• Volume 23,Issue 12,2014 Table of Contents
    Select All
    Display Type: |
    • >Survey
    • Overview of Autostereoscopic Display Technology

      2014, 23(12):1-8.

      Abstract (1619) HTML (0) PDF 878.94 K (2874) Comment (0) Favorites

      Abstract:Autostereoscopic display technique currently is in development stage. And it mainly is used in the commercial market and entertainment industry, so it is not used on a larger scale. From a technical point of view, free stereoscopic display can be divided into light barrier technology, cylindrical lens technology and point light source technology etc. Autostereoscopic display's biggest advantage is to get rid of the shackles of glasses. But there are many deficiencies in the resolution, visual angle and visual distance. This paper introduced the stereoscopic display technology and the advantages and disadvantages of various types of stereoscopic display technology in existence and the basic principle of stereo display. And it also introduced several freestereoscopic display technology and its implementation.

    • Audit Information Platform Optimization and Trending in a State Owned Commercial Bank

      2014, 23(12):9-14.

      Abstract (1249) HTML (0) PDF 522.95 K (1952) Comment (0) Favorites

      Abstract:Audit information platform is the important work platform of enterprise internal audit implementation. The platform applications directly affect the quality of audit work, thereby affecting the auditing supervision and corporate governance effectiveness. In this paper, through the practice of audit information platform in a state owned commercial bank, this paper summarizes the current platform existence the insufficiency and the flaw and tries to put forward ideas of short-term system optimization. At the same time, based on long-term, this paper analyzes the deep reasons which restrict the development of audit information platform. We try to analyze the trend of the future platform, in order to provide some reference for the long-term planning of the platform.

    • Active Measurement Tool Development Kit

      2014, 23(12):15-21.

      Abstract (1757) HTML (0) PDF 705.62 K (2330) Comment (0) Favorites

      Abstract:Active measurement is a common method for the network measurement. The implementation process of most active measurement tool can be divided into three parts: sending, receiving and processing packets. In this paper, we study the current active detection method of network performance in those three aspects and summarize the common procedure of the active measurement. A kind of development kit is designed to quickly implement various active measurement tool based on libnet and winpcap. The implementation of the active measurement tool is simplified by encapsulating all kinds of the operation required in the active measurement procedure and providing unified programming interface in the new design. As the experimental results suggest, the active measurement development kit is able to realize various function of the active measurement tool and greatly reduce the code compared with existing tool, and the efficiency is highly improved.

    • Network Science Popularization Platform Based on Characteristic Resources Integration in Cold and Arid Regions

      2014, 23(12):22-28.

      Abstract (1374) HTML (0) PDF 1.58 M (2130) Comment (0) Favorites

      Abstract:The public is not only the biggest beneficiary of popular science, but the main target for network popular science diffusion. With the rapid development and spread of network popular science, however, there are some drawbacks. In this paper, cold and arid regions unique resources were applied to build a sharing platform for science. The platform has a resource management layer, platform management layer, application layer and user experience layer structure, which can support a variety of ways science communication, science resources and integrated. The stable and scalable platform is to achieve science resources building and exchanging and complete science topics self-construction and Sciences Culture Communication forming a science topic has 21 Cold and Arid Regions network science sky.

    • Whole Enterprise Solution Oriented Mobile Information Technology

      2014, 23(12):29-35.

      Abstract (1319) HTML (0) PDF 688.51 K (2172) Comment (0) Favorites

      Abstract:With the rapid development and popularization of smart terminals and mobile Internet, the construction of mobile enterprise information technology has been put on the agenda. However, mobile enterprise information technology is in its initial stage with vague moduledefinition and disorganized technical standards, still waiting to be formed with integral solution. According to the various characteristics of mobile enterprise information technology, this paper gives analysis and suggestion in terms of development, release and maintenance of mobile enterprise application, and puts forward an whole enterprise mobile information architecture with a base of hybrid mobile application development technology and a core of enterprise mobile application store. So far, a platformbased on the architecture has built lots of enterprise mobile applications and supported their security, popularization, standardization.

    • Team Knowledge System Computational Experiment and its Application Based on Agent

      2014, 23(12):36-41.

      Abstract (1217) HTML (0) PDF 637.73 K (1968) Comment (0) Favorites

      Abstract:How to use existing knowledge to promote knowledge communication among team members is critical for a team to complete tasks and improve its core competitiveness. This study builds a model of team knowledge system based on related theories of CAS (Complex Adaptive System) from knowledge management perspective. The model includes attributes, actions and interaction rules of individual agent. The system environment, inputs and outputs are also defined in this study. Then based on the main ideas of computational experiments, this study analyzes a case that how external control influences team performance and verifies the feasibility of computational experiments of team knowledge systems. The managerial implications are discussed at last.

