• Volume 22,Issue 8,2013 Table of Contents
    Select All
    Display Type: |
    • Behavioral Analysis of Fast Flux Service Network

      2013, 22(8):1-8,33.

      Abstract (1884) HTML (0) PDF 1.49 M (3210) Comment (0) Favorites

      Abstract:Fast-Flux Service Network is a network of compromised computer systems with public DNS records that are constantly changing. In this paper, we collected DNS data from 300 different domain servers spanning 6 continents. Our engines worked for over 1600 hours on more than 23000 domains. With the tremendous DNS reply data, we are able to analyze the behavior of Fast-Flux Domain and Fast-Flux Service Network through different dimensions, and locate the most distinguishing features. This paper helps to reveal new features compared with previous researches, and verify the dynamic nature of Fast-Flux Service Network. Behavioral analysis of Fast-Flux Service Network also provides a view for malicious domain detection and network resource protection.

    • A New Method for Finding the Critical Paths Based on Colored Petri Nets

      2013, 22(8):9-13,53.

      Abstract (1475) HTML (0) PDF 1.35 M (3095) Comment (0) Favorites

      Abstract:Under the circumstances of the correctness of conversion rules has already been proved, The first things is conversion the AOE system using transformation rules, and then to do reasonable modifications about the CPN model's unreasonable aspects from two ways. Using these function that acquired by ourselves to get all the reachable paths from the source to sink. In the meantime, we get all the time that all reachable paths have consumed, and the biggest time is the critical path. The method is not only simple and intuitive, but also can improving the execution efficiency under the premise of correctness and rationality, and can reduce the time complexity.

    • Software Project Management Based on GJB5000A of Second Maturity Level

      2013, 22(8):14-17.

      Abstract (1672) HTML (0) PDF 552.03 K (3431) Comment (0) Favorites

      Abstract:Aiming at the software project management problems on second level in military software manufacturers, this paper puts forward an implementation method based on software project management in GJB5000A of second maturity level, describes the procedures form project plan to project monitoring and control and other aspects, summarizes the project management experiences and project management improvements, and provides references on implementation and improvement in GJB5000A of second maturity level to military software manufacturers.

    • The UML Model and the Implementation of Hunan Agriculture Production Technology Service System

      2013, 22(8):18-22.

      Abstract (1398) HTML (0) PDF 1.12 M (2597) Comment (0) Favorites

      Abstract:Using the graphic modeling language UML, this paper carried on the system use case analysis to spsecify the demand and the function division of Hunan agriculture production technology service system. It analyzed running processes and concurrency behavior of the system by activity diagram, decribed the accomplishment of a functon of the desired categories and their relationship by class diagram, described the organizational structure with package diagram, and analyzed the time sequence of class instance which realized a function module.

    • “One Network Double Plane”-A New Wide-Area Backbone Network Architecture

      2013, 22(8):23-28.

      Abstract (2050) HTML (0) PDF 1.13 M (3607) Comment (0) Favorites

      Abstract:"A net double plane" architecture is a wide-area backbone bearing platform architecture. The backbone of the bearing platform through the wan backbone network is divided into two logical independent ring networks, forming "a backbone network, two planes (the forwarding plane and control plane)" of a new kind of network architecture.

    • Research and Design of 3D Game Engine

      2013, 22(8):29-33.

      Abstract (1399) HTML (0) PDF 861.58 K (2439) Comment (0) Favorites

      Abstract:This paper presents a 3D game engine based on design patterns, which is designed by using UML, easier for developers to produce 3D games. With the use of the most frequent some design patterns and good object-oriented design principles to keep from the point of view of highly abstract design. The architecture of the high performance engine which is designed to be in common use, reusable and extensible is analyzed, the main concept of the structure of engine is introduced and the benefits of the use of each pattern are also analyzed.

    • Design and Implementation of a Hospital Location System Based on WIFI

      2013, 22(8):34-37.

      Abstract (1468) HTML (0) PDF 798.04 K (2884) Comment (0) Favorites

      Abstract:Along with the construction and development of hospital WALN, such as infant security, asset management and personnel positioning based on WIFI networking applications are gradually increasing. I am in hospital on the basis of the actual demand, combined with the existing WIFI real-time positioning technology, puts forward a set of application in hospital wireless local area network (WLAN) real-time positioning system, and its basic framework and management control mode are introduced, and the prospect of the WIFI real-time positioning technology research and development direction.

