DENG Zi-Yun , HUANG You-Sen , YANG Xiao-Feng , CHEN Yu-Lin , LUO Tao
2010, 19(3):1-6.
Abstract:In this paper, the SOA-BPM combined architecture is outlined. Phased implementation of a research project for development of SOA-BPM based integration platform for information system of Third Party Logistics companies is introduced. In the research, OSWorkflow and Tuscany are adopted as basic middleware software for development of workflow scheduling, process monitoring, and service components. Further research is also addressed.
LIU Wen-Tao , CHEN Zhi-Hong , XU Yan , LI Xing-Yi
2010, 19(3):7-11.
Abstract:This paper develops a traffic heterogeneous data integration system based on ontology. Its key technology is ontology construction. This system is able to provide the semantic explanation of systematic data by means of mapping from global ontology to partial ontology, so that heterogeneous database is transparent for the application layer. The proposed method reduces developing difficulty, improves developing efficiency, and enhances the maintainability and expandability of the system.
HAN Fang , QIN Lian , MA Xin-Yue , DANG De-Peng , LIU Ji-Fu , CHEN Jin
2010, 19(3):12-16.
Abstract:Based on characteristics of the description language in the emergency plan, this paper designs an emergency response plan complexity evaluation system with the evaluation methodology for the plan’s maneuver- ability. By using the B/S construction and with PHP, APACHE and MySQL, the complexity evaluation system has been realized through working on system requirements analysis and on its conceptual, logical and physical design. The system provides a human-computer interaction interface where quick searching, viewing, judging, adding, amending and deleteing can be done. It supports the experts to improve the emergency plan by decomposing the plan’s mission, analyzing the basic sub-task’s complexity and achieving the quantification of the plan’s complexity.
2010, 19(3):17-20.
Abstract:Access control is the mechanism to protect the operating system. At present, most systems lack proper access control mechanism. The implementation of access control mechanisms of the existing security system depends on the specific operating system platform, thus lacking portability. This paper sums up the differences between different platforms and the implementation methods of a variety of secureity systems. It abstracts the platform-dependence of access control mechanism, and designs a platform-independent and flexible access control framework PIFAC. This PIFAC has been implemented in Windows, Linux and Rtems.
LIU Sheng-Tian , LU Shou-Dong , LIU Zhong-Qiang
2010, 19(3):21-24.
Abstract:This paper designs a personalized information search system(named PISS) applied to online shopping. According to users’ searching issue and information database, PISS provides some initial interest merchandise. After analyzing the performance of the merchandise, the system records the result and returns it to the database. PISS can be used in finding consumers’ needs and mining the data of connotative expression. The innovation of this paper is providing solution to related actions of users and designing the interesting model.
XIAO Rong , ZHANG Yun-Hua , ZHANG Yi-Ling
2010, 19(3):25-29.
Abstract:To gurantee the safety of mobile payment, this paper conducts a study on the security of the mobile e-commerce payment system based on WAP. It introduces the concept of information hiding and digital watermarking, and puts forward an anti-GSM voice compression coding algorithm based on ERA(Energy Ratio Adjustment). Moreover, the audio digital watermark is added to the system which has greatly strengthened the security of the WAP- based mobile e-commerce payment system.
ZHOU Tian-Gui , CHENG Hai-Peng , HUA Bei
2010, 19(3):30-34.
Abstract:Dynamic packet classification is the basis of emerging network services, but the update performance of existing packet classification algorithms is unsatisfactory. Based on the Recursive Space Decomposition and Interpreter approach, this paper designs and implements a two-stage multi-dimensional algorithm TICS with fast incremental update support. It allows incremental update of rule set by reconstructing and replacing the local data structure, and allows parallel synchronous execution of search and update through appropriate memory management. The experimental results show that TICS is at least an order of magnitude faster than the current fastest algorithm BRPS, with less memory consumption and good parallel scalability.
