• Volume 19,Issue 11,2010 Table of Contents
    Select All
    Display Type: |
    • Business Execution Platform Based on Service Overlay Networks

      2010, 19(11):1-4. CSTR:

      Abstract (2071) HTML (0) PDF 609.93 K (3432) Comment (0) Favorites

      Abstract:To meet the dynamic and scalability of distributed business, a business execution platform—BEPSON (Business Execution Platform Based On Service Overlay Network), is proposed and implemented. The platform is based on service overlay network, using a layered architecture. A QoS guaranteed dynamic service discovery algorithm and a distributed execution strategy are proposed and implemented on the platform. Example shows that the platform is flexible and efficient.

    • Traditional Chinese Medicine Data Mining Platform Based on Strategy Pattern

      2010, 19(11):5-9. CSTR:

      Abstract (1592) HTML (0) PDF 438.00 K (2821) Comment (0) Favorites

      Abstract:With the development of data mining technology and traditional Chinese medicine information system, many data mining methods have been applied to traditional Chinese medicine research. This paper discusses the application of strategy pattern (one of object oriented software design patterns) on data mining scientific research software platform design and development, and the design summary of the platform. On this basis, a sort of thoughtway of traditional Chinese medicine data mining study is proposed, which is: encapsulating traditional Chinese medicine problems(data), and encapsulating data mining methods(algorithm), which realize uniform interface, thus researchers can try different data mining methods in a sort of traditional Chinese medicine problem and use a data mining method in different traditional Chinese medicine problems. Based on the thoughtway above, this paper realizes a traditional Chinese medicine data mining platform for Chinese medicine data mining research.

    • Electricity Application System Data Exchange Platform

      2010, 19(11):10-14. CSTR:

      Abstract (2067) HTML (0) PDF 626.33 K (3993) Comment (0) Favorites

      Abstract:The modern industry resources process characteristics of distributed, heterogeneous and cooperative. The paper has analyzed the electricity application system. Since data sharing mechanism between the various electricity application system of LiaoNing province lacks of specification and standardization, information shares hardly and data exchange are inefficient, a data exchange platform is proposed in this paper which is a based data sharing application architecture. The application framework is based on SOA architecture. It unifies data exchange standards by using XML. The data exchange platform can resolve the data exchange and data sharing. Through practical application, the platform can excellently improve the data exchange and sharing between various electricity application system and company operational efficiency.

    • Video Streaming Real-Time Transmission System Based on ARM11

      2010, 19(11):15-18. CSTR:

      Abstract (2003) HTML (0) PDF 767.57 K (5735) Comment (0) Favorites

      Abstract:This paper presents a method of design and realization of H.264 video streaming real-time transmission system, which contains two parts—server and client. Using the Samsung's latest ARM11 chip S3C6410 as the main controller, Server adopts V4L2 interface technology, the latest H.264 video coding technology, and RTP / RTCP Real-time Transport Protocol to complete video capture, encoding, and transmission process in the embedded environment of linux. The application development of video real-time display and storage can be achieved in the client end. Experimental results show that the system can achieve 25fps @ 720 × 480 image quality, and the video is delivered clear and stable with strong practical and broad application prospects.

    • Athletic Training System Based on Wireless Sensor Network

      2010, 19(11):19-22. CSTR:

      Abstract (1629) HTML (0) PDF 828.22 K (3326) Comment (0) Favorites

      Abstract:According to the application requirement in sports training, a new athletic training system is designed by taking advantage of wireless sensor network technologies. It is composed of the embedded data gathering terminal and the database server. Designed with sensor nodes and base stations, the hardware can examine the real-time acquisition of the movement parameters of athletes. Meanwhile, nodes, based station controlling and data management software is designed, realizing its functions of data receiving, data storing and analyzing. Through system experiment, the result indicates that athletic training system meets the sports training need and provide an effective research tool for making scientific training program.

    • Building Embedded Linux System Based on ARM

      2010, 19(11):23-26. CSTR:

      Abstract (2057) HTML (0) PDF 718.64 K (4214) Comment (0) Favorites

      Abstract:This paper discusses the process of building embedded Linux system on the ARM920T core-based S3C2410 platform, including the establishment of cross-development environment, the transplanting of U-Boot and Linux kernel to a specific target platform, and the building of root file system. The final system proves to be stable and reliable after several testing. Also it’s helpful to the exploiting of other embedded systems.

    • Data Exchange Platform Based on ERP Cascade-Data Center

      2010, 19(11):27-31. CSTR:

      Abstract (1983) HTML (0) PDF 696.68 K (4119) Comment (0) Favorites

      Abstract:In the modern informatization construction, ERP has gradually become a common management information system at home and abroad, it was very important on making a consistent decision and sharing resource of the enterprise. But the coexistence of heterogeneous systems lead to disperse resource, and it makes that there are not any information of integrative, efficient and accurate for decision-makers from ERP. This paper analyzes the technology of Data Exchange, and combines the applications of Web Services and Enterprise Service Bus, thus it gives a method to resolve the heterogeneous data in the group company, it is finally seamless integration among the different systems.

