pressure information to provide the bridge experts with useful information. Simulation experiments show the system can collect the pressure information of bridges in real time and meet the demand of bridge experts.

    • Design of Parking Space Sensor Controller

      2013, 22(3):85-90,112.

      Abstract (1702) HTML (0) PDF 1.13 M (2729) Comment (0) Favorites

      Abstract:A parking sensor controller is proposed. The ultrasonic signal transmitted circuit and ultrasonic signal received circuit is designed to realize the detection of vehicles based on the ultrasonic reflection principle. Stepping motor, which is designed to be the core part of parking barrier, controls the open and close actions of the parking barrier on the basis of drive circuit. The results of experiment show that the parking sensor controller can detect the state of parking space and control the parking barrier automatically.

    • Application of Psychiatric Hospital Management Platform Based on the Electronic Medical Records

      2013, 22(3):91-95.

      Abstract (1526) HTML (0) PDF 802.36 K (2595) Comment (0) Favorites

      Abstract:According to the real situation of the mental hospital, a comprehensive information management solutions was put forward based on the electronic medical records as the core, the integration of existing resources, unified integration, the sharinginformation, and the services for patients in the hospital. It also lays foundation for the future implementation of the sharing regional medical information.

    • A Novel Model for Mining Frequent Paths Based on Page Value and Jump Preference Degree

      2013, 22(3):96-99.

      Abstract (1207) HTML (0) PDF 468.27 K (2032) Comment (0) Favorites

      Abstract:A model is designed and implemented for mining user frequent paths from Web log. An important basis for webpage clustering analysis is proposed, as well as the concepts of page value and jump preference degree. Then we build the page value model. The distances of page value are calculated out from the Page Value-User Matrix, then the value-equal page set is obtained according to the distances. After that, the set is transformed to binomial frequent path set. Finally the user frequent path set can be obtained by applying an adaptive merging algorithm. Experimental results show the model has better accuracy with high efficiency.

    • Framework for Chinese Word Segmentation with Dynamic Updating Dictionary

      2013, 22(3):100-103,50.

      Abstract (1253) HTML (0) PDF 826.19 K (2882) Comment (0) Favorites

      Abstract:Aiming at new word appearing and updating frequently in the Internet, through combining mechanical segmentation and rule-based segmentation, a framework for Chinese word segmentation with dynamic updating dictionary is provided. We improve a new dictionary design structure and ambiguity processing rules. Also the concept of mutual information in Statistics is used in determining the new word. The experiment shows that the framework for Chinese word segmentation proposed in this paper has high precision and is adaptive in different domains.

    • An Improved Distributed Hierarchical Information Fusion Algorithm in Wireless Sensor Network

      2013, 22(3):104-107.

      Abstract (1225) HTML (0) PDF 487.16 K (2376) Comment (0) Favorites

      Abstract:Information fusion technology is a multidisciplinary highly integrated popular research fields. In view of the security threats in the coal mine environmental monitoring system, A distributed hierarchical information fusion algorithm is proposed in wireless sensor network. In the source, the inproved Kalman filtering are used to reduce the power consumption and data collision. In the sink, the dynamic weighted fusion algorithm based on linear minimum variance sense is adopted. This method is minimize the overall power consumption and the probability of collision in the network as well, it can realize signal reconstruction. A simple example is performed to verify the reliability and fusioning precision of this method, at the same time it has high fault-tolerant.

    • Database Design for Vehicle End-of-line Testing System Based on J1939

      2013, 22(3):108-112.

      Abstract (1296) HTML (0) PDF 520.63 K (2940) Comment (0) Favorites

      Abstract:SAE J1939 protocol is a kind of vehicle network that widely used in heavy vehicles, it defines a large amount of information in detail, the status information of some important electronic control units can be gathered up through analyzing the data message from vehicle. Aiming at the testing requirements for the vehicle manufacturers at the end of production line, a database model is built by using the PowerDesigner tools based on SAE J1939 protocol. A physical database in database management system is generated and the full .NET framework code as the data access layer of the database application system is created using CodeSmith and .Nettiers templates, which can realize the data support to the J1939 protocol in the end-of-line testing system.