LI Yuan-Wang , HUANG Wen-Ming , WEN Pei-Zhi , WU Xiao-Jun
2010, 19(3):35-38.
Abstract:Point clouds denoising is one of surface reconstruction’s key technologies. This paper makes full use of space unorganized points’ inner information, to re-interpret over-domain average method of image denois- ing theory, so that the theory of two-dimensional space can be applied to three-dimensional space’s point data. And based on the space analytic geometry theory, it creates a method of three-dimensional space’s unorganized point clouds denoising. The experimental results show that this method better retains detail fea- tures of the unorganized points of 3D shape and noise is obviously suppressed after point clouds denoising.
LI Xing , LI Xi , GAO Yan-Yan
2010, 19(3):39-44.
Abstract:With the development of access control technology as well as the diversity of security requirements, the combination of access control model in application is increasingly becoming an important security goal in the design of operating system, which gives new requirements for the unification and case application of the policy description language. Based on the research of the existing security policy language and access control model, this paper presents an access control policy language EGACPL. With the application of structuralized and object-oriented design, EGACPL is easy for developers to understand and use. It unifies the description of policy elements and security rules to support a wide range of access control model, which shows better generality.
WU Xiao-Cui , GUO Si-Yu , YI Guo
2010, 19(3):45-48.
Abstract:Commonly used evaluation functions are introduced, and an evaluation function based on boundary gra- dients is proposed to overcome the shortcomings of the existing evaluation functions. The evaluation value is computed by using the edge strengths of boundary pixels after the binary boundary is obtained by edge detection procedures. Since the computation of the new function takes more time, a coarse-to-fine focusing procedure is proposed to improve the overall running speed performance. Experimental results on real images show the effectiveness of the novel method. Compared with the existing evaluation functions, the new function can achieve higher accuracy with an acceptable execution speed.
LIU Shu-Mei , XIA Liang , XU Nan-Shan
2010, 19(3):49-52.
Abstract:According to the characteristics of the cyber page structure, this paper proposes the theme which predicts the correlativity by delivering the theme among the pages, and solves the problems of channel jamming and capture omission. Firstly, a correlative information value is delivered according to the anchor text. If the information given by the anchor text is correlated, the correlative threshold will be delivered directly. Otherwise, it will be multiplied by the genetic ratio before delivery. In the process of the delivery, correlative information value may be reset to the initial value if it encounters the correlative Web page. At last, the recall ratio is proven to be greatly improved based on the experimental result.
2010, 19(3):53-55.
Abstract:ECMLR is a sincryption scheme with message recovery and message linkage recovery based on the elliptic curve crypto system. The message’s block is constructed in recursive mode, taking the present parameter as the input of the next parameter. By doing this, the whole message can be recovered recursively one by one. And the communicate traffic is reduced significantly. But in the research, it is found that this scheme’s security is based on the different message key. So an improvement is given with proof.
2010, 19(3):56-58.
Abstract:With regard to the problem of DV-Distance in localizing, this paper puts forward an improved localization algorithm with more precision. DV-Distance deduces the coordinate of unknown nodes by estimating the sum of the hop distance between unknown nodes and reference nodes. Based on DV-Distance, this improved localization algorithm makes ratio of the real distance between reference nodes to the distance of sum of hops between those reference nodes as a weight, with which the precision of estimated distance for localizing is improved. And with the technique of RSSI to limit nodes to be a valid node, the precision of localizing can be improved with this improved localization algorithm. Simulation demonstrates that the improved algorithm obviously reduces the error and is more precise than traditional DV-Distance localiza- tion algorithms.
2010, 19(3):59-62.
Abstract:With the prediction of the rules of node reliability and residual energy, this paper presents a PRAS (Predicted Routing Algorithm with Stability) based on weighted Markov Chain. PRAS makes schemes for the routing of network QoS via researches on single optimal index and comprehensive optimal evaluation of nodes. Simulation results show that the route realized by PRAS routing is obviously better than usual probability in terms of the delivery ratio from average end-to-end delay.