    • CMMB-Based TV Broadcasting System

      2010, 19(11):32-37. CSTR:

      Abstract (1650) HTML (0) PDF 1.19 M (3842) Comment (0) Favorites

      Abstract:CMMB is the abbreviation of China Mobile Multimedia Broadcasting. At present, CMMB system mainly provides video broadcasting service. With the restriction of hardware, only the terminal with the CMMB module can receive CMMB video program. A digital TV broadcasting system based on CMMB is presented. The framework of system and the design of all parts are expounded. The implementations of the key technologies and algorithms are explained in detail. Experiments show the system is able to accomplish broadcasting of the digital TV based on CMMB and share watching digital TV program under Windows, Linux, Symbian operating systems. It extends the function of general intelligent device and reduces the costs and resolves the problem of CMMB poor indoor signal coverage.

    • Construction and Application of Domain Ontology Repository for Electronic Commerce

      2010, 19(11):38-42. CSTR:

      Abstract (1863) HTML (0) PDF 703.15 K (4118) Comment (0) Favorites

      Abstract:Ontology contains abundant semantic knowledge, syntax structure, and shared information. In this paper, a domain ontology repository for electronic commerce is firstly established to solve the problem of data structural and semantic isomerism. And then a prototype system of automatic Chinese word segmentation is developed based on the domain ontology repository. The experiment results show that the recall rate of Chinese word segmentation is improved partly.

    • Serial Device Based on Embedded System Remote Monitoring System

      2010, 19(11):43-47. CSTR:

      Abstract (2153) HTML (0) PDF 732.79 K (3805) Comment (0) Favorites

      Abstract:This article draws on domain of common IT remote monitoring of the implementation of the plan. From the application point of view to design a real-time and reliable serial device remote monitoring system, causes not to have the networking function originally and to disperse the regional serial devices is connected in the ethernet, make full use of existing Internet resources for transmission and management of data. Through studies the embedded S3C2440 the module of serial port ethernet communication, designed a software program to realize, serial port ethernet communication applications in the multithreading technology, achieved serial device serial protocol and TCP/IP protocol conversion. In the program establish a remote tunnel link using OpenVPN, remote login through telnet embedded platform to monitor the embedded end. The experimental test serial data in remote monitoring and control of the computer has a good consistency and achieved the monitoring of serial devices.

    • Service-Virtualization Model Based on Dynamic Semantic

      2010, 19(11):48-51. CSTR:

      Abstract (2277) HTML (0) PDF 421.91 K (2400) Comment (0) Favorites

      Abstract:In order to solve the problem of end user oriented programming, this paper proposes a kind of service-virtualization model based on dynamic semantic. This model is based on the theory of SOA, adopts service oriented computing and Web service technology, combines the ontology service description language and description logic, builds up the service-virtualization model, and then realizes the end user oriented programming. This model improves of recall and precision model effectively, and solves software crisis in a certain extent.

    • Sensitive Attribute Algorithm for Decision Tree SID3

      2010, 19(11):52-55. CSTR:

      Abstract (2134) HTML (0) PDF 582.31 K (4061) Comment (0) Favorites

      Abstract:Decision tree is the most important classification algorithm in data mining. At present, there are many decision tree algorithms, ID3 algorithm is the core one. This paper first studies and analyses the ID3 algorithm, then discusses the complicacy of computing the Information Entropy of attribute, and put forward a new heuristic based on the sensitive of attribute contributing to the classification. Finally, this paper compares the two algorithms by experiments, the results show that SID3 can generate the correct decision tree and the process is more simple, more quickly.

    • Control Method of Dynamic Inversion with Neural Network Used for Multi-Variable Nonlinear Flight Control System

      2010, 19(11):56-59. CSTR:

      Abstract (1634) HTML (0) PDF 615.09 K (3843) Comment (0) Favorites

      Abstract:Aiming at multi-variable nonlinear flight control system,this paper analyzes the analytical inverse system in theory detailedly. By the tracking principle of neural network, a dynamic neural network is presented, which consist of static neural network and integrators. The paper designs a control method of dynamic inversion with neural network used for multi-variable nonlinear flight control system, and makes simulation of flight control system of power parafoil. Simulation results demonstrate that the control method has strong ability of control and robustness.

    • Ranking Algorithm of Search Engine Based on Users Feedback

      2010, 19(11):60-65. CSTR:

      Abstract (1665) HTML (0) PDF 593.77 K (5230) Comment (0) Favorites

      Abstract:This paper used user behavior in Web 2.0 as a research object, explored ways of user feedback, and proposed the concept of user feedback score. It studied the specific methods and corresponding realization for user feedback impacting the final ranking of search results, and presented a sorting algorithm for search results based on neural network. The algorithm used the BP neural network model, select samples to train the neural network based on user feedback score. Traditional search results will be put into the trained neural network to compute, and a new ranking will be made according to relevance of the web page which indicated by the calculated results. This algorithm used the neural network’s pattern recognition capabilities, combined user feedback and search engine effectively, making search results more in line with the user,s search request.

    • Query Dependent Visual Similarity in Image Search Reranking

      2010, 19(11):66-70. CSTR:

      Abstract (1885) HTML (0) PDF 620.10 K (3896) Comment (0) Favorites

      Abstract:Recently image search engines mainly base on associated textual information. Image reranking is an effective approach to refine the initial text-based search result by mining the visual information of the returned images. And the estimation of visual similarity is the fundamental factor in reranking methods. However, the existing similarity measures are independent of the query. This paper proposes a query dependent method by incorporating the global visual similarity, local visual similarity and visual word co-occurrence into an iterative propagation framework. Then it embed the query dependent similarity into random walk rereanking method. The experiments on a collected Live Image dataset demonstrate that the proposed query dependent similarity outperforms the global, local similarity and their linear combination.