    • Storage Gateway for the Cloud Storage

      2014, 23(12):42-46.

      Abstract (1364) HTML (0) PDF 616.86 K (2374) Comment (0) Favorites

      Abstract:With the development of the computer and network technology, the growing demands for the huge data storage and the high-performance data access make the storage systembasedon network becoming a research hotspot, especially the research of I/O subsystem about network server system. The research about distributed file system as a key part in the network server system is meaningful. Currently open source community provides several DFS(distributed file system) projects, such as KFS, moosefs, FastDFS, TFS, GFS. Most of projects support only API or storage gateway on Linux system, but not giving support API or storage gateway on Windows system. This study introduces the designing frameworks and the thinking process aboutstorage gateway on Windows system, and then gives a specific example program based on HDFS—dfsclient.

    • Distributed Monitoring Scene Splicing System Based on WiFi

      2014, 23(12):47-52.

      Abstract (1711) HTML (0) PDF 1016.18 K (2479) Comment (0) Favorites

      Abstract:With the continuous development of digital information technology, the monitoring system has become the important application in the field of various industries. With the development of wireless technology such as WiFi, it is able to realize the wireless transmission of video data, because of its unique convenience it will replace the traditional cable monitoring system. Image mosaicing is a popular image processing technology, which means spicing two or more images with overlapped area into a seamless high-resolution image. This paper combines the advantage of WiFi wireless technology with the advantage of image splicing technology. It proposes the distributed monitoring scene mosaics system based on WiFi. This system makes multiple clients can transmit the collected images through WiFi network to the server, the server process the transmitted image by using SIFT algorithm and RANSAC algorithm to complete mosaicing. Finally, we achieve wide scene monitoring. The experimental results show that the system can effectively realize monitoring scene mosaicing.

    • Hybrid Architecture for Mobile Development

      2014, 23(12):53-59.

      Abstract (1407) HTML (0) PDF 1.01 M (2590) Comment (0) Favorites

      Abstract:In order to satisfy the deficiency of the existing hybrid development framework in terms of convenience and performance, this paper proposed a new hybrid development framework. With the cross-platform features of HTML5, packing mechanism, multi-window management mechanism, and native plugin development technology, this paper implemented the hybrid development framework. The hybrid development framework brought convenience and enhanced the development efficiency. What's more, the unique Widget application management mechanim and window management mechanim in the engine improved the performance of hybrid applications as well as users' experience. The enterprise mobile solutions indicated that the framework had good commercial value, which was ease to use and had good performance.

    • Natural Process of Carbon Emissions Data Information WebGIS Based on ArcGIS Server and Silverlight

      2014, 23(12):60-66.

      Abstract (1759) HTML (0) PDF 1.46 M (2807) Comment (0) Favorites

      Abstract:As the focus of the natural process of carbon emissions data content information management system construction, the natural process of carbon emissions research data WebGIS system construction has become the object of study. The WebGIS system uses Silverlight as the client platform and uses the ArcGIS Server as the system GIS Server. It is combined with WCF RIA Service, ArcGIS API for Silverlight and other WebGIS technologies. We designed the system frame structure and the spatial database and gave out the spatial data and non-spatial data organization and its web access strategy. It achieved the non-spatial data network dynamic query, retrieval, statistics and analysis. It has functions of displaying the spatial data web maps, analyzing spatial data and making the matic map, etc. In the process of system building, we focused on the analysis of key technologies, involved WebGIS and the specific implementation of solutions. Studies had shown that building a WebGIS system based on the Silverlight technology and ArcGIS Server platform, not only can solve the release and management of geospatial data, develop the system function fast and efficiently, but also can meet the requirements of high interactivity and response time, and improve the performance of WebGIS system.

    • GPS/GPRS-Based Remote Monitoring Terminal for Fall Detection

      2014, 23(12):67-71.