2010, 19(3):63-66.
Abstract:Due to the anonymous participation and voluntary resource contributions in P2P system, the majority of peers lack eagemess to contribute resources or provide service to communities, which leads to the prevalence of “free riding”. Based on the analysis of “free riding”, according to Laffer Curve and U.S. Personal Income Tax, this paper gives a new incentive mechamsm “PIIM” from the personal income tax idea. Based on the idea that “Tax the rich more than the poor”, a second distribution of income is achieved, to be fair in P2P system. The use of campus network based on the experiments show that the incentive mechanism promotes social equality, and the goal that the node can participate in resources sharing is fulfilled.
CHEN Shao-Wei , CHEN Rui , LING Li
2010, 19(3):67-70.
Abstract:Although RFID technology has been increasingly popular and commonly used, there are still a host of defects in security and privacy. This paper proposes a new improved authentication protocol based on the existing protocols and Hash algorithm, and to some extent, it solves the security and privacy problems. This protocal can prevent replay attack, statistical analysis, spoofing attack, privacy track, and is suitable for the distributed system.
LI Hai-Wei , CHEN Shu-Yu , PU Chang-Qing , TANG Yu
2010, 19(3):71-75.
Abstract:This paper proposes a route algorithm that uses the time cost from the source node to the sink node as the key factor to construct the optimal route in the network with a topology of cluster tree. The sequence diagram of the algorithm has been showed to illustrate the process of the protocol in the paper. Also, the protocol has been coded through nesC on the TinyOS2.x platform. The simulation results demonstrate that the new protocol has some improvement on transmitting delay of data packets compared to the traditional one of the TinyOS.
JI Ying-Hui , CAI Wei , CAI Hui-Zhi
2010, 19(3):76-79.
Abstract:To gain high signal processing capability in radar and sonar fields, this paper proposes and realizes com- munication interface among parallel signal processing machines with TIPC. It lists the main features of TIPC compared with other communication protocols. It also analyzes the basic principles of TIPC and its implementation in details. At the same time, it compares the communication performance between TIPC and TCP. At last, it puts forward a new method to enhance communication reliability among parallel signal processing machines based on TIPC.
YUAN Hui-Yong , YI Ye-Qing , HU Chu-Ran
2010, 19(3):80-82.
Abstract:The lifetime of a wireless sensor network (WSN) directly lies in the power consumption of the network. Thus one of the important problems is how to deploy the sensor nodes efficiently to prolong the lifetime of the sensor network. A maximizing lifetime model is proposed by analyzing a line heterogeneous wireless sensor networks which consist of two types of nodes: one is advanced nodes, the other is normal nodes. Based on the theory analysis of the two types of sensor’s energy consumption, the allocation proportion between different nodes is calculated, and a maximizing lifetime scheme of node deployment is proposed.
2010, 19(3):83-86.
Abstract:With the difficulty of network traffic monitoring, this paper builds an MRTG traffic monitoring system. The long-distance network traffic flow monitoring parameters are set up according to Web services to enable them to monitor multiple devices in the cluster. Reliable data for graphical network traffic and equipment performance are released through Apache. MRTG’s defects in practical applications are studied. Reasonable and feasible improvement on the strategy is made, so that network managers can remotely monitor network traffic load and its performance. In this way, can they determine the possible causes of problems in network or equipment, so as to find the problem out and address them in a short time.
HUANG Cheng-Wei , JIA Yu-Bo , CAI Hao
2010, 19(3):87-90.
Abstract:Communication is one of the biggest obstacles for the application of mobile agent system. After analyzing the communication problems, this paper presents an improved communication model for mobile agent. It is performed based on the framework concerning three major areas: the naming and locating scheme of mobile agent, the security of mobile agent communication and the communication failure of mobile agent. The proposed model solves communication problems in some degree, and improves the safety of mobile agent. At last, future work is discussed.