    • Design and Key Technology for Barracks Management Information System

      2013, 22(8):38-42.

      Abstract (1488) HTML (0) PDF 810.68 K (3060) Comment (0) Favorites

      Abstract:Barracks support is an important part of logistics, the construction of barracks management information system has important meaning for army information. U/C matrix from BSP method is used to design the management information system, business process is also designed on the basis of the functional design of barracks management. Distributed architecture is used as the architecture of the barracks database, according to the characteristics of the barracks tissue. Component reuse view is used in system development, type development mode is put forward assembly, improving the efficiency of system development. The work lay the foundation for the development of barracks management information system.

    • Optimization of ITER Wide Area Network (WAN) Based on Riverbed

      2013, 22(8):43-46.

      Abstract (3709) HTML (0) PDF 841.11 K (2948) Comment (0) Favorites

      Abstract:To meet the growing demand for network performance between CN DA and ITER for each procurement package of participating in the International Thermonuclear Experimental Reactor (ITER), an optimization of WAN based on Riverbed is given. Riverbed has a three-layer optimizing system RIOS, which implements data streamlining, transport streamlining and application streamlining to achieve data and protocol optimization. In Addition, RIOS supports diverse Quality of Service (QoS) and high-availability-clustering functionality which makes system load-balancing and redundant, meanwhile, RIOS has realized the management optimization which makes the network deployment easier and faster.

    • Real-Time Monitoring System of Coal Mine Intelligent Spray Based on Web

      2013, 22(8):47-53.

      Abstract (1475) HTML (0) PDF 934.96 K (2713) Comment (0) Favorites

      Abstract:For a number of problems in the spray system used in the coal mine, put forward a coal mine intelligent spray real-time monitoring system design based on web technology, given the system composition, working principle, main function and key technology. The system uses web technology, integrated with other systems in the coal mine. The system is not only based on the real-time detection of dust, smoke, temperature, gas to spray automatically, but also on the ground real-time monitoring of underground environment and work status, and not need to go down to control underground spray system. The practical application shows that, this system realized mine environmental monitoring, smart spray and ground real time monitoring function.

    • IQP System Based on the Network of Inspection & Quarantine and Bank

      2013, 22(8):54-57,82.

      Abstract (1482) HTML (0) PDF 1.35 M (2595) Comment (0) Favorites

      Abstract:In the processing that Entry-Exit Inspection and Quarantine Organization deal with declaration of the import and export enterprises, enterprises should come to Inspection and Quarantine Organization finance department for payment. Traditional payment method is to be settled with cash. This Inspection-Quarantine Payment system is designed based on the network of Inspection & Quarantine Organization and Bank of China. This system completed the payment with electronic billing and electronic toll collection. There are the advantages with fast and easy payment, reconciliation, high efficiency and high service level. In practical application, this system has effectiveness and feasibility.

    • Study and Design of Workflow Based on Flex and Jbpm

      2013, 22(8):58-62.

      Abstract (1612) HTML (0) PDF 775.93 K (3165) Comment (0) Favorites

      Abstract:Aiming at the problem of personalized needs and changing needs in enterprise business processes, this paper researchs the method of realize custom workflow based on the Flex and Jbpm to solve these problems. The Flex technology and design patterns is applied to Flex gef workflow frame. The framework realized conversion of the process model to xml data.Via dynamic routing to achieve a multi-step workflow rollback. Finally, the workflow instance is generated and run by load line with jpdl files into Jbpm workflow engine, after running shows that the system can achieve user custom workflow and multi-step rollback functionality.

    • Research and Implementation of Virtual Infrared Scalpel

      2013, 22(8):63-66,42.

      Abstract (1485) HTML (0) PDF 1.52 M (2870) Comment (0) Favorites

      Abstract:This paper mainly presents a virtual infrared scalpel with several techniques including OpenGL and 3DMax, stereoscopic vision and the quaternion. Firstly, it obtains the 3-d information of the virtual surgical knife with infrared light using the stereoscopic and infrared tracking. Secondly, it reflects the information to the scalpel modeling based on the OpenGL and 3DMax and rotates with the quaternion. Finally, it builds a virtual infrared scalpel. Experiment result demonstrates that the system can be applied to the surgery operation effectively for the interactive processing.