      Abstract (1634) HTML (0) PDF 777.81 K (3420) Comment (0) Favorites

      Abstract:Falls are the leading reason for accidental death among people at age over 65. In order to provide the real-time fall alarm and rescue service for the elderly, especially the one who live alone, in this paper we propose a GPS/GPRS-based remote monitoring terminal for fall detection. It uses sensors which combine three-axis accelerometer and three-axis gyroscope. The terminal is intended to monitor human motions and can recognize events of fall in real time. Falls are recognized using a dedicated algorithm. Once a fall has been detected, the terminal transmits alarm information together with location information to the remote monitoring center through GPRS. In order to avoid false or missed alarms, the terminal also supports manual mode of operation and buttons to send or cancel an alarm. The test results showed that the monitoring terminal can accurately distinguish between normal human activities, condition of fall event and generate alarm when the thresholds of resultant acceleration and resultant angular velocity are, respectively, 5m/s2, 25 m/s2 and 2 rad/s. The terminal has demonstrated good location accuracy and communication efficiency.

    • Android-Based Mobile Phone for Test and Exercises

      2014, 23(12):72-76.

      Abstract (1685) HTML (0) PDF 966.57 K (3233) Comment (0) Favorites

      Abstract:A software system for test and exercise is developed based on Android mobile phone. The system consists of a client-end application running on Android mobile phone and a set of server-end service applications. The system components include database server, WEB server, wireless network and Android front-end. The client Android system of intelligent mobile phone with front-end processing and calculating ability can access the server through the network to the server, upload the test results or download new test papers. The content of this paper covers the overall system structure design and application, gives some design code. Practice shows that the system realizes the whenever and wherever learning, which wins a good reputation among users, and achieves the expected goal.

    • Intelligent Integrated Monitor and Management System Based on RT21

      2014, 23(12):77-81.

      Abstract (1557) HTML (0) PDF 1.20 M (2293) Comment (0) Favorites

      Abstract:Based on the NARI RT21 platform, intelligent integrated monitor and management system with video surveillance, condition monitoring, fire control, access control, environmental monitoring and other centralized subsystems was researched and developed. This intelligent system circled around substation plane graph and primary equipment wiring diagram that had device management at their heart, and achieved intelligent linkage, information sharing, and play a role of supporting decision-making. This system helped the control center kept abreast of substation equipment operational status to provide technical support for shortening accident processing time, which can reduce the monitoring, operation and maintenance workload of staff.

    • Evaluation Model of Intrusion Detection Based on OpenFlow

      2014, 23(12):82-87.

      Abstract (1350) HTML (0) PDF 761.22 K (2118) Comment (0) Favorites

      Abstract:The traditional evaluation methods rely on simulation environment to simulate real network traffic status quo, the proposed intrusion detection system is based on OpenFlow's assessment. The system is software-defined networking technology (OpenFlow) evaluation model based on the intrusion detection.We discussed the framework, setting methods, and specific work of this model in details. Our work designed an evaluation system based on this model, which uses a flexible network OpenFlow control structures for the evaluation of the true IDS controlled network environment, and provides the necessary intrusion detection and attack the real network traffic data. Finally, the evaluation system was used to test the simulation model. The experimental results show that compared to the traditional methods, the proposed OpenFlow intrusion detection model based on the evaluation can assess the effectiveness and accuracy of better performance.

    • Integrated Architecture of Ship Security Platform Based on SOA

      2014, 23(12):88-93.

      Abstract (1145) HTML (0) PDF 895.48 K (2035) Comment (0) Favorites

      Abstract:The deep development of information-integration of ship security changes the need of ship security platform. The integration of ship security equipment and security system becomes a problem urgently to be solved in ship safety construction. In view of this, this paper proposes the design of integrated architecture of ship security platform based on SOA. EJB components will be used to develop the system and WSDL will be applied to describe the architecture integration interface. Added that each process of service designs is using the clustering algorithm, it aims to achieve an integrated architecture of ship security platform based on SOA, and also shows the algorithm implementation of service integration of ship safety management platform. The research proves that it can realize a seamless integration of ship safety equipment and other ship safety information system in digital ship. It effectively solved the problem that ship security platform information resources cannot be shared each other, and can be applied in the weapon platform ship information security system practically.

    • Using Cloud Technologies for Large-Scale House Data in Smart City

      2014, 23(12):94-100.