    • Neural Network Digital Characters Recognition Based on the Combined Feature

      2013, 22(3):113-116,54.

      Abstract (1722) HTML (0) PDF 955.56 K (2192) Comment (0) Favorites

      Abstract:The digital characters recognition method based on the combined feature which is used as input layer feature vector in Bp neural network is proposed. First, segment feature, which is introduced in this paper, and the ranks of the statistical characteristics of the numeric characters are combined as a new feature. Then, Bp neural network classifier is designed according to the combined new feature. Finally, when the training sample set is trained according to the training method of the BP neural network, the recognition results of the test sample set can be acquired. According to the result, the recognition rate can reach at above 94%.

    • Detection Rips in Conveyor Belts Based on Saliency and Maximal Entropy

      2013, 22(3):117-120.

      Abstract (1579) HTML (0) PDF 609.37 K (2267) Comment (0) Favorites

      Abstract:Under the background that conveyor belts are prone to rips in operation, According to the characteristics of human visual system and information theory, an algorithm for detecting rips in conveyor belts based on visual saliency and maximal entropy is proposed. Regions of interest are firstly extracted in frequency domain, and then a threshold is obtained through calculating the maximal entropy of saliency map to segment the grayscale image. Experiments show that the algorithm is stable and adaptable.

    • Improved Method of Total Variation Image Inpainting

      2013, 22(3):121-124,58.

      Abstract (1488) HTML (0) PDF 1.52 M (3194) Comment (0) Favorites

      Abstract:The image inpainting algorithm based on total variation model is analyzed. For the different size of the gradient value of each reference point, an improved image inpainting algorithm is proposed. The algorithm constructs a spread function by calculating the gradient information of pixel, and then they are weighted. Spread function control the contribution of the reference point on the repair area. Experimental results show that this algorithm works better in repair of damaged images which changes dramatically and the region is larger. Also, the image sharp edges and the boundary transit naturally.

    • Color Inverse Halftone Image Quality Assessment Algorithm Based on Structure Similarity

      2013, 22(3):125-127.

      Abstract (1410) HTML (0) PDF 465.62 K (2456) Comment (0) Favorites

      Abstract:Most image assessment methods based on human visual properties only take into account the early stage of the HVS. But natural image signals are highly structured, and the human visual system is highly adapted to extract structural information from the viewing field. Based on the two points above, an assessment method with structural similarity is proposed. The experimental results indicate that the two methods correlate with Mean Opinion Score well.

    • Color Image Segmentation Based on Color Similarity of RGB Model

      2013, 22(3):128-131,160.

      Abstract (1381) HTML (0) PDF 894.17 K (6058) Comment (0) Favorites

      Abstract:The research of color image segmentation attracts more and more people's attention for color image has more information than gray image. In this paper, a novel color image segmentation method is proposed based on color similarity in RGB color space. According to the color and luminance information in RGB color space, the dominant color is determined firstly; then a scale invariant and semantic mathematic model, called SIMILATION, is exploited to calculating color similarity, and Combined with the proposed calculations method of color component, which creates a color-class map. Finally, the information of the corresponding color-class map is utilized to classify the pixels. Experimental results clearly show that the proposed color similarity based color image segmentation algorithm is accurate, robust with low computational complexity.

    • Research and Design of the Protocol Converters of the Enterprise Service Bus

      2013, 22(3):132-135.

      Abstract (1289) HTML (0) PDF 651.99 K (2111) Comment (0) Favorites

      Abstract:In order to integrate the different application programs, the Enterprise Service Bus need parse the request service and the corresponding analytical protocol. The Protocol converter realized that the agreement of an application program is mapped to the agreement of the application, and the two application programs will not know the need and the action of such mapping. the paper puts forward that the ESB are going to shift the data into the data in a unified XML format, and manipulate the data based on a parallel approach to parsing of XML, so as to realize the transparency of the transmission protocol.

    • Implementation of Filtering URL Based on BHO(Browser Helper Object)

      2013, 22(3):136-139,169.