    • Applications and Research of Monitoring System for Winding Machines Based on ZigBee

      2013, 22(8):67-71.

      Abstract (1537) HTML (0) PDF 807.08 K (2840) Comment (0) Favorites

      Abstract:There are too many winding machines, which led to the inconvenience of monitoring and management. In order to improve the efficiency monitoring and management of winding machines, the ZigBee technology was used in the winding machines. We had completed the design of the software and hardware about ZigBee module which was used in winding machines. This module could transmit the system parameters, the number of products, fault information and other related information. After testing, There are 20 winding machine running at the same time. End device sent data to coordinator every 1s. Coordinator node sent the data which collected from winding machine to the PC terminal every 1s. After that, manager had greatly facilitated the remote management and monitoring.

    • Mobile Somatic Application of Multi-Sensors Based on Android System

      2013, 22(8):72-75.

      Abstract (1743) HTML (0) PDF 672.49 K (4026) Comment (0) Favorites

      Abstract:This paper studies the application of multi-sensor technology on Android mobile devices, and raises the method of implementations of Android sensor applications, allowing users and equipment more intuitive operation and interaction.First introduced the development environment to build Android application framework to achieve this application, the steps of calling correlation function of data fusion with JNI (Java Native Interface), as well as the process of generating shared libraries with Android NDK (Native Development Kit). Then elaborated the use of the Android sensor and the methods of development of compass, spirit level, dynamic cube; at the same time develop of the MFC server-side software, implementing the transfer of location coordinate data through Socket and draw the trajectory. Experimental results, which show that the system achieve the required function to demonstrate the application, and can be extended to other applications of mobile devices.

    • Development of Wireless Video Monitoring System Based on ARM/WiFi/QT

      2013, 22(8):76-78,62.

      Abstract (2005) HTML (0) PDF 1.30 M (3840) Comment (0) Favorites

      Abstract:A wireless video monitoring system was developed with ARM and QT based on WiFi network. The system was composed of the remote embedded video acquisition terminal, WiFi network and the monitoring center. In this system, the hardware platform with PXA270 ARM microprocessor chip as its core is used to capture video and the Linux system is built up on it. The client software is developed by QT and the multi-thread technology as well in order to display the video from acquisition terminal by WiFi network. The experiment results showed that the real-time display of one-way or multi-way video monitoring image could be achieved. The system could satisfy the requirements of design and would be widely used in various fields.

    • Query Method and Implementation for Online Judge

      2013, 22(8):79-82.

      Abstract (1606) HTML (0) PDF 603.80 K (2617) Comment (0) Favorites

      Abstract:This paper discusses the query method and implementation for online judge(OJ).It focuses on the stored procedures to query the progress of problem solving situation and the completion of homework in our OJ,and the query method and implementation by the WebClient object to query the problem solving situation in other OJ.

    • Mouse Terminal Based on Gesture Recognition Algorithm

      2013, 22(8):83-87,71.

      Abstract (1667) HTML (0) PDF 1.26 M (3572) Comment (0) Favorites

      Abstract:A recognition algorithm based on static gestures and dynamic gestures was proposed in this paper, combined with mouse class functions of Windows API to achieve the mouse operation. Firstly, the original image was captured from the camera was converted to the binary image of high credibility through the image processing technology; and furthermore, calling static gesture recognition algorithm for recognition of spreading fingers number, according to the finger number, combined with mouse class functions of Windows API achieve mouse double-click and move function; finally, when the number of detected fingers was 5, calling dynamic gesture recognition algorithm to recognize gestures up down left right four directions, combined with the mouse class functions of Windows API to simulate the press and lift of left-right mouse button and wheel sliding. The experiment results show that the gesture recognition algorithm recognition rate reached 94.11%, for some development platform without a mouse or inconvenient to use the mouse, using gestures instead of the mouse has a certain value and significance.

    • Study on Obstacle Distance Detection Based on Monocular Humanoid Robot

      2013, 22(8):88-90,119.