    • Dynamic Collaborative Trust Model Based on Pervasive Computing

      2010, 19(11):71-74. CSTR:

      Abstract (2122) HTML (0) PDF 678.79 K (3307) Comment (0) Favorites

      Abstract:Pervasive computing environment is a highly dynamic distributed environment in which principals collaborate spontaneously and unpredictably. Therefore, the pervasive computing puts more emphasis on the role of trust and puts forward higher request to system security than traditional calculation. A new dynamic collaborative trust model composed trust-reputation module and risk module was proposed based on combining credence elements and information safety risk assessment. This model resolve the limitations in the integrality of evidence used for the trust judgment, and in favor of setting up the reliable trust relationship in the entities, and improving environment and information security of universal.

    • De-Duplication System Based on Suffix Structure for the Block Size Optimization

      2010, 19(11):75-78. CSTR:

      Abstract (1681) HTML (0) PDF 788.14 K (2870) Comment (0) Favorites

      Abstract:To further improve the performance of data de-duplication system, the paper brings out a de-duplication system based on data blocks’ suffix array and longest common prefix for the block size optimization. The method first chunks input data into segments with a first size, then identifies the segments and create the indexes queue for the identifiers, and then create the suffix array and the longest common prefix structure from the indexes, next determines a second optimize size based on repeated indexes sequences and non-repeated indexes, finally chunks the input data into segments based on super chunks and saves the compression result. The result shows that it achieves a better compression ratio and object reconstruction for the given input data comparing the original fixed chunk segment size.

    • Robot Trajectory Planning Based on Improved Ant Colony Algorithm

      2010, 19(11):79-82. CSTR:

      Abstract (1719) HTML (0) PDF 759.71 K (3280) Comment (0) Favorites

      Abstract:In order to optimize the work of robot end-hand trajectory, improve working efficiency, reduce energy loss, established the optimization model with the goal of shortest exercise time and path, minimum impact. Based on traditional ant colony algorithm established the overall inspiration factor with the introduction of information to improve the optimal of path searching efficiency and used the death of ants mechanisms and penalty function to avoid the pitfalls encountered in the path formed at the deadlock situation. Test results show that the improved ant colony algorithm is faster convergence and can map out the optimal path in a relatively short period of time to meet the conditions.

    • Trust Evaluation Model Based on Cloud Model for C2C Electronic Commerce

      2010, 19(11):83-87. CSTR:

      Abstract (1752) HTML (0) PDF 878.61 K (3249) Comment (0) Favorites

      Abstract:To solve the problem of the transaction security in C2C e-commerce, this paper proposes an evaluation model based on cloud model theory. The created definition of the trust cloud and the standard cloud in the valuation model show the ambiguity and random of the trust and realize transferring quantitative data to qualitative data. This paper puts forward the synthesis, similarity operation and realizes comprehensive evaluation and decision-making based on trust classification. The results of experiments show that the trust evaluation model proposed is valid.

    • Privacy Preserving Based on Rough Set Theory in Authentication for Pervasive Computing

      2010, 19(11):88-91. CSTR:

      Abstract (1715) HTML (0) PDF 840.27 K (2817) Comment (0) Favorites

      Abstract:In the pervasive computing environment, the users have to provide certain authentication information to the services provider to get the services they need, but the authentication information often contains the privacy which the users do not want to be leaked. In order to protect this privacy, this paper proposed a privacy preserving policy based on rough set theory in authentication for pervasive computing: the users expand the authentication information to a rough set and then provide the rough set to the services provider, the services provider extracts the users’ true authentication information from the rough set according to the pervasive preserving policy and then authenticate the users’ service request. The privacy preserving policy makes use of the uncertainty of rough set and can effectively prevent the leakage of user’s privacy.

    • VRML-Based Interactive Scene of the Moving Celestial Objects

      2010, 19(11):92-97. CSTR:

      Abstract (1614) HTML (0) PDF 1020.45 K (3575) Comment (0) Favorites

      Abstract:VRML is the Virtual Reality Modeling Language(Virtual Reality Model Language) for short, is a text-based description of three-dimensional environment scene description language, HTML, 3D (three dimensional) simulation. To the moving celestial objects, such as solar eclipse and moon eclipse, this paper discusses the means and methods of the use of component-based technology to build three-dimensional movement of celestial objects as well as VRML virtual scenes interact with the outside world. Because the operation of three-dimensional making software (for example 3D Max) in the tradition can’t be controlled by user in the demo and interacted in time, this paper studies to achieve the movement of celestial objects interactive method and implementation process can be achieved by the use of VRML interpolator node, sensor nodes, Script node integrated combination of high-level language (such as Javascript)in the library. The human interacts with computer with the platform. Because speed is not ideal about the complex interactive three-dimensional motion, this article concludes the movement scene is optimized by Group and inline programs.