2010, 19(3):91-94.
Abstract:Currently, most of the handover decisions are made based on the information of IP layer and link layer. However, they do not consider network costs and the type of services, especially the users’ preferences. This paper proposes a handover decision algorithm considering users’ preferences(FHMIPv6 with user Preferences, P-FHMIPv6). The handover decision is made by the module located between IP layer and link layer. Multicast and caching mechanisms are applied to meet the requirements of the handover decision in complex networks. The handover Timing algorithm is also applied to improve the handover performance.
ZHANG Zhen-Sheng , ZHU Ming-Ri , PAN Ze-Kai
2010, 19(3):95-99.
Abstract:Based on the characteristics of sucrose-crystallizing images in the sugar-boiling process, this paper uses a method called color space conversion which changes the images from RGB color space into HIS color space,and makes use of the relative independence of every component in the HIS color space and the color difference between crystal particles and syrup solution to segment the H component with the improved Otsu’s thresholding method. Many ways are used in the subsequent processing, such as mathematical morphology opening operation, median filter, holes filled, noise removing process of particles in the subsequent processing. Finally, the identification of sucrose-crystallizing particles in the process of boiling sugar is made by analysing the feature value such as the number, size, perimeter, shape index and the area ratio of the crystalline particles extracted from the processed images. Experiments show that this method is effective and practical.
WANG Hai-Ping , GE Jun , WANG Juan
2010, 19(3):100-102.
Abstract:This article aims to study business process modeling in petroleum industry by analyzing the business processes classification and description methods of POSC data model standards, with the characteristics of the domestic oil businessing in consideration.
2010, 19(3):103-106.
Abstract:Stream data query is widely used, but the standard SQL language doesn’t support it. It is hence necessary to expand the SQL in semantics. A processing mechanism of stream data object is added to the query language for stream data(StreamSQL). StreamSQL supports transformation between stream data and relations by introducing the concept of sliding windows. In addition, it offers the user-defined function to make up for the disadvantage of the standard SQL in stream data processing.
SUO Hong-Guang , SUN Shan-Shan , WANG Yu-Wei , LIANG Yu-Huan
2010, 19(3):107-110.
Abstract:To solve the problem of mixed subjects returned by search engine results, a new subject phrases clustering algorithm is presented to help locate the valuable results that the users really need. The algorithm firstly extractes some subject phrases from the search results. Then, the vector space model is built. Finally, the results are clustered by the improved k-means algorithm. The algorithm was tested and validated by the experiments.
CHEN Nai-Jin , ZHOU Ming-Zheng , PAN Dong-Dong
2010, 19(3):111-114.
Abstract:This paper describes the principle of several common image smoothing methods and introduces its shortcomings, and then proposes the new Wiener filtering method of image smoothing. Experimental results show that this method can make up for the defects that the commonly used smoothing filter has in smoothing images polluted by gaussian noise and has obtained good results.
2010, 19(3):115-118.
Abstract:Software defects measurement is an important method to improve software quality and evaluate software process. This paper introduces technology of software measurement into software defects management, according to CMMI measurement and analysis framework. Combined with GQIM, it present a CMMI- based software defects measurement model. This model can direct Software Corporations to measure software defects to improve their production.
2010, 19(3):119-122.
Abstract:Through the SMS module control of TIs MC35, the wireless remote monitoring system of the open-pit coal mine slope receives and sends text messages in the VC + +6.0 environment. This system gives the slope monitoring communication protocol, then accurat ely locates the data of the slope load, and achieves the graphical display of the remote dat a and the early warning function.
2010, 19(3):123-127.