      Abstract (1224) HTML (0) PDF 677.86 K (2106) Comment (0) Favorites

      Abstract:In the smart city environment, a wide variety of data are collected from sensors and devices to achieve value-added services. In this paper, we especially focus on data taken from smart houses in the smart city, and propose a platform, called Scallop4SC, that stores and processes the large-scale house data. The house data is classified into log data or configuration data. Since the amount of the log is extremely large, we introduce the Hadoop/MapReduce with a multi-node cluster. On top of this, we use HBase key-value store to manage heterogeneous log data in a schemaless manner. On the other hand, to manage the configuration data, we choose MySQL to process various queries to the house data efficiently. We propose practical data models of the log data and the configuration data on HBase and MySQL, respectively. Then we show how Scallop4SC works as an efficient data platform for smart city services. We conduct an experimental evaluation to calculate device-wise energy consumption, using actual house log recorded for one year in our smart house. Based on the result, we discuss the applicability of Scallop4SC to city-scale data processing.

    • Improved Energy-Efficient Routing Protocol Optimization for Underwater Acoustic Sensor Networks

      2014, 23(12):101-104.

      Abstract (1812) HTML (0) PDF 640.54 K (2038) Comment (0) Favorites

      Abstract:Considering the characteristic of high energy consumption of nodes and efficiency network transmission problem in large-scale three-dimensional underwater acoustic sensor networks, this paper proposes an algorithm for underwater acoustic communication sensor network routing based on the node location and LEACH algorithm, which takes the method of positioning, clustering, waking up and arranging. First of all, it gathers the location information of nodes, and makes underwater nodes into different clusters through clustering methods, wakes up the nodes we need and sleep the others. In the data communication process it is needed that waking up cluster unit timely and making sure the cluster nodes need to be waked up in time, making them in the active state, and sleeping the nodes we don't needed to save energy. We choose the best node to transmit information in the cluster. Simulation results show that the algorithm can improve the overall lifetime.

    • Control Algorithm in the Electro-Hydraulic Servo System

      2014, 23(12):105-108.

      Abstract (1250) HTML (0) PDF 677.05 K (2208) Comment (0) Favorites

      Abstract:The optimized deviation-deviation rate algorithm is applied in the electro-hydraulic servo control system. It brings difficulties to the design of the control method, because of the complexity of the influence factor in electro-hydraulic position servo control system, and the system itself has many nonlinear elements which makes it difficult to describe all of the features with precise mathematical model. Aiming at these problems, an optimized deviation-deviation rate algorithm is putted forward on the basis of the analysis of the structure and characteristics of electro-hydraulic servo control system, and achieved good control effect in various simulation experiment.

    • Energy-Efficient Data Gathering Algorithm for Multiple Mobile Sinks

      2014, 23(12):109-114.

      Abstract (1400) HTML (0) PDF 836.80 K (2109) Comment (0) Favorites

      Abstract:Wireless sensor network (WSN) is made of a large number of sensors, which power is limited. The energy management is a hot issue. Owing to the relevance of time and space between sensors, we allow some sensor nodes to be alive and some sensor nodes can be turned off. Mobile sink is powered by gasoline, thus the mobile distance is limited. Therefore, we propose CMSLM (Constrained mobile of sink lifetime maximum) algorithm. Firstly, we select as little as possible mobile sinks under the condition of limited mobile distance for mobile sink. Secondly, we construct balanced tree by the maximum flow, to maximize the WSN lifetime. The experiment simulation shows that the number of dead sensors of CMSLM algorithm is less than SRP-MS.

    • Collaboration Filtering Recommendation Algorithm Faced Distribution of User Interest Density

      2014, 23(12):115-119.

      Abstract (1241) HTML (0) PDF 800.06 K (2187) Comment (0) Favorites

      Abstract:Aiming to such the problems that sparse data and poor calculation of score similarity result in low quality of recommendation, a collaborative filtering recommendation algorithm based on distribution of user interest density is proposed in the paper. After calculating the similarity of items, classification and entropy are calculated to get finally similarity between two items. Parzen window estimation is applied to get user interest density distribution in total item space. Finally user's attribute similarity and relative entropy are used to determine nearest neighbour user set. Experimental result shows that the algorithm effectively raises recommendation quality of spare data while avoiding error of filling data.

    • Linear Regression and its Optimization Algorithm in Program-Trading System

      2014, 23(12):120-124.

      Abstract (1318) HTML (0) PDF 802.63 K (2691) Comment (0) Favorites

      Abstract:In program trading, trading strategy is determined by forecasting the tendency of prices in the future, based on calculating historical data according to the trading model. This paper proposes a linear regression trading model. It discusses the principle of the model, algorithm implementation and efficiency in running. Finally, an optimal algorithm for linear regression in Program-trading system is obtained which is competent in a real-time calculation for plenty of historical data. The algorithm's time complexity is least.

    • Clustering Ensemble Algorithm for Mixed Attributes Data Based on Relative Density and Entropy

      2014, 23(12):125-130.