    • Improved Method for Test Path Set Generation

      2010, 19(11):98-101. CSTR:

      Abstract (1737) HTML (0) PDF 948.47 K (2553) Comment (0) Favorites

      Abstract:An improved method for generating test path set is given based on then analysis of two effective algorithms of branch test paths generation. A system for generating test paths is designed and then validated with instances. The test results show that the system is effective in generating branch test paths, and reaches high test coverage.

    • High Performance Algorithm for Task Scheduling in Heterogeneous Environment

      2010, 19(11):102-105. CSTR:

      Abstract (1654) HTML (0) PDF 902.69 K (3141) Comment (0) Favorites

      Abstract:Efficient task scheduling is critical for obtaining high performance in a heterogeneous computing environment. Although there are many scheduling algorithms already, they may not have good results, and take high cost. In this paper, a new list scheduling heuristics, named Accurate Priority Scheduling (APS), is presented. The APS selects task with random directed acyclic graph (DAG) and assigns tasks to processors with the insertion based scheduling policy to minimize the makespan. Compared with LMT, HEFT, CPOP based on, show the APS results good performances in most situations.

    • Modified Naive Bayes Classifier Using Association Rules

      2010, 19(11):106-109. CSTR:

      Abstract (2014) HTML (0) PDF 812.82 K (3641) Comment (0) Favorites

      Abstract:Naive Bayes classification is a kind of simple and effective classification model. However, the performance of this model may be poor due to the assumption on the condition independence. By introducing association rules, this classification model can be improved in two way. On the one hand, the associated relationship between condition attributes can be found out through association rules mining, in order to weaken the independent assumption. On the other hand, Naive Bayes is weighted by computing the confidence of association rules.

    • Method for Sentence Similarity Computation by Integrating Multi-Features

      2010, 19(11):110-114. CSTR:

      Abstract (1429) HTML (0) PDF 889.56 K (5639) Comment (0) Favorites

      Abstract:A method for sentence similarity computation by integrating multi-features was proposed. According to the syntax feature, semantic feature and word feature of the sentences, the similarity was measured, respectively. Then, this paper combined the sentence similarity by endowing the above three features with different weights. Comparatively, this kind of estimation of sentence similarity is more accurate than the previous because both the deep and surface information of the sentences were taken into accounted, and the vocabulary of sentences was also extended in the process of calculation.

    • Dictionary Chinese Word Segmentation Method Combined with CRFs

      2010, 19(11):115-118. CSTR:

      Abstract (1527) HTML (0) PDF 870.13 K (3287) Comment (0) Favorites

      Abstract:The Chinese Segmentation of matching literal based on Dictionary can not resolve the problem of segmenting ambiguousness and Combinatorial ambiguity. Based on the dictionary segmentation, this paper propose a method of Dictionary Chinese Word Segmentation combined with CRFs. It is proved that this method can have better performance than CRFs segmentation and traditional dictionary segmentation.

    • Cross-Layer Adaptive Design for Ad Hoc Network Protocal

      2010, 19(11):119-122. CSTR:

      Abstract (1656) HTML (0) PDF 870.92 K (3712) Comment (0) Favorites

      Abstract:Ad Hoc network has dynamic network environment and different service requirements. First, demand on cross layer adaptive design for Ad Hoc network protocol is presented; second, the definition, module, mechanism, design requirements etc are introduced, and more importantly, implementation approach and technology are proposed; Finally the advantages and disadvantages of cross-layer design are showed.

    • Metrics of Software Reliability Test Case Based on Reuse

      2010, 19(11):123-127. CSTR:

      Abstract (2030) HTML (0) PDF 895.77 K (3421) Comment (0) Favorites

      Abstract:The reuse metrics of the test case is a realistic problem during software reliability test based on reuse, at the present time. Based on the designing of the test case reuse model, we use the feature analysis method to account the weight of reuse resource firstly, secondly we calculate the reuse metrics of the resource in the test case, at last we get the average reuse metrics based on the formula. We solved the problem of reuse metrics from quantitative angle in this paper.

    • Cooperation System of Oilfield Exploration Well Operation Management

      2010, 19(11):128-131. CSTR:

      Abstract (1867) HTML (0) PDF 579.89 K (3432) Comment (0) Favorites

      Abstract:Exploration well operation management system standardizes management norms of work nodes and information criteria by reorganizing and optimizing operation management workflow of pre-exploration wells, regional exploration wells, and appraisal wells in Daqing Oilfield under the framework of Daqing cooperation work platform. The system involves not only worksite design, exploration well drilling, geological logging, geophysical logging, seismic VSP logging, reservoir testing, reservoir stimulation and oil and gas well production test, but also scientific research and step-by-step approval of each design before and after engineering implementation and final acceptance of research achievement. The system integrates all specialties together into a platform, and combines work flow and data flow of exploration well operation management, so as to realize unified operation management, database building and data application of exploration wells and also achieve generation, integrated application and sharing of data. This is the first system in China for exploration wells operation management.