      Abstract (1163) HTML (0) PDF 782.43 K (3378) Comment (0) Favorites

      Abstract:Filtering URL is an important problem on information security. This article has researched working-machanism of BHO, and introduced technology implementation of BHO on filtering unlawful URL using the Delphi7.0, and gave an effective method of Filtering URL by BHO.

    • Mechanism of Enterprise's Services Migration Based on Security Baselines

      2013, 22(3):140-143.

      Abstract (1229) HTML (0) PDF 596.15 K (2254) Comment (0) Favorites

      Abstract:This paper proposes a mechanism of services migration in the background of the operation management of large enterprises using the notion of "security baseline". It splits the original migration into two parts. First, transport the environment on the server, which includes the custom, transform, distribution and deploy of baselines, and then the running services. By this way, the preconditions of the businesses and the services will not be omitted and the environment is guaranteed. Furthermore, it is of convenience that one can control multiple servers from one terminal. Finally, this paper introduces the realized system and the baseline transform algorithm in detail. The experiment result shows that the mechanism is high efficient and satisfactory.

    • Program Control Flow Graph Based on the Similarity of Source Code Analysis System

      2013, 22(3):144-147.

      Abstract (1491) HTML (0) PDF 444.96 K (3771) Comment (0) Favorites

      Abstract:It is very important to detect source code similarity in the field of both software engineering and computer science education. Source code stealing and copyright dispute in software engineering, as well as plagiarism detection of student assignment in programming course, call for automation of source code similarity detection. Reliable software to detect source code similarity also helps in the field of source code clustering and source code searching in wide range. Though such problem rises along with the invention of program language, there is not satisfying research result up till now. Source code has its particular structure, making it improper to use traditional pure text similarity detection method over it. This paper first introduce the history and current progress of this problem, analysis the difficulty, then presents a new system for source code similarity detect base on control flow graph analysis, along with the algorithm it uses and the implementation details. In this paper we also discuss the advantage and disadvantage of the method and ways of improve it.

    • Cluster-Based Routing Protocols for Wireless Sensor Networks

      2013, 22(3):148-152.

      Abstract (1611) HTML (0) PDF 398.66 K (2786) Comment (0) Favorites

      Abstract:Routing technology is pivotal in the architecture of wireless sensor networks. In which Cluster-based routing protocols excel in network topology management, data aggregation, etc. In the paper the cluster-based routing mechanisms for wireless networks are analyzed. The emphasis focuses on Cluster head selection, cluster formation and data transmission. After doing research on typical algorithms, the paper compared their performance, and pointed out some research issues.

    • Analyzing and Debugging the Errors of C Language Pointer

      2013, 22(3):153-156,181.

      Abstract (1716) HTML (0) PDF 840.25 K (3831) Comment (0) Favorites

      Abstract:Some pointer errors in C Programming are not easily found at the compiling phase. The current teaching materials cannot provide sufficient description on those errors, but mainly focusing on concept or theory. This article aims at preventing those errors by analyzing those errors in sample programs, debugging those errors in VISUAL C++ 6.0, showing the phenomena of those errors, analyzing their causes, and putting forward the correct way to use pointers.

    • Application and Research of Data Warehouse Technology in Higher Vocational Colleges

      2013, 22(3):157-160.

      Abstract (1233) HTML (0) PDF 519.34 K (2289) Comment (0) Favorites

      Abstract:Based on current college IT construction in Sichuan Vocational and Technical College of Communications, this paper discusses strategies, objectives, granularity and model of deploying a data warehouse. First it begins with Data Mart; this paper presents a good practice of building a data warehouse with the strategy of bottom to top. finally, it uses OLAP to analyze students' score and charge data.

    • Application of XML and GDI+ to the Portable Electronic Album

      2013, 22(3):161-165,68.

      Abstract (1502) HTML (0) PDF 916.28 K (3144) Comment (0) Favorites

      Abstract:According to the portable electronic album superiority, the electronic album system is developed in the embedded mobile device by using of XML and GDI+ technology. The album picture information is stored in the form of XML file, image files is managed individually in the folder. The upper application program is programmed by using C# in the .NET platform, embedded mobile device with Windows CE 6.0 as software drive, system obtains XML documents data by using XML deserialization, finally image information is displayed to the electronic album system interface through the GDI+ technology. The picture browsing and editing is fulfilled in the electronic album.