      Abstract (1075) HTML (0) PDF 771.18 K (1991) Comment (0) Favorites

      Abstract:Mixed attributes data clustering is a research hotspot in recent years. For mixed attributes data clustering algorithm, it requires handling numeric attributes and categorical attributes simultaneously. However many algorithms have not very good balance with numeric and categorical attributes, and the cluster results are not satisfied. For mixed attributes data set, a new clustering ensemble algorithm based on intersection is proposed. It processes the numeric attributes with a new relative density clustering algorithm, and processes the categorical attributes with a clustering algorithm based on information entropy. Then it fuses these two cluster members with a cluster fusion algorithm based on intersection. Finally, it gets the clustering results. It is validated by taking an experiment on UCI data set Zoo, and compared with the existing k-prototypes algorithm and EM algorithm. The experiment result shows that the new algorithm has higher flexibility and accuracy. The influence of the intersection element ratioand to the result is also discussed.

    • Distributed Load-Balanced Uneven Clustering Algorithm

      2014, 23(12):131-135.

      Abstract (1334) HTML (0) PDF 747.56 K (2018) Comment (0) Favorites

      Abstract:Aiming at solving the problem of the lifetime and the energy efficiency in wireless sensor networks, we proposed a distributed load-balanced uneven clustering algorithm named DLUC. The algorithm adopted ring-based model and data transmission from one ring to the neighbor to finish multi-hop communication between cluster heads. It sets distance threshold in different rings to build unequal size of clusters. DLUC can effectively avoid the "hot spots" problem. In the stage of a multi-hop routing tree conformation, we considered the energy and the distance of relay cluster head nodes. Simulation results indicate that compared with LEACH and EEUC, DLUC balances the consumption better and prolongs the lifetime of networks effectively.

    • Character Recognizer Based on ART1 Network

      2014, 23(12):136-141.

      Abstract (1179) HTML (0) PDF 782.79 K (1890) Comment (0) Favorites

      Abstract:Adaptive Resonance Theory (ART) neural network is analyzed in this paper. A character recognizer is designed and implemented based on the standard ART1 network, aiming at the shortcomings of the standard ART1 network, which concludes the unstablity of network learning and the over sensitiveness to the input sample sequence. This paper gives a method to improve the implementation in C 2 kind of identifier. Experimental validation of these two character recognizer can identify the different character. The improvement method based on standard ART1 network has better stability.

    • Memory Detecting Method for Access Errors Inside Kernel Modules

      2014, 23(12):142-148.

      Abstract (1297) HTML (0) PDF 794.01 K (1963) Comment (0) Favorites

      Abstract:This paper studies the memory access characteristics of Linux kernel module, and then suggests a static approach to detect memory access errors when running the code inside kernel module. Through simulation of instructions inside kernel module and comparison between access request and record of memory region, our suggested method is able to find a variety of memory access errors, such as overflow, accessing arbitrary address, invalid pointer, which are the most common threats. At last, based on ARM Processor platform, we give an implementation of our method for detecting errors induced by kernel module, and the experiment result shows it can efficiently work as we expect.

    • Micro-Simulation on Traffic under Emergency Events

      2014, 23(12):149-153.

      Abstract (1082) HTML (0) PDF 731.77 K (2171) Comment (0) Favorites

      Abstract:The study on the traffic has been carried on aiming at the emergency events. The decision model of the adaptive vehicle was built based on the ABM technology. Acceleration algorithm of the following behavior was introduced with the driving model of the vehicle Agent. The vehicle queue length and the quantity relation between the vehicle Agents were obtained by analyzing the cases experimentally on the open source platform Swarm, which provided reliable data basis for establishing the effective emergency traffic preparedness.

    • Research and Simulation of Assist Robot Driving Vehicle

      2014, 23(12):154-159.

      Abstract (1076) HTML (0) PDF 748.19 K (1845) Comment (0) Favorites

      Abstract:In this paper we present a kind of auxiliary line access method based on image approach to help humanoid robots driving a car in a complicated unknown environments. According to road image taken during driving robot , a point was picked as the next point of the robot driving. According to the location of this point, calculate turning radius. On the steering wheel angle and the turning radius curve fitting, steering wheel angle calculated; According to the Angle of information and draw the vehicle auxiliary line on the image. This algorithm simulated on matlab environment, experimental results show that this method can obtain more accurate auxiliary lines as a reference when the vehicle driving, and bring great convenience to assist the robot successfully driving the vehicle.