      Abstract (1848) HTML (0) PDF 1.42 M (3761) Comment (0) Favorites

      Abstract:In this paper, a monocular vision method is proposed to measure the distance between the robot and the obstacle. Firstly it converts the RGB image which is obtained from the robot to HSV image, then detects and identifies the obstacle in the HSV color space. Secondly it calculates the distance between the robot and obstacle using pinhole imaging principle and geometric coordinate transformation. Finally the method is tested on the Darwin humanoid robot; the result from the experiment proves the effectiveness and feasibility of the method.

    • Video Tamper Detection Based on Inverse Gravity Density Semi-Supervised Learning

      2013, 22(8):91-97,102.

      Abstract (1685) HTML (0) PDF 1.85 M (2261) Comment (0) Favorites

      Abstract:Aim at the condition that a video may be combined from non-same source segments, and according to its data characteristic, we propose an improved semi-supervised learning algorithm, and apply it to the research of detecting video's authenticity. First, use per-frame of a video as a sample, extracting their R, G, B components, and getting the noise of these three components. Then, getting these noise's mean and variance, and use it as attributes of the sample. Last, use this paper's algorithm cluster the samples. Experimental results show that this method can effectively identify whether a video is combined from non-same source segments.

    • A Webpage Watermarking Method Based on the Shamir Threshold and Html Label Id

      2013, 22(8):98-102.

      Abstract (1264) HTML (0) PDF 807.28 K (2630) Comment (0) Favorites

      Abstract:Html webpage watermarking technology is a information hiding technology branch, at present several methods have been proposed, but compared to other watermark technology, there still exist problems about watermark embedding difficulties, limited capacity and weak robustness. Aiming at the limited embedding capacity question by using the single label or a symbol in webpage to indicate that a single watermark bit, a method is proposed to use the id value of label in webpage to represent watermark, and the id value of label in webpage can be used to express many watermarking bits. First in this method is to xor with the message digest of the important content in webpage and bits of binary image to represent copyright, and then by the Shamir threshold decomposition scheme, the watermark as the id value of label in webpage is deposited the webpage. Proved by experiments, the scheme has better capacity of embedding, robustness and invisibility.

    • GwMKnn:MKnn algorithm for Nominal Data by Gini Weight

      2013, 22(8):103-108,158.

      Abstract (1519) HTML (0) PDF 1.16 M (2834) Comment (0) Favorites

      Abstract:MKnn is an improved version of the k-nearest neighbor method, but it uses general approach to deal with nominal data, that is, if its value is the same then to 0, different to 1, thus the classification efficiency is suppressed a certain degree on the data sets with more nominal data. The concept of Category's Gini is introduced in this paper to deal with the shortage of the processing on nominal data, which statistics the contribution of samples in same class by its data distribution for its category and takes it as the attribute weight, used to estimate the similarity for different samples. It aims to optimize the MKnn method and promotes its applications. The experimental results demonstrate the effect-tiveness of the proposed method.

    • Nighttime Lane Detection of the Highway Based on Improved Prewitt

      2013, 22(8):109-112.

      Abstract (1233) HTML (0) PDF 713.21 K (2720) Comment (0) Favorites

      Abstract:This study introduces a novel detection algorithm to recognize the lane markers on the highway at night. The proposed algorithm utilizes adapted median filtering and edged detection of the four direction template logarithmic Prewitt based on the difference of luminous density. It gives the threshold of binaryzation. Determine the ROI and sides lane line, so greatly reduce the amount of computation. We use lane marking width and temporal trajectory strategy to remove false lanes caused by lighting change, and vehicle occlusions. Finally we get complete clear lane line. The proposed method is proved to be fast, stability and accuracy.

    • Design and Implementation of a Real-time Scheduling Algorithm for MapReduce

      2013, 22(8):113-119.

      Abstract (1270) HTML (0) PDF 950.94 K (2867) Comment (0) Favorites

      Abstract:MapReduce is a popular batch data processing framework in cloud computing field. Sharing MapReduce cluster and meeting the deadlines of jobs is a key problem to be solved. This paper proposes a two phase real-time scheduling algorithm which separate scheduling into job scheduling and task scheduling.It uses sampling method to estimate the task excuting time so that the scheduler can make a decision on how many slots should be assigned to the job and how to calculate the job's priority. Using delay-scheduling scheme in task scheduling, the"computing locality"problem can be solved well. Experiments result shows that the scheduling algorithm implemented in this paper satisfies the job's real-time requirement as well as throughput of the cluster.