    • Empirical Research of Mobile Reading Customer Value Prediction with the BG/NBD Model

      2013, 22(3):166-169.

      Abstract (1388) HTML (0) PDF 458.80 K (3355) Comment (0) Favorites

      Abstract:Customer value prediction is mainly about forecasting the customers' consumption will. It aims at undertaking personalized marketing to those real loyal users. The Service Provide can enhance the overall business volume by promptly and accurately analyzing the customers' consumption will and providing personalized service with the method of Customer Value Prediction. This paper carries on the empirical research to validate applicability of the BG/NBD model in personalized marketing of mobile reading customers, based on the model theory and combined with mobile reading users' data.

    • Research and Realization of Network Flows Generator Based on NS

      2013, 22(3):170-172,107.

      Abstract (1456) HTML (0) PDF 855.07 K (3669) Comment (0) Favorites

      Abstract:This paper researches the question of how to create a new network flows generator in NS.After study on the principle and realization of flows generator in NS, we set up a mathematical model for VBR flows generator, and propose a method of migration for a new flows generator in detail, and analyse key programming code in VBR generator. Experiments on the generation and random rate of network flows showed that the VBR generator has effective and is adaptive to network simulation in different environment with different parameters.

    • 3D Reconstruction of Desktop of Table Tennis Based on the Binocular Vision

      2013, 22(3):173-176.

      Abstract (2013) HTML (0) PDF 728.62 K (4306) Comment (0) Favorites

      Abstract:At present, with the rapid development of the computer technologies which has grown dramatically, and there are more and more sports competition where some high and new technologies are emploited as the electronic referee to assist referee to do the decisions, in order to achieve the spirit of fair play which respected by Olympic. During this process, the camera plays an important role in computer vision. 3D reconstruction is a process based on a single view or multi-view images to obtain the 3D information in the field of computer vision. In this paper, in order to complete a task about three-dimensional reconstruction of desktop of Table tennis, we take 3D reconstruction technologies in computer vision as the mainly research object, including specific details about the theoretical knowledge on the binocular vision and the reconstruction algorithm provided by the computer vision library OpenCV. The 3D reconstruction of billiards desktop have strong practical significance, which laid a good foundation for the electronic referee to work in the billiards competition.

    • Key Technologies in Implementing a Virtual Simulation System for EMU Bogies Maintenance

      2013, 22(3):177-181.

      Abstract (1485) HTML (0) PDF 540.22 K (3343) Comment (0) Favorites

      Abstract:In order to support repair and maintenance of CRH380BL high-speed EMU bogie, the authors used virtual reality, multimedia and simulation technologies in developing an EMU bogie overhaul virtual simulation support system. It provided a multi-media platform that enables trainees to quickly master the maintenance skills and provides assistance for repair and maintenance as well as a visual channel for communication in other relevant occasions. After a brief introduction of the bogie structure, the paper describes in detail the key technologies for interactive three-dimensional model browsing, virtual assembly simulation, multimedia information integration, interactive techniques and data compression.

    • Application of Improved Wavelet Threshold Method to Logging Curves Denoising

      2013, 22(3):182-185,152.

      Abstract (1400) HTML (0) PDF 831.41 K (2869) Comment (0) Favorites

      Abstract:The paper introduces the logging curves filtering principle based on wavelet thresholding method ,anlyses the thresholds and wavelet thresholding functions characteristics, then an improved wavelet threshold denoising method is proposed. The simulation experiment of Heavisine signal and logging curves example results show that, the improved wavelet thresholding method can preserve curves datails well while reducing noise efficiently and it can get good application in logging curves denoise processing.

    • Application and Research of Machine Vision on On-line Inspection for Printed Defect

      2013, 22(3):186-190.