    • Camera Calibration Method for Micro-Image Measuring System Based on Hough Transform

      2014, 23(12):160-164.

      Abstract (1256) HTML (0) PDF 1.10 M (1841) Comment (0) Favorites

      Abstract:A camera calibration method for micro-image measuring system is presented. Firstly the micro image of known size microscopic scale is obtained. Followed by pre-processing and edge detection, ruler lines can be cut out from the image. Then based on Hough lines, the longer ruler lines can be identified. So the calibration factor can be calculated by the physical distance and the corresponding pixel distance of the lines. The calibration objects are existing microscopic scales, so this method is easily applied. The experimental results show that calibration precision is high.

    • Routing Protocol of Hierarchical Cluster-Communication Model in the Underwater Acoustic Sensor Network

      2014, 23(12):165-169.

      Abstract (970) HTML (0) PDF 711.99 K (2039) Comment (0) Favorites

      Abstract:Routing protocol plays a very important role in underwater acoustic sensor networks. Based on the traditional TEEN protocol, a new routing protocol named HCM-TEEN(Hierarchical Cluster-communication Model on TEEN) has been put forward. The improved algorithm sets a new threshold function on the basis of the process of cluster candidate and the cluster elimination, and then introduces a Hierarchical Cluster-communication model in the period of data transmission to optimize the routing process. The experiment by the Matlab proved that HCM-TEEN performed better than the traditional algorithm on the network lifetime and the network average residual energy.

    • Detection of Android Phishing Malwares Based on Image Similarity

      2014, 23(12):170-175.

      Abstract (1380) HTML (0) PDF 854.94 K (2978) Comment (0) Favorites

      Abstract:As mobile payment has become increasingly popular recently, some phishing malwares on mobile devices try to steal users' sensitive information through forging a user interface similar to the targeted application, which cannot be detected by existing anti-phishing techniques. We propose a new similarity-based anti-phishing approach to detect phishing malware on Android. With the perceptual image hash technology, it compares the similarity of captured screen images between the suspicious application and the targeted application. If the similarity exceeds a threshold, the suspicious application is determined to be malicious. The experiment proves that the approach is effective to detect phishing malware on Android.

    • Human Ear Recognition Based on Visual Bag-of-Words Model

      2014, 23(12):176-181.

      Abstract (1169) HTML (0) PDF 987.97 K (1913) Comment (0) Favorites

      Abstract:Human ear recognition is one of the most important branches in biometrical recognition and artificial intelligence fields. In this paper, considering the unique texture feature of human ear image, the spatial pyramid visual bag-of-words model was adopted. It transforms the relatively low-level local descriptors of human ear images into global features to preserve the high-level semantic meanings. The support vector machine classifier is utilized to perform the training and recognition task. Experimental results demonstrate that the adopted model could achieve a better accuracy, as an extension and exploration in human ear recognition methods.

    • Forecasting and Modification of Daily Load Curve Based on Data Mining

      2014, 23(12):182-186.

      Abstract (1021) HTML (0) PDF 764.92 K (2064) Comment (0) Favorites

      Abstract:Analyzing the shortcoming of traditional load forecast method, a method of load forecast based on data mining is put forward. Using the decision tree algorithm to make load forecasting, abnormal load data is found among the load forecasting results. This paper relies on association rules algorithm to modify the abnormal load, so that the load forecasting results will be more accurate.

    • Electromagnetic Intelligent Vehicle Tracking Algorithm

      2014, 23(12):187-190.

      Abstract (1782) HTML (0) PDF 912.79 K (6001) Comment (0) Favorites

      Abstract:In this paper, a tracking algorithm called "ratio method" is introduced for intelligent vehicle competition electromagnetic group. The conventional tracking algorithms including "difference method" and "normalization method" have problems. For instance, there are extreme points in the function of deviation value and deviation distance, what is worse, the relation between them will change into negative correlation outside two extreme points. To solve this problem, the ratio method changes the electromotive force values into the ratio of the difference and the sum of respective square root electromotive force values. It turns out this tracking algorithm could remove the extreme points, besides the relation between electric potential difference and deviation distance maintains positive correlation within the entire value range, so as to eliminate misjudgment. After experimental verification, the results using this tracking algorithm are more effective than other conventional tracking algorithms. This paper solves a practical problem appearing in intelligent vehicle competition

    • Session Identification Method Based on Similarity URL

      2014, 23(12):191-196.