    • New Disparity Estimation Method for Multiview Video Combined with Motion Estimation

      2013, 22(8):120-123.

      Abstract (1178) HTML (0) PDF 822.83 K (2167) Comment (0) Favorites

      Abstract:The computation complexity of motion estimation and disparity estimation for multiview video encoding was so huge. In order to resolve the problem, a new method for disparity estimation was proposed in the paper, which was combined with motion estimation. In the time domain, Kalman filtering was established for motion state of each view's macroblock, the motion vector of current macroblock was predicted by Kalman filtering. The thesis analyzed the geometry relationship of motion vector and disparity vector in the space domain based on motion estimation, and calculated the present macroblock's parity vector. Experimental results show that the method proposed in this paper not only saves encoding time substantially but also keeps rate distortion, compared to the full search and fast algorithm.

    • A Method to Understand Spontaneous Spoken Tasks for Mobile Terminals

      2013, 22(8):124-129.

      Abstract (1425) HTML (0) PDF 664.45 K (2443) Comment (0) Favorites

      Abstract:With the development of mobile Internet and automatic speech recognition (ASR), the mobile terminal through voice interaction has become a trend. The traditional method to understand user's spontaneous spoken language is to write context-free grammars(CFGs)manually. But it is laborious and expensive to construct a grammar with good coverage and optimized performance, and difficult to maintain and update. We proposed a new approach to spoken language understanding combining support vector machine(SVM)and conditional random fields(CRFs), which detect task and extract task semantic information from spontaneous speech input respectively. Tasks are represented as a vector of task name and semantic information. Eight different tasks from "iFLYTEK yudian" voice mobile assistant are tested, and the precision and recall of semantic representation of query are 90.29% and 88.87% respectively.

    • Effects of the Wavelet Decomposition Level and the Times of Scan in the EZW Algorithm

      2013, 22(8):130-135.

      Abstract (1335) HTML (0) PDF 1003.69 K (2899) Comment (0) Favorites

      Abstract:Embedded zero-tree wavelet encoding (EZW) algorithm is one of the well-known most efficient wavelet image encoding algorithms. In the EZW algorithm, different wavelet decomposition levels will affect the time-frequency resolution of the wavelet as well as the variation of the wavelet coefficients, therefore affecting the final encoding efficiency. Moreover, the times of scan will directly affect the wavelet coefficients to be encoded, therefore affecting the final encoding gain. In this paper, the effects of the wavelet decomposition levels and the times of the scan are investigated and discussed, therefore providing the instruction for the choices of the wavelet decomposition level and the times of scan in the EZW algorithm. From the experiments, we can see that in the same times of scan, with the increase of the wavelet decomposition levels, the image compression ratio (CR) increased accordingly, while the peak signal-to-noise ratio (PSNR) decreases. In the same wavelet decomposition level, with the increase of times of scan, the PSNR increases greatly while the CR decreases.

    • Optimization of Perishable Products in Incident Vehicle Route Problem

      2013, 22(8):136-140.

      Abstract (1247) HTML (0) PDF 679.54 K (2191) Comment (0) Favorites

      Abstract:The perishable products go bad easily in transportational process and have the trait of timeliness and incident among goods. This paper proposed a mathematical model of Incident Vehicle Route Problem with Time Window (IVRPTW) to consider production distribution for perishable products.And adapt the Immune Clonal Selection Algorithm(ICSA) to solve this complex problem. On the basis of modeling and simulating examples of this problem, it is shown that the programming model and algorithm are reasonable and efficient.Experiment result also shows the immune clonal selection algorithm can find the optimal or nearly optimal solution effectively compared with the genetic algorithm.

    • Web Application in Substation Digital ERTU Modeling Configuration

      2013, 22(8):141-144,135.