    • Information Service Platform Based on Unified Search

      2010, 19(11):132-138. CSTR:

      Abstract (1476) HTML (0) PDF 607.79 K (3392) Comment (0) Favorites

      Abstract:Nowadays, most of IT information service system are lack of resources localization ability and only provide simple data query. Therefore, I analyse the drawback in the current information service models, and propose unified search structure based on information integration framework to improve information search quality. This model consists of two components . Firstly, in order to form data collection as the source of information, distributed heterogeneous data is extracted, transformed and aggregated by the information integration module. Secondly, according to Internet Search Engine model and COMPASS framework, different types, size and themes data is queried and displayed in a unified way. This enhances system information integration capabilities and shows powerful expansibility. What is more important is our proposed system extremely promotes user’s information localization ability and using experience as Baidu or Google. Finally, this model is successfully applied to the information management and service platform development, which is one of the Eleventh Five-year informationization projects of Chinese Academy of Sciences.

    • Design and Implementation in Insurance Data Analysing and Decision-Making Based on Business Intelligence

      2010, 19(11):139-142. CSTR:

      Abstract (1556) HTML (0) PDF 629.96 K (4225) Comment (0) Favorites

      Abstract:This paper introduces the design and implementation in insurance data analysing and decision-making based on business intelligence. This system implements the construction in data-warehouse, the development of data-mining and multidimensional data collection, and the implementation of integration of BI lay-out-layer using Sharepint Server 2007. Then it introduces the resolvation of this system, key technology and implementation, lay-out tools and effect with all the details and particulars. It has been widly and deeply used in some filiale of China Life insurance Co.Ltd. At last this paper provides that the key to implementing of BI is bringing up the application team with the promotion of management layer.

    • Integration Solution for Electricity Transaction and Operation System Based on SOA

      2010, 19(11):143-147. CSTR:

      Abstract (1574) HTML (0) PDF 605.76 K (2905) Comment (0) Favorites

      Abstract:As national electricity market reform and development, and enterprise information integration process, the early electricity transaction and operation system is very difficult to adapt to new requirements. This paper presents a technical architecture based on SOA design model of power trading system using SCA\SDO programming model and web service to build electricity trading operation system. It solves the system reusability and the flexibility issue, at the same time integrates power transactions operating system to other enterprise production systems. It proposes a valid solution for enterprise application integration in the heterogeneous environment at the technical level.

    • Online Administration Examination and Approval System Development Based on MDA

      2010, 19(11):148-151. CSTR:

      Abstract (1652) HTML (0) PDF 943.22 K (3448) Comment (0) Favorites

      Abstract:In order to find a solution to the low development efficiency and difficult optimization of the the online examination and approval system,this paper presents a development approach which is based on Model Driven Architecture. A government department subsystem is given as a case study to focus the analysis and design of this approach. Practice has proved that this method overcomes the shortcomings brought on by the traditional development approach and promises the consistency of all the subsystems. So it is an especially suitable method for the system.

    • Official Document Management System Based on EOS

      2010, 19(11):152-156. CSTR:

      Abstract (1853) HTML (0) PDF 658.14 K (3882) Comment (0) Favorites

      Abstract:The official document transferring among departments has become more complicated and dynamic, and the traditional application architecture has difficulties in handling the situation. Service Oriented Architecture provides a solution. EOS platform is an SOA platform which conforms to SCA/SDO specification. This article introduces the EOS architecture and operation principle, analyses the applicationg requirements of enterprise and public institution on official document managing and brings forward a design and implementation of officail document management system. The system clarifies the document managing steps and helps to improve work efficiency with good extendability and reusability.

    • Path Planning Research for Multi-Agent Robot Based on Co-Evolution

      2010, 19(11):157-161. CSTR:

      Abstract (1991) HTML (0) PDF 401.26 K (3861) Comment (0) Favorites

      Abstract:Co-Evolution is a novel, simple and effective Intelligent Optimization approach, has good convergence, robustness and efficiency in multi-objective optimization problem has been very widely used. In this paper, its application to complex environment of multi-robot path planning, and design of the fitness evaluation function. At the same time, the introduction of a new series of operator variability and effective manner to multi-robot path planning, optimization, accelerated the pace of overall planning to avoid a local optimum planning, multi-robot system in order to obtain the global optimal or sub-optimal solution. Finally, the simulation results prove the method is feasible and effective.

    • Simulation Training System for Supervision of Power Work Safety Based on Virtual Reality

      2010, 19(11):162-165. CSTR:

      Abstract (1836) HTML (0) PDF 986.55 K (4405) Comment (0) Favorites

      Abstract:Simulation training for supervision of power work safety is important for ensuringing high-quality and uninterrupted power service.The introduction of virtual reality technology,not only can save teachers resources and hardware resources,but also enhances the effect of training.This paper discusses the key technologies of simulation training system for supervision of power work safety based on Virtual Reality,including 3D modeling,collision detection, interactive behavior control and so on,and elaborates the framework of system and function of each module.The development and application of system bring convenience for staff training and effective to improve the levels of power safe operation.

    • Research of Temperature Control Based on Outlier Mining in RFID Cold Chain

      2010, 19(11):166-170. CSTR:

      Abstract (1939) HTML (0) PDF 636.70 K (3761) Comment (0) Favorites

      Abstract:Firstly, the chief problem of cold-chain logistics management was discussed, and the application of the RFID technology in the temperature monitoring was introduced. Then, the development of RFID data mining algorithms were studied in detail. Furthermore, a quick outlier detection algorithm (QOD) was proposed and the accuracy of QOD was proved by experimental results. Finally, the future of RFID cold chain temperature-controlled research was prospected.