Abstract:Large tonnage machinery has the characteristics of being bulky, expensive and complicated to operate, with the bad production environment where it is inconvenient to study and operate such equipment. In view of this situation, this paper develops a computer simulation technology as the core of the 3D simulation training system in large tonnage machinery. It can be applied to large tonnage machinery operator training. The key issues are introduced. The 3D simulation training system in forging machines developed with Java 3D technology is illustrated as an example. In the applications, the 3D simulation training system of large tonnage machinery is safe, practical and economical
LUO Yi-Feng , DAI Yu-Xing , LI Peng , WANG Wei-Guo
2010, 19(3):128-132.
Abstract:The design of Communication Module for intelligent circuit breaker based on the Modbus protocol is introduced according to the technical demands of intelligent low voltage circuit breaker with communication capability. The form of networking and mechanisms of Modbus communication,as well as Modbus protocol stack software implementation are expounded. The power circuit and RS485 interface circuit are also presented. The module is effective to achieve the centralized monitoring and long-distance communications.
LI Jian-Jun , YU Xian-Yong , LIU Peng , JIANG Xue-Feng
2010, 19(3):133-136.
Abstract:The reorganization and annexation of large ent erprises need to merge private networks into a unified network. This paper explains how to use the Stateful Nat and multiple OSPF processes to solve the problems of the NAT synchronization and the distribution of the private IP address between privat e networks, in order to make border routers working in hot standby and load balancing state to promote the reliability and security of the network.
TAN Fei , LU Xiang , TU Shi-Liang
2010, 19(3):137-141.
Abstract:How to set up a low-cost, high-accuracy real-time location system based on wireless sensor network is one of the popular research topics. This paper, according to our analysis on various sets of experimental data, suggests that current wireless chips are not suitable for location fingerprinting based on RSS. In addition, a new location fingerprint system based on TOA is proposed. It regards distances from TOA as reference signals and makes use of wireless signal’s continuity to improve the location accuracy. The experimental data show that this system achieves considerable accuracy in complicated environments.
TU Ji-Yue , ZHOU De-Jian , LIU Dian-Ting
2010, 19(3):142-145.
Abstract:This paper proposes a component retrieval algorithm based on facted tree retrieval rules with design pattern. The algorithm first creates faceted tree through extracting the nature of components based on facet classification pattern. Then, according to users’ chosen facets and terms, it formulates the rules to define faceted tree retrieval components. Based on the combination of the rule with iterator and that of these two design patterns, it gives a component retrieval algorithm for component libraries of reconfigurable MES. Finally, the algorithm is realized with coding by Java and tested with instances. The testing results show that under the same conditions, this algorithm uses less retrieval time. With this algorithm, needed components can be rapidly retrieved from reconfigurable MES component libraries.
KANG Song-Lin , SUN Yong-Xin , HU Ci-Yuan
2010, 19(3):146-149.
Abstract:Currently, there is not a unified security strategy in military networks’ security system. So, the security of important information in military networks is not yet guaranteed. In this paper, a defense system is put forward, which is an advanced P2DR model with honeypot technology. By optimizing honeypot deployments and redirecting the intrusive actions, this system has effectively improved the pre-detection ability on network intrusion, and the P2DR performance. It is also used in elementary applications of the military networks, which has boosted the defense capability of military networks.
2010, 19(3):150-153.
Abstract:It’s a starting point of career for the students who have passed the college entrance examination to choose a major. Major Selection System can check the real personality trait and then help select the matching major based on the data obtained. This study improves data mining algorithms by putting the plane vector reference system into it and digs out the implied relevance in the sample set to build the measure system. In this way, the inaccuracy of previous expert systems can almost be avoided so that the major can match the students more objectively. Experiments show that the precision and efficiency of the algorithms are almost satisfactory.
2010, 19(3):154-157.
Abstract:To improve the data concurrency control ability in B/S architecture and make the system hierarchical architecture clearer, this paper presents a thorough study of hibernate data persistence technology after comparing and analyzing several popular solutions to data persistence. It applies this technology to a Web system to resolve the persistence based on Hibernate technology. With the technology, the system performance has been improved and the expected results are achieved.