      Abstract (1344) HTML (0) PDF 1.58 M (3012) Comment (0) Favorites

      Abstract:IEC 61850 based IEDs have been widely used in smart substation. To support simple and efficient engineering configuration, the IED needs an easy accessible configuration query and edit interface, where WEB is a suitable option. Taking digital ERTU as an example, a Web based configuration software including a CGI procedure combining a configuration document and a mapping table, is developed based on Linux embedded OS, which can be reached by engineering work station, or a PC, or a remote work station, to fulfill the configuration work and generate the ICD model documents as well as the device operation parameter documents by interconnection with the substation Ethernet. The new type ERTU with such property has been operated in a 110kV substation in Zhejiang.

    • Design and Application of High Resolution Timer Managing Class in C++Builder IDE

      2013, 22(8):145-150,201.

      Abstract (1319) HTML (0) PDF 1.53 M (4898) Comment (0) Favorites

      Abstract:This paper present a realization of hi-resolution timer class, based on multithread technique, in the BCB IDE. Utilizing of the class, derived from TThread class of VCL and integrated with Windows message mechanism, achieved a general timing-error < 0.5ms. The class is provided of advantages such as multiple timers-single object managing, work state of timer-thread adjusting, callback mode controlling, as well as more convenient and more customizable than traditional windows System Timer and Multimedia Timer. Thus it could be applied in projects with relatively time-critical requirement, e.g. industrial control, multimedia app development and realtime signal sampling & processing.

    • Strategy of Data Recovery for Three Collapsed Disks Under Odd Parity

      2013, 22(8):151-154.

      Abstract (1220) HTML (0) PDF 570.87 K (2514) Comment (0) Favorites

      Abstract:Some disaster may result in the simultaneous collapse of multiple data disks on the data center storage system. If a mirror backup was used, it would be highly likely that the data cannot be recovered. But if the redundancy technology, based on the odd parity, is used, and it has been ensured that all disks have equal probability of operation, then not only can the technology recover the data of one or two collapsed data disks, but it can also recover the data of three or more simultaneously collapsed data disks.

    • U-Boot Transplantation Method Based on Mini2440 Platform

      2013, 22(8):155-158.

      Abstract (1212) HTML (0) PDF 657.14 K (3100) Comment (0) Favorites

      Abstract:Research on mini2440 platform with ARM9 series S3C2440 processor core, methods to transplant U-Boot. Based on the mini2440 platform hardware resources, to modify the U-Boot source code, and then to modify the source code to be compiled, will generate the u-boot.bin file to download to the mini2440 development board to run, and the U-Boot functional testing, test results show that U-Boot successfully in the development board to run, and can realize its function. The transplant method to use S3C2440 processor for embedded system design and U-Boot in other processor transplantation has reference value.

    • A Fault Polygon Extraction and Smoothing Method

      2013, 22(8):159-161,140.

      Abstract (1263) HTML (0) PDF 1.30 M (2612) Comment (0) Favorites

      Abstract:A method for fault polygon extraction and smoothing is proposed in this paper. The method extracts fault polygon by boundary tracking algorithm, it uses the angle of fault polygon line and side length to smooth polygonal fault under the premise of keeping fault polygons form, and then enhances the fault polygon visual effects and aesthetics, it also provides a very good method for seismic data interpretation. After the validation in daqing oilfield seismic image, this fault polygon extraction and smoothing method can effectively extract fault polygons and remove the burr of fault polygon, the effect in fault polygon smooth is remarkable.

    • Airport Remote Apron Wireless Coverage Path Loss in Different Rainfall

      2013, 22(8):162-164,172.

      Abstract (1331) HTML (0) PDF 1.55 M (3105) Comment (0) Favorites

      Abstract:It is difficult for a wireless communication in the mobile communication system of the airport environment. The path loss is an important factor to cause the attenuation in the radio signal transmission; however, the impact of rainfall will be more serious. This article that via build the airport module and lots of simulation is to describe airport remote apron wireless coverage if no rainfall,and verify it by using Wireless Insite software. To further study path loss of wireless signal transmission in the different rainfall environments, the relationship between rainfall and path loss can be acquired by matlab the software simulation. It has a certain reference value for predicting the wireless coverage of the airport remote apron in the different rainfall environments.

    • Design of Wireless Measurement System’s Terminal of Cable Tension Force Based on Android Pad

      2013, 22(8):165-168,206.