      Abstract (1258) HTML (0) PDF 965.30 K (2443) Comment (0) Favorites

      Abstract:With the rapid development of Internet, Web log user behavior analysis has become one of research hotspots in the field of Internet technology. Session identification is the key step in the Web log user behavior analysis. Accurate session identification is the foundation of effective user behavior analysis. IIS Web log analysis is presented in this paper on the basis of a session identification method based on known URL. The experimental results show that this method can effectively identify the user's real conversation.

    • QoS Algorithms in Hierarchical IPv4 Network

      2014, 23(12):197-201.

      Abstract (1483) HTML (0) PDF 1020.39 K (2169) Comment (0) Favorites

      Abstract:Hierarchical IPv4 networks put forward higher requirements for the quality of service. This paper analyzes the advantages, disadvantages and the application environment of the traditional QoS architecture based on business according to the second layer and the third layer of the OSI reference model. Then a QoS algorithm integrated differentiated service model with integrated service model is designed to enhance the QoS of a hierarchical network. The simulation results prove that the model can improve the network's QoS in many aspects such as packet loss rate, transmission delay, delay jitter and network throughput.

    • Algorithms for Mining Frequent Episodes on the Event Sequences

      2014, 23(12):202-205.

      Abstract (1135) HTML (0) PDF 614.76 K (2149) Comment (0) Favorites

      Abstract:Mining frequent episodes on the event sequences is one of the hot areas of data mining. In this paper, support based on non-overlapped occurrence is definited. We propose an algorithm called NONEPI++ for mining frequent episodes, which firstly generate candidate episodes by join episodes, then generate frequent episodes by pre-pruning and timestamp calculating. The algorithm can improve the efficiency of mining episodes. Experiments show that NONEPI++ algorithm can effectively mine frequent episodes.

    • UNI64 Sampling Method on Online Social Networks

      2014, 23(12):206-212.

      Abstract (1133) HTML (0) PDF 695.89 K (2470) Comment (0) Favorites

      Abstract:When studying the sampling methods on online social networks, samples collected by acceptance-rejection method are usually used as the "ground truth" to estimate the pros and cons of other sampling methods. The acceptance rate of the original acceptance-rejection method slumps dramatically since OSN sites updated their user ID from 32bit to 64bit. According to the characteristics of online social networks and taking Sina Weibo for example, we analyzed the distribution of user IDs in Sina Weibo, and proposed an improved acceptance-rejection method called UNI64. In this method, the user ID space is divided into valid intervals and vacant intervals by analyzing the distribution of valid sample IDs and utilizing cluster method. The sampling method generates candidate IDs only in valid intervals, so that the acceptance rate could be effectively improved even in a sparse-distributed user ID space.

    • Architecture of Community Management System

      2014, 23(12):213-216.

      Abstract (1332) HTML (0) PDF 627.86 K (2105) Comment (0) Favorites

      Abstract:In order to build loosely coupled and scalable distributed community management system, a layered architecture of community management system based on SOA is presented. To achieve the layered architecture, the lightweight Java EE framework is applied in SOA technology architecture to build a SSH-based SOA architecture, then the work processes of the architecture is introduced, and the architecture is applied to the design of community management systems.

    • Scientific Projects Management System Based on .NET MVC Framework

      2014, 23(12):217-220.

      Abstract (1250) HTML (0) PDF 756.67 K (2615) Comment (0) Favorites

      Abstract:The scientific projects management system is proposed to alleviate stress of the scientific research managers. It is designed after a study of the needs of X city's scientific projects management. It is developed in Visual Studio 2010 by C# language, and combined with many web technologies (such as SQL Sever online research databases, LINQ and Office etc.). So the users can use it on Internet to achieve scientific projects' declaration, opening, prequalification, acceptance, award and statistics. Through the practical application in X city, the system runs safe and stable.

    • Chinese Characters' Graphics Display Based on the Renesas MCU LCD Module without Character

      2014, 23(12):221-224.

      Abstract (1215) HTML (0) PDF 711.02 K (2492) Comment (0) Favorites

      Abstract:Based on the display principle of dot matrix LCD module without Chinese word stock, we display Chinese characters using Renesas 78K0R/KG3 16bit microcontroller and the modulus software of Chinese characters, considering the characteristics of 128*64 LCD modules.

    • Performance Optimization of Workflow System

      2014, 23(12):225-228.