    • Research and Realization of a Visual Virtual Lab Using Stub Method

      2010, 19(11):171-175. CSTR:

      Abstract (1640) HTML (0) PDF 852.69 K (3736) Comment (0) Favorites

      Abstract:In order to address the lack and inefficiency of teaching tools of the operating system principles course, a VOSLS was proposed. It used Stub method to debug the experimental operating system kernel, and reduce the complex GDB debugging protocols to simple Stub communication protocols. It communicated with the experimental operating system running on a Virtual Machine through the floppy or hard disk image files. Then the running operating system,s information was graphically and vividly delivered to the users by using visualization graphics engine technology. Practice has proved that this system can significantly improve the experimental teaching effect of the operating system principles course.

    • Visualized Simulation Technique in Coalmine Safety Training

      2010, 19(11):176-179. CSTR:

      Abstract (1639) HTML (0) PDF 1.27 M (3507) Comment (0) Favorites

      Abstract:In this paper, as the main purpose of production safety, security skills training and improve the efficiency of mine operations discusses the importance of computer virtual reality technology to build coal mine safety training and education system, and describes the key technologies of virtual reality. By use 3D MAX modeling, textures and rendering, Virtools DEV, developing interactive education system. Through voice, text, images, 3D roaming and other forms to show the consequences of unsafe behavior in the process of coal production. The system has been put into use, greatly improving the quality of coal mine safety training and obtain a good training results.

    • Table Recognition Based on CNN and Grid Feature

      2010, 19(11):180-184. CSTR:

      Abstract (2259) HTML (0) PDF 742.16 K (4769) Comment (0) Favorites

      Abstract:As a carrier of the text, the table has very important historical and artistic value. However, because of a long time, a lot of noises on the rubbings have impact on recognizing text. This paper proposes a new method for this case. Firstly, remove the noises of a single table using CNN technology. And then recognize the table using the grid feature extraction method. The simulation example is based on MATLAB software, and we achieve good results.

    • Design and Implementation of VPWS Redundant Backup Based on MPLS L2VPN Technology

      2010, 19(11):185-189. CSTR:

      Abstract (2302) HTML (0) PDF 815.00 K (5306) Comment (0) Favorites

      Abstract:At present, MPLS L2VPN technology has been the most popular VPN solution in the field of VPN application. For enhancing the reliability of data transmission of L2VPN based on VPWS technology, this paper proposes a scheme of VPWS redundant backup. This solution adopts the state machine design method, which states and events are mapped to varieties of processing functions through function pointers and two-dimensional arrays realizes. When the network link goes wrong, the solution can switch the state of standby PW of VPWS redundant backup quickly to accelerate the network convergence, which ensures the stability of L2VPN service.

    • Real-Time and Large Throughput Data Processing System Using Concurrency

      2010, 19(11):190-194. CSTR:

      Abstract (1851) HTML (0) PDF 874.21 K (3683) Comment (0) Favorites

      Abstract:Data acquiring and processing from distributed terminal unit by network are usually real-time, large throughput and periodic, so data acquisition, processing and result should be done within data output period in high-efficiency. A real-time and large throughput data processing model using concurrency is built for this given application. The working principle and basic structure for the model are discussed in detail, also concurrency for the model and corresponding key buffer which concurrent threads put data into and gets data out are analyzed in particular. As is used in observation application networked by 1500 automatic weather stations, which has indicated that the model is capable in processing periodic surge observation data and has higher data throughput, as well as implements high speed and accurate results, high stability and reliability.

    • Implemention of Multicast Based on Vlan in Lay3 Switch

      2010, 19(11):195-198. CSTR:

      Abstract (2159) HTML (0) PDF 844.07 K (5726) Comment (0) Favorites

      Abstract:This paper describes the support for multicast and vlan(virtual LAN) on bcm5695 switch chip , analyzes the advantage of lay3 switch comparing router on LAN, discusses and resolves the difficulty of routing on vlan through hardware address table, and presents the implemention of software.

    • Ghost Technology Research Based on HPA Space in Windows Platform System

      2010, 19(11):199-202. CSTR:

      Abstract (2097) HTML (0) PDF 839.35 K (3368) Comment (0) Favorites

      Abstract:In this paper, the windows platform backup and restore technology Research and design based on HPA for military construction projects (military end-protection system), the core content addressed the defects of ghost software which running under Dos, and implements the use of HPA technology hidden system partition backup file, forward the operating system backup and restore software technology to a new phase, while provided a reliable guaranteed the military information construction. The final performance of the software that: system backup and restore under the windows platform and Based on HPA technology is completely achieved the expected results, provide sufficient information to meet the building needs of the armed forces, while compared to ghost software, performance and user experience has been a huge boost.

    • Research and Realization of Priority Inheritance Applied in Linux Kernel Semaphore

      2010, 19(11):203-207. CSTR:

      Abstract (2222) HTML (0) PDF 891.48 K (3678) Comment (0) Favorites

      Abstract:It is very important to solve the problem of priority inversion by means of priority inheritance when applying Linux in real-time embedded system. Based on the analysis of the Linux source codes about kernel semaphore operation, this paper realizes the base priority inheritance protocol by modifying the Linux kernel, and passes the test on the embedded system of PCM-3350.