      Abstract (1185) HTML (0) PDF 1.55 M (2688) Comment (0) Favorites

      Abstract:In order to facilitate the field measurement of cable tension force and improve the efficiency of measurement, the terminal of wireless mesurement system based on Android pad is designed. This paper introduced the system's structure,focused on the terminal's hardware design and application program design and implementation.The terminal has a good man-machine interface, easy to carry, stable performance, and has good application prospect in engineering.

    • Version-Loading in Large Scale DSP System

      2013, 22(8):169-172.

      Abstract (1164) HTML (0) PDF 831.09 K (2841) Comment (0) Favorites

      Abstract:The rapid version-loading is proposed in the large scale DSP system of communication networks. The key is version-loading parallel for multi-DSP. Every DSP chip has a physical ID corresponding to a port number on the switch chip, in addition, according to the relationship between the MAC address of DSP and the port number of switch, we can get the the relationship between the MAC address and the physical ID of DSP, and then get the relationship between the version and the MAC address of DSP. After resetting all DSPs, host can obtain the source addresses of DSP from the version-request frames, then deduce the appropriate versions and load them parallel.Through parallel loading, the time for loading multi-DSP can be shorten from dozens of minutes to dozens of seconds, can be met the demand of rapid startup for communication system. This method can be used on the environment there are multiple DSPs loaded through Ethernet.

    • Integration Management Model of Enterprise Interpretation System Based on ROA

      2013, 22(8):173-175.

      Abstract (1696) HTML (0) PDF 736.07 K (2651) Comment (0) Favorites

      Abstract:Along with Advanced application of enterprise interpretation system (EIS), system management becomes more and more difficult. Through the research of integration mode of enterprise system management, integration management platform which is based on ROA model was presented by using advanced resource-oriented model, and its' design and specific implementation process were given. Thus it can realize effective resource integration and flexible displays, and meet the different levels of user demand, and provide strong support for global application of EIS.

    • EigenVoice Means Used in Speech Recognition

      2013, 22(8):176-179.

      Abstract (1717) HTML (0) PDF 686.45 K (2547) Comment (0) Favorites

      Abstract:This thesis adopts GMM-UBM when model speaker recognition system considering of lacking data. In the aspect of adapting in speaker recognition system modeling and parameter estimating, attentions are put on researching in how to improve recognition rate. In the side of adapting in speaker recognition system modeling, we will ameliorate conventional MAP (Maximum A Posterior Probability) means to get speaker recognition model, apply MLLR (Maximum Likelihood Linear Regression) and EigenVoice adaptation ways which used in speech recognition into adapting in speaker recognition system modeling, and compare the results with MAP means.

    • A Method of Multiple Attributes Decision-Making Based on Satisfied Degree

      2013, 22(8):180-183.

      Abstract (1381) HTML (0) PDF 632.56 K (2037) Comment (0) Favorites

      Abstract:With respect to attribute weights are interval number and attribute values are interval number, a multiple attributes decision-making method based on satisfied degree is proposed. By referring to the thought of the satisfied degree in C_OWA, the possibility-degree of interval number and the connection-number in set pair analysis, the satisfied-degree based on interval possibility and the satisfied degree based on connection-number are presented to Eliminate the uncertain information in decision data. These satisfied degrees are aggregated by OWA and rank the alternatives by the calculated values. The results of comparative experiment show the feasibility and efficiency of this proposed method.

    • Research and Implementation of an Online File System Checker Based on Image

      2013, 22(8):184-189.

      Abstract (1241) HTML (0) PDF 1.05 M (2443) Comment (0) Favorites

      Abstract:This paper designs and implements OnlineFSCK (On-Line File System Checker), which checks the file system while it is online without modifying the in-kernel file system codes. The file system can continue providing service while it is being checked by OnlineFSCK. This paper proposes and implements an runtime imaging algorithm which, combined with the existing file system checkers, can provide us the ability to check the consistency of the existing running file systems. The prototype is implemented for ext3 file system. Experiments shows that our OnlineFSCK solution can guarantee the correctness as traditional file system checkers while keeping the performance of the production system neglectable impacted. As there is no need to modify the in-kernel codes to support it, Online FSCK can be easily extended to support other file systems.

    • Application of Gray Neural Network in the College Students’ Employment Confidence Index Prediction

      2013, 22(8):190-193.