      Abstract (1177) HTML (0) PDF 804.31 K (2107) Comment (0) Favorites

      Abstract:With the promotion of information construction of enterprise business process, the management of core business process has become an important foundation to further improve the information level. The performance of workflow system determines how efficiently the business process flows to some extent. In this paper, quantitative relationship between performance index and database scale is sought out by quantitatively analyzing the performance of workflow system to put forward key factors and pointcuts of technology for performance optimization. On this basis, performance optimization scenarios of workflow are studied based on database mechanism in this paper and a simple effective algorithm is proposed. As a result, filing mechanism is implemented so that the ultimate goal of workflow system performance optimization can be achieved.

    • Sensor Network Clustering Routing Based on Optimized Energy Welfare Function

      2014, 23(12):229-232.

      Abstract (1016) HTML (0) PDF 625.84 K (1758) Comment (0) Favorites

      Abstract:In order to improve the energy balance of wireless sensors network, we present a Leach-based routing protocol using Optimized Energy Welfare (OEW) called Leach-OEW. The concept of OEW is raised based on the optimized social welfare. The OEW is applied to the election of the cluster heads in the Leach routing protocol of wireless sensors networks to achieve energy balance as well as energy efficiency. The simulation results show that the improved Leach protocol balances the energy consumption of sensor nodes, prolongs the life time of network compared with the Leach and PARPEW protocol.

    • VxBus A429 Interface Driver

      2014, 23(12):233-236.

      Abstract (1345) HTML (0) PDF 1.42 M (2359) Comment (0) Favorites

      Abstract:The new driver architecture VxBus was integrated in VxWorks operation system after the release of VxWorks 6.2. VxBus dirver architecture was modularized with minimal BSP support. This paper analyzes the work mode of VxBus driver architecture. We designed and implemented a type of ARINC429 interface driver based on VxBus. The implement of vxWorks driver based on VxBus has a high degree of reliability and expansibility.

    • Encryption Storage Safety Model Based on SSX20-D Security Chip

      2014, 23(12):237-240.

      Abstract (1122) HTML (0) PDF 666.18 K (2008) Comment (0) Favorites

      Abstract:Aiming at the special requriement of the mobile hing-capacity storage device's safety in the special field, based on SSX20-D security chip, we designed the security model with three levels: data storage security protection, usb flash disk key parameter protection and usb flash disk using management. The security chip uses many security mechanisms, including data encryption, usb flash disk parameter protection, encryption key protection, password-hardware using control, and the usb flash disk anti-attack ability. The mechanism expended the Key's safety to the hing-capacity storage chip. Especially it designed three-level key-protection method which can solve the safety weakness of the key parameter protection. We are using SM1, SHA-256 and self-defined function to make sure absolute security of the key.

    • Security Issues of RFID Production Line

      2014, 23(12):241-244.

      Abstract (1100) HTML (0) PDF 671.90 K (1886) Comment (0) Favorites

      Abstract:This article uses attack tree model to analysis the RFID-based production line system security issues; gives the corresponding security policy according to the questions described by the attack tree mode model. Directional Faraday net is used to solve the problem of the safety of the RFID reader. The HASH chain is used to solve the problem of the RFID information security. Mutual authentication system based on digital signatures is used to solve the communication security issues. An overall information security management system is established to solve the whole security issues of the production line.

    • Telephone Dialing Function Based on Android

      2014, 23(12):245-248.

      Abstract (1178) HTML (0) PDF 703.53 K (2421) Comment (0) Favorites

      Abstract:Android is an open platform. It has very rich applications. This paper combines Android platform and telephone to study and design an application of making and receiving calls on the Android platform to make it has the function of telephone dialing. Android platform and telephone are connected by the control circuit with analog switches CD4052. The telephone dial-up function in Android system can be implemented by writing a driver in Linux kernel, generating dynamic libraries in JNI and HAL and creating application in the application layer. After testing, the design of the dial-up application can successfully dial the number.

    • Service Selection Strategies Based on Multi-Attribute Group Decision-Making Considering QoS Preference

      2014, 23(12):249-252.

      Abstract (1290) HTML (0) PDF 666.43 K (1869) Comment (0) Favorites

      Abstract:When facing with multiple Web services with the same or similar functionality, QoS (quality of service) has become an important criterion for users to select the appropriate Web services. We present a QoS model, the QoS attributes are divided into exact numeric type, interval numeric and Triangular fuzzy numeric. We propose a kind of multi-attribute group decision-making model based on TOPSIS (echnique for order preference by similarity to an ideal solution) to select Web services, which considers weights of multiple decision makers and weights of the QoS preference in the decision process. The example proves that the method is feasible.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063