    • Research on Conformance Test of OSEK/VDX Operating System Based on CTM

      2010, 19(11):208-212. CSTR:

      Abstract (1879) HTML (0) PDF 497.87 K (3148) Comment (0) Favorites

      Abstract:After in-depth study of OSEK/VDX operating system specification, a method of conformance test for OSEK/VDX operating system based on classification tree is proposed. This method works as follows: first, test purposes are extracted from the OSEK specification; next, according to the specification and test purposes, classification tree is constructed and the input domain of the classification tree is divided; then generation and constraint rules are added to the tree; finally, conformance test cases are automatically generated with the help of CTE XL tool. The effectiveness and correctness of OSEK/VDX operating system conformance test using classification tree method are proved through the conformance test of MiniOSEK.

    • User Access Clustering Algorithm in Electronic Commerce Website Using Denoising and Dissimilarity

      2010, 19(11):213-216. CSTR:

      Abstract (1914) HTML (0) PDF 499.69 K (2953) Comment (0) Favorites

      Abstract:E-commerce web site contains a large user access to information., by data mining, can enhance the site to an accurate understanding of user access to information to enhance e-commerce web site click-through rate. To do this will extract the e-commerce website logs the user access to link data, the use of denoising techniques logging user access to link data filtering analysis, and the data was became binary array by dissimilarity binary relation, so this data will be computed by differentiation analysis, and the realization electricity commerce website user,s cluster, will provide the reference for the website page optimization and user’s interest and habbies.

    • Report Automatic Generation Model

      2010, 19(11):217-221. CSTR:

      Abstract (1805) HTML (0) PDF 590.91 K (3335) Comment (0) Favorites

      Abstract:Report function is the most basic and important need of the database application system. On the basis of studying plenty of report generation model, this paper puts forward a kind of automatic generation model based on MDA. ASP.NET is used as a target platform in the experiment which shows that this approach is correct.

    • Method for Hua Rongdao Based on Breadth-First Search

      2010, 19(11):222-225. CSTR:

      Abstract (1665) HTML (0) PDF 1.04 M (4581) Comment (0) Favorites

      Abstract:Hua Rongdao is a very famous puzzled of China.In this paper,through analysis of Hua Rongdao,an efficient and convenient algorithm was used to express the layout.And then we use a Hash algorithm,which HashCode was found based on cumulative fold,to solve the problems.The experiment shows that this method is a very efficient way in finding the answer.

    • Matching Algorithm for XML Store-Based Program Query

      2010, 19(11):226-228. CSTR:

      Abstract (1749) HTML (0) PDF 933.36 K (3136) Comment (0) Favorites

      Abstract:On the base of studying the program code similarity measure method, proposed matching algorithm for XMLstore-based programs query. Because XML store uses tree structure to save the XML document, the algorithm will query the DVM tree in XML store to determine whether have the same structure between subtrees, for similarity measure. Finally, a series of experiments that carried out on the prototype system proved that the algorithm is feasible and effective.

    • Thumb Controlled Key Extraction Method of Virtual Keyboard for Touch-Screen Mobile

      2010, 19(11):229-233. CSTR:

      Abstract (2431) HTML (0) PDF 755.26 K (4061) Comment (0) Favorites

      Abstract:Through analysis of existing key extraction methods of virtual keyboard for touch-screen mobile and physiological characteristics of thumb, a new extraction method of virtual keyboard was proposed. This method combines prompt box shows the information of buttons around the touch points, In the case of the first click has failed to acquire the target key, it use the sliding analysis to get the right target key. In this way, the error rate of the key selection was reduced and the speed of the correct choice was guaranteed. Theoretical analysis and experimental results show that this approach resolved the problem of Coverage and location ambiguity which was caused by using thumb to acquire the target key when the density of the target button is great and the button size is relatively small.

    • Amblyopia Assistant Examination Method Based on Psychophysics

      2010, 19(11):234-238. CSTR:

      Abstract (2515) HTML (0) PDF 742.38 K (2804) Comment (0) Favorites

      Abstract:Amblyopia is a developmental visual disorder characterized by reduced vision in the absence of any detectable structural or pathological abnormalities that can not improve with refractive correction, there are about 2.8% of people in China have amblyopic disease. Amblyopia is a developmental disease , it will be better to detect and treat as soon as possible, therefore, according to the mechanism of amblyopia, use psychophysical methods, design an examination method to help doctors to diagnose the disease earlier, and make better treatment subjects for the patients will have important meaning. In this paper, Matlab7.0 and Psychophysics Toolbox2.5 are adopted to design and implement a new method based on Gabor stimulus which used for detecting contrast sensitivity and crowding effect in amblyopia. The clinical trails show that the examination method is simple and convenient, it has important meaning to detect and examin different vision functions of amblyopia.

    • Research and Application of a Time-Control Model in the Workflow

      2010, 19(11):239-241. CSTR:

      Abstract (1569) HTML (0) PDF 728.55 K (2801) Comment (0) Favorites

      Abstract:Timeliness of completion of tasks for the modern enterprise is very important, and many of the practical application of workflows, including the application of a wide range of domestic and international open-source workflow, exist the problems of unequal distribution of tasks and tasks easy overtime. Paper presents a time-control model can be used in workflow engine. Through the task time measurement platform to measure the task time-consuming, and as a means of appropriate task distribution to avoid task timeouts. After the practical application of the model, the overtime rate decreased significantly, indicating that the model is not only effective, but also provides a reference for architecture design and practical application of enterprise-class workflow engine model.