      Abstract (1311) HTML (0) PDF 932.80 K (2454) Comment (0) Favorites

      Abstract:It is a valuable research issue to know and increase the college students' employment confidence. It has practical significance to analyzes and predict the employment confidence using the employment confidence index. In this paper, a method was presented to predict the college students' employment confidence index based on gray theory and BP neural network. This method set up different gray models based on the influence factors of employment confidence. And the forecasting results of different gray models are inputted to the neural network. The final forecasting results were obtained according to the neural network. The results show that the combined forecasting model has smaller relative error and higher prediction accuracy.

    • Design and Realization of MMS Service in Digital Fault Waveform Recorder

      2013, 22(8):194-197.

      Abstract (1458) HTML (0) PDF 685.29 K (3281) Comment (0) Favorites

      Abstract:The IEC61850 standard is used widely in digital substation and intelligent electronic devices.The fault waveform recorder model is build based on IEC61850.The objects and services in model are mapped to MMS. The MMS server is designed. It reduce difficulty of design by call the cisico MMS-EASE lite. The function of MMS service achieve. The last, give an example, the server respond to the server directory request of client. It verify that MMS service is provided right correctly by analyze the communication messages.

    • Research and Implementation of 3D Geologic Body Interaction in Vrml and Javascript

      2013, 22(8):198-201.

      Abstract (1386) HTML (0) PDF 655.76 K (2696) Comment (0) Favorites

      Abstract:Setting three dimensional geological body as an example, this paper discusses VRML constructing virtual scene roaming and interactive technology.Due to the traditional three-dimensional making software such as AUTOCAD,3DS MAX can not be interacted in time, this paper totaly describes the principle for the VRML nodes,such as TouchSensor and Switch controlling the virtual scene,combined with Javascript and VRMLscript interface,we studies the method of dynamic controlling virtual reality scene. The model of 3d geological body is constructed on the Web for users on the Internet to provide convenience. This example realizes the interactive operation on virtual scene such as stratigraphic hierarchical display, drill simulation,coordinates and information querying, and other functions, always has obtained a good effect.

    • On Information Resource Intelligence Addressing System for Internet of Things

      2013, 22(8):202-206.

      Abstract (1268) HTML (0) PDF 704.47 K (2886) Comment (0) Favorites

      Abstract:Information resources intelligence addressing for Internet of Things(Iot) has become a research hotspot in the field of Iot. Nowadays, common addressing systems usually have lower efficiency, especially cannot support dynamical evolution of information resource. To improve information resource addressing efficiency for Iot and extension, this paper first studied the localization mechanism for Iot and the addressing system model. Then it improved corresponding algorithms and an information resource intelligence addressing system for Iot based on wireless sensor network was proposed. Finally, the application experiments were made, the results demonstrate the proposed system has sound information resource addressing efficiency and utility compared with conventional models.

    • Design and Implementation of ITHelp Online Service Module Based on MVC Pattern

      2013, 22(8):207-209,197.

      Abstract (1460) HTML (0) PDF 1.42 M (3012) Comment (0) Favorites

      Abstract:This paper analyzed the needs of ITHelp online service module, decomposed function of ITHelp and designed in detail. MVC module was discussed and an implementation based on SSI is proposed. Results show that ITHelp module is fully functional, practical, can improve the informatization efficiency and realize the online information sharing.

    • Path Planning Approach to Vehicle Navigation Based on Genetic Neural Network

      2013, 22(8):210-213,189.

      Abstract (1566) HTML (0) PDF 1.57 M (2994) Comment (0) Favorites

      Abstract:In this paper, we solved nonlinear problems in the traffic path planning with the hybrid GA-BP neural network algorithm. Although Back-Propagation neural network (BP) is able to solve nonlinear problems properly, it is tend to fall into the deficiency of local minimum. In the meanwhile, genetic algorithm (GA) is good at macro-searching and performs well at global optimization, which can make up for the deficiencies of BP. In this paper, using the A* algorithm, we rough calculated several alternative paths quickly, which serve as the initial population of the GA. Then we conducted path planning precisely with the mixed GA-BP neural network algorithm. The simulation results showed that the hybrid GA-BP neural network algorithm has some advantages in the global optimal solution for path planning.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063