CHEN Yao-Fei , CHEN Huan-Tong , NI Ying-Hua
2010, 19(3):158-161.
Abstract:In light of lacking SQL Server skills assessment system, this paper analyzes the existing formal logic automatical marking technology and proposes a model about skills assessment of SQL Server based on XML. It introduces the principle of automatic marking and its procedures. It focuses on two key techniques: XML Formal Expression and XML technology automatical marking. Practice shows that the automatic marking of SQL Server database skills based on XML is practicable.
2010, 19(3):162-165.
Abstract:The minimal risk of lacking load due to the transmission maintenance within the whole layout period is taken as the goal in searching for the best maintenance scheduling. Meanwhile, all lines’ maintenance startup time is limited to the range of its maintenance startup-time-choice during the search. A model based on ant colony algorithm for transmission lines maintenance scheduling is presented. Analysis of an example is given to prove the effectiveness and practicality of this model.
2010, 19(3):166-170.
Abstract:Junk SMS problem is getting worse. To identify Chinese junk SMS, an artificial immune system is introduced to areas of the Chinese junk messages recognition. In light of Chinese SMS characteristics, this paper proposes the artificial immune algorithm, which is verified in experiments. The experimental results show that the Chinese junk SMS method based on artificial immune recognition has a lower false negative rate and false positive rate.
2010, 19(3):171-174.
Abstract:In this paper, fuzzy C-means categorization optimized by Subtractive clustering is applied to text clustering. First of all, the paper chooses a suitable text collection and deals with word segmentation of the text. Then, it extracts the internal idiocratic words of the documents, and uses word frequency statistics for the text dimensionality reduction processing, to choose the best eigenvector. Finally, after quantifying the text of the non-numerical data, it clusters the collections of text with fuzzy C-means algorithm which is optimized by Subtractive clustering, so as to enhance the effectiveness of text clustering.
2010, 19(3):175-178.
Abstract:This paper applies the UDT to microseism data transmission system to make a real-time and reliable data transmission. By evaluating UDT’s performance in both simulation environments and real networks, it has examined UDT’s performance including reliability, real-time, throughput as well as the implementation efficiency.
CHEN Qin , FANG Hai-Ying , CHU Yi-Ping , HUANG Jian-Jun
2010, 19(3):179-182.
Abstract:This paper makes use of the leak in Word encryption mechanism to decrypt word document in constant time, which has nothing to do with the key length. At the same time, an approach based on MapReduce paradigm is presented to to achieve Word document decryption, which simplifies the design of distributed application. The experimental result proves the validity of the proposed approach and the low consumption among distributed computing nodes.
2010, 19(3):183-186.
Abstract:This paper first analyzes the current load balancing technologies and dispatch algorithm, and then presents a new dynamic load balancing algorithm based on real-time performance dynamic feedback. In this algorithm, a method of measuring the request, a real-time performance index and the admission control mechanism are utilized. The experimental result indicates the this algorithm has preferable performance in low response delay and high output rate.
2010, 19(3):187-189.
Abstract:From the discussion of how to operate Excel in asp.net programming, two feasible methods are found and applied in a specific project. The implementation of exporting Excel documents from the database and importing Excel documents to the database is relized, which solves a practical problem in asp.net programming.
2010, 19(3):190-193.
Abstract:FLV (flash video) is now the most popular video file formats on Web, which has many advantages. This paper explains the specific meaning of each field of the flv video file in detail. It proposes an implementa- tion plan of an embedded flv player for the open source ffmpeg project. It focuses on the key modules of embedded flv player.
YANG Shun , ZHAN Yi , TAO Kang
2010, 19(3):194-196.
Abstract:Radio frequency identification technology (RFID) is a non-contact automatic identification technology. The existing RFID technology is reviewed and its problem is addressed. An air interface communications security authentication algorithm is put forward, which solves the problem of updated key with changing ID.