    • Optimization of Logistics Center Location Using PBIL Algorithm

      2010, 19(11):242-245. CSTR:

      Abstract (1759) HTML (0) PDF 689.62 K (3040) Comment (0) Favorites

      Abstract:Rational distribution of a logistics center has decisive impact on the effectiveness of the entire logistics system. Through research on the characteristics and requirements of logistics center location, we constructed a mathematical model with capital cost and operating costs for the goal of optimal location problem, and designed the optimization algorithm of logistics center location based on the PBIL. We also make the implementation and testing of the algorithm. Tests show that the algorithm has fast speed, good stability, a good adaptability of increasing or decreasing of the constraints. Finally, we have put forward a dynamic change method of revising parameters of the learning probability in this algorithm, the test shows that through this method can effectively improve the convergence speed and optimization capabilities.

    • Design of Image Format Conversion Based on FPGA

      2010, 19(11):246-248. CSTR:

      Abstract (1927) HTML (0) PDF 715.40 K (4709) Comment (0) Favorites

      Abstract:During the procedure of real–time image processing, FPGA was often utilized to convert the format of collected digital image. This paper looks at how to process the conversion of 3 types format image, which comes from Micron MT9V112 CMOS DIGITAL IMAGE SENSOR. The study first introduces YCbCr4:2:2 to YCbCr4:4:4, RGB565 to RGB888, Bayer data to RGB888 and image denoising methods. It then gives the design module based on Verilog HDL and simulation via MATLAB. The simulation result demonstrates that this module can successfully process 640x480 pixels with desirable real-time results.

    • Data Lumber Mill Based on Duckling Application Integration Framework

      2010, 19(11):249-252. CSTR:

      Abstract (1781) HTML (0) PDF 571.30 K (3410) Comment (0) Favorites

      Abstract:Integration and visualization for heterogeneous scientific data is a hot topic in e-Science applications. This paper presents generic information integration and sharing tool based on virtual research environment workbench (duckling) application integration framework. The tool uses portlet technology, is a web application, proving generic data collection, data process, data visualization and data download function, solves the data collection, process and sharing problem in s-science applications. This tool has been realized and used in the atmosphere, meteorological and biological- related projects.

    • Design of Blackfin DSP Embedded Image Data Capture Mechanism

      2010, 19(11):253-256. CSTR:

      Abstract (1558) HTML (0) PDF 415.81 K (3432) Comment (0) Favorites

      Abstract:About the hardware resources of media signal processor, this paper especially analyze the collision′problems on the data bus of SDRAM,and put forward solutions about it .meanwhile it also make use of functions encapsulated in function storeroom of Blackfin DSP to realize the register configuration of CMOS image sensor and ADSP—BF533. the experimental results show that the program is more stabilization, the power consumption of DSP is lower ,and more saving transimission bandwidth of SDRAM. It satisfy the requriments of real—time image collection and coding system.

    • Visualization of Well Track of Using Open Inventor

      2010, 19(11):257-259. CSTR:

      Abstract (2015) HTML (0) PDF 449.46 K (4221) Comment (0) Favorites

      Abstract:In the process of drilling, the visualization of well track is convenient to observe, and then be helpful to design and control well tracks, also, it’s good to develop program and oil-field development. In this paper, Visual C++2005 and Open Inventor development kit were combined, and on the bases of read surveying datum, minimum curvature method was adopted to implement the visualization of well track. Axis and flats are supplementary measures to offer convenient examination and using. Open Inventor is a development kit which is based on OpenGL, and has powerful functions in 3D graphic processing and interaction. Therefore, Open Inventor will be full used in the future of the visualization of drilling engineering.

    • Visualization for Nodal Voltage of Distribution Power Network Based on SVG and Surfer

      2010, 19(11):260-264. CSTR:

      Abstract (1854) HTML (0) PDF 534.05 K (3889) Comment (0) Favorites

      Abstract:As a unified graphics standard of power systems in the future, SVG( Scalable Vector Graphics) is widely used in Web. This paper integrates SVG and Surfer technologies and uses SVG as the basis of power system visualization to implement the visualization for nodal voltage of power systems in the platform of VB. Practical application shows that in the distribution power network monitoring systems using this technology to draw a large number of contour lines is convenient, fast and accurate. It has a good application prospects.

    • >Survey
    • Schema Matching Research Progress: A Brief Survey

      2010, 19(11):265-277. CSTR:

      Abstract (2108) HTML (0) PDF 448.42 K (7657) Comment (0) Favorites

      Abstract:With the development of networks and information technology, cooperation among various applications is becoming more prevalant, and data interoperability is becoming increasingly important. Due to the autonomy and heterogeneity of data sources, the goal to achieve data sharing and schema matching has become a fundamental task of data-intensive distributed applications, a hot research issue in recent years. This paper surveys the status quo of schema matching, the basic technologies and classifications of schema matching, analysis and comparisons of some typical schema matching systems, and issues that still need to be addressed.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063