      Abstract (1462) HTML (0) PDF 750.77 K (2921) Comment (0) Favorites

      Abstract:In ordert to improve the efficiency of inspection for printed defect and meet the real-time requirement for printed defect inspection, the article is proposed to application of machine vision on on-line inspection for defect and studies related problems. The article designs the program of on-line inspection for printed defect and visual on-line inspection system of the hardware components based on DSP. The article also studies algorithm of image pre-processing, image processing and image registration. We improve these algorithms to meet the real-time requirement for printed defect inspection. We design the software named printed defect machine vision system. It proves that the inspection program and algorithm of image processing is feasible through simulating process of defect inspection.

    • Design and Implementation of Measurement and Sensing Node of ZigBee Home Automation Network

      2013, 22(3):191-195.

      Abstract (1300) HTML (0) PDF 442.82 K (3195) Comment (0) Favorites

      Abstract:ZigBee Home Automation (HA) network is a direction in the development of intelligent home system. After the detailed analysis about the characteristics of Measurement and Sensing clusters and the attribute report mechanism of ZigBee HA profile, this paper presents a design proposal concerning measurement and sensing terminal nodes based on Z-Stack protocol stack. In this proposal, the hardware mechanics of measurement and sensing nodes adopt modular form design, and meanwhile the measurement of different physical types is realized by means of different sensor modules. Based on Z-Stack protocol stack, the software achieves the terminal node function by creating a new ZCL application, with the realization of the transmission of the attribute value of measurement and sensing cluster by using of the attribute report mechanism. Finally, the proposal is confirmed by a light sensor device. The empirical study indicates that this design proposal is feasible and applicable to the measurement and sensing terminal nodes of ZigBee HA network.

    • Wheeled Mobile Robot DGPS and Image Matching Integrated Navigation System

      2013, 22(3):196-198,195.

      Abstract (1191) HTML (0) PDF 1.21 M (2541) Comment (0) Favorites

      Abstract:Using Kalman filter for the deep integration of DGPS and image matching, we improved it because the SIFT feature description of an image is typically large and slow to compute. The experiments show that the improved algorithm can meet the system's requirements for real-time matching for integrated navigation, increased the system navigation accuracy.

    • Research and Implementation of Distance Learning System

      2013, 22(3):199-204.

      Abstract (1555) HTML (0) PDF 688.17 K (2583) Comment (0) Favorites

      Abstract:In this paper, the actual development on the basis of distance learning management system of the Web-based structure, functions and features of the system, discusses the design and development of methods and techniques based on distance learning management system for the B / S structure of the Web. The development of distance learning management system consists of two parts, part of the database design and development, the other part is the front-end application design and development, based on the above development objectives, the system uses three-tier architecture of the B/S mode, including database system, application server and customer browser to use SQL Server2000 as the back-end database, software engineering theory is applied to the entire system development process, combined with the existing equipment conditions and the actual situation, build a Web-based remote teaching Management System.

    • The Fusion Technology of Simulation Target and Real-time Scene Based on VFW in OpenGL

      2013, 22(3):205-208.

      Abstract (1318) HTML (0) PDF 568.70 K (2841) Comment (0) Favorites

      Abstract:To make the visual simulation achieve the dual demands of real-time and realistic, This article describes a fusion technology that a simulation model and a true background based on real-time video. Use the video application software toolkit VFW (Video for Windows) capture real-time video to form the real texture. Real texture replaces the traditional three-dimensional background modeling in OpenGL simulation system, we established a simulation scene which aircraft at high altitude overlooking the ground with level change. Experiments prove that this approach not only simplifies the visual simulation steps, save time-to-background modeling, but also increases the fidelity and easy to achieve fast simulation of the scene.

    • Opinion Spreading Models on Tibetan Networks

      2013, 22(3):209-211.

      Abstract (1456) HTML (0) PDF 435.52 K (2646) Comment (0) Favorites

      Abstract:This paper discusses the research of the complex network opinion spread situation, trends and characteristics. The features and functions of tibetan networks opinion spread are introduced. Based on the complex network theory research methods, we design tibetan networks public opinion model. Research shows that Web mining can effectively obtain the relevant opinion information and enhance the accuracy about tibetan networks public opinion.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063