HUANG Han-Hui , CHEN Shu-Yu , SHI Jing-Xiang
2010, 19(3):197-201.
Abstract:The principle of DoS is to attack servers to degrade their capability with a lot of data packets. SYN Flood attack is an important way of DoS attack, which uses leaks to attack servers during TCP’s three-way handshake. The paper introduces the attack principle of SYN Flood and the implementation of SYN Cookie based on Linux 2.6 kernel. Finally, it proposes an improved method.
2010, 19(3):202-205.
Abstract:SWF is a format of network interactive vector graphics animation. Starting with analysis of the structure of SWF file, this paper designs analytical framework. The analytical process is in two important areas: file head Analysis and Tag Analysis. On the basis of the analytical procedures, it designs procedures to obtain SWF environmental information, element information and control information.
2010, 19(3):206-209.
Abstract:This paper proposes a new method to transmit complex formatting data for Client/Server mode based on XML. Complex formatting data are transformed into text data by applying characteristics of XML according to this approach. These text data can be reorganized and represented to fulfill the requirements of data processing. The online documents generation system with this approach has been implemented. The idea and critical parts of this approach are addressed.
2010, 19(3):210-212.
Abstract:In light of the problem of heterogeneous grid middleware interoperability in Shanghai Supercomputer Center, this paper designs and realizes batch grid operations services and grid middleware interoperation based on the HPC Profile standard. Then, it upgrades the scalability and interoperability of the grid middleware.
2010, 19(3):213-216.
Abstract:With a wide use of item bank system and the increment of items in item bank system, how to avoid duplicate items becomes an important research topic. This paper first gets text with vectors with TF-IDF formula through the algorithm based on vector space mode(VSM) theory. Then, it gets the similarity of items by using cosine theory, which is used for the comparison with the threshold value initialized to get similarity checking resulting. Based on the existing item bank system, the experiment with this algorithm shows that the exact rate of 94% is gained, which is a good result compared with expert checking.
2010, 19(3):217-220.
Abstract:The management problem of a large scale Oracle database in enterprises is put forward first. Then, the management architecture and database management function of Oracle 10g Enterprise Manager Grid Control tools are introduced. Finally, how to implement and deploy Grid Control tools is discussed and how to use the Grid Control tools to manage Oracle database is expounded.
2010, 19(3):221-225.
Abstract:Based on an introduction to the functions and working theory of the ARP (Address Resolution Protocol), this paper analyses the security holes in ARP. The security vulnerability of ARP, the attacking forms and potential damages are extensively discussed. Several protection solutions for daily managements and detection are given, advantages and disadvantage of these measures are detailed.
2010, 19(3):226-228.
Abstract:An increase of dada makes data analysis difficult and the systems improvement in performance is hence limited. This paper puts forward an improved data compression algorithm on the basis of researching former algorithms. This algorithm can efficiently compress data, reduce the workload of the system and improve its performance especially in dealing with mass data and real-time applications.
ZHANG Yun , HUI Xiao-Wei , XIAO Ying-Jie
2010, 19(3):229-232.
Abstract:This paper firstly introduces the principle of the FAT file system. Then, it designs an embedded file system applied to TF card based on LPC2468 and μC/OS-II Embedded Operating System, for the data storage of SPRD(Spectroscopic Personal Radiation Detector).
TONG Li-Wen , YANG Liang-Huai , GONG Wei-Hua , GU Hui
2010, 19(3):233-239.
Abstract:With the rapid development of Internet, XML is the de facto standard for exchanging and presenting data on the Web. The redundancy of XML data affects XML data transmission, query and other aspects. Data compression is a way to resolve the problem. This paper compares various XML data compression tech- niques, whose cons and pros are compared and analyzed in terms of compression ratio, compression times, and query performance and so on. The survey is concluded by pointing out the future work to be done.