2010, 19(5):1-4.
Abstract:To slove the problems of the unclear demand and uncertain process, and to meet the system's requirement in agility and scalability, a logistics information system based on business process management(BPM) was designed for National Digital Film Production Base of CFG. With the principle of the service-oriented architecture(SOA), the framework makes the information exchange between subsystems. In implementa- tion and testing, when the customer has urgent or special demand, the system can modify business processes quickly and integrate the resources available in the storage rapidly to guarantee the accomplishment of shooting, which fully demonstrates the logistics information system's feasibility and superiority in development, integration and application.
LIU Jing , WANG Ling , KUANG You-Yu
2010, 19(5):5-8.
Abstract:Due to the large quantity of image data, the complexity of algorithm for moving objects detection and the real-time requirement in practical applications, a real-time moving objects detection system is designed which is constructed with the DSP chipset TMSC320DM642 as the core. An algorithm for moving objects detection based on Gaussian Mixture Model and Three-Frame Differencing is proposed to detect the moving objects. The experimental results indicate that the system can effectively detect moving objects and meet the real-time requirements.
LIAO Ling-Song , ZHANG Rui-Xin , LI Ai-Ping , YAN Rui-Luan
2010, 19(5):9-13.
Abstract:This paper studies infrastructure and its application mode of geographical information system according to the trend of information technology development. It puts forward the concept of service container of geographic information based on GIS services and service process management. A framework of service process management with 'hot swap' capabilities is designed that encapsulates the technical details of geo- graphic information services with service control. The system will help business personnel to customize business processes, add business application and access dynamically different terminals of business appli- cation, which can meet the requirements of the emergency response timely.
GONG Xue-Sheng , MA Hong-Lian , DING Nan
2010, 19(5):14-18.
Abstract:This paper proposes and implements a solution of software structure in mobile communication based on wait-stop protocol and plugin management. In Window Mobile environment, the solution takes advantage of object-orientation, callback function and multi-thread technologies. It implements and packs network communication interface based on wait-stop protocol. In addition, by proposing plugin manager for new business' extension, this paper proposes a more complete basic software structure, especially by adding new business to the structure. Experiments show that the solution is effective in instant messenger and streaming business.
JIN Di , XUE Zhong-Zhou , YANG Jun
2010, 19(5):19-23.
Abstract:To meet the requirement of good performance of parallel computing in the field of energy application of seismic data processing, this paper expounds the design and implementation of cluster system. For the key subsystems tending to produce performance bottleneck like network communicaton subsystem, storage subsystem and global share file system subsystem, the article proposes designing and implementation technology in detail. The cluster system management and parallel computing application of seismic data processing deploying are introduced. Finally, testing in linkpack benchmark and seismic data processing application prove the system's advantages in parallel computing performance.
2010, 19(5):24-27.
Abstract:This paper analyzes the major problems of many enterprises' information systems and introduces the basic principle, the hierarchical model and implementation technology based on SOA. It proposes a higher information system based on SOA which focuses on the system information model, architecture, imple- mentations based on service-oriented architecture. In the end, it gives an example of information system application and performance. Practice shows that the architecture has good performance in college application information system.
CHAGN Jie , XU Tian-Ping , ZHAO Zhi-Kun , XU Ru-Zhi
2010, 19(5):28-31.
Abstract:To solve the problems in the field of component repository, an agent-based peer-to-peer style distributed component repository is proposed in this paper, which benefits from the analysis of software reuse and the component repository. The infrastructure of the agent-based peer-to-peer style distributed component repository is presented and a prototype system is implemented based on this architecture. This component repository can achieve the goal of information share of software component resources and verify the feasibility of the method.
SUN Yi , LIU Jing-Biao , ZHOU Qiao-Di
2010, 19(5):32-35.
Abstract:To make a quick and effective organic phosphorus pesticide detection in the agricultural production, a detection system for Organophosphorus Pesticides based on USB is designed in the paper. Firstly, the theory of organic phosphorus pesticide detection system is briefly introduced. Then ARM microcontroller is used to finish the data acquisition, and it communicates with the computer by USB to comply real-time transmission of data between the master computer and the slaver computer. And finally the function of the detection system for Organophosphorus Pesticides is realized.
2010, 19(5):36-40.
Abstract:Flash memory is an increasingly common storage medium in embedded devices. It provides solid state storage with high density at a relatively low cost. The usage of flash memory needs many techniques to provide reliability of data and to prolong the lifetime of flash devices. Based on the characteristics of flash memory, a file system model is put forward. This model can take advantage of flash memory reasonably and efficiently. It can also provide journalling features to enhance the reliability of embedded systems who use the file system.
2010, 19(5):41-45.
Abstract:This article utilizes G++ (GCC) feature, extracts its front-end language analysis part, researches its front-end preliminarily, and restructs the independent application programme to analyze the input source code and produce the report. The purpose of code analysis is to supply the statistical information, the structure information, even the deeper level's pattern information of code for programmers, to help them understand and master the structure, the frame and the pattern of programme well, so as to provide reference of improving and restructuring code.
2010, 19(5):46-49.
Abstract:This paper mainly studies the basic model of fractal growing theory—DLA Diffusion Limited Aggregation Model. The method of computer simulation of DLA model is analyzed and realized. And the evolvement of the model is discussed. Multiple styles of aggression effect are figured out. Combing DLA model with the techniques and conclusions of simulating yarns and fabrics, this paper also uses double-side leaner DLA algorithm to generate the fluffy template. It makes texture synthesis with basic yarn image to simulate the fluffy effect. The algorithms studied in this paper are effective to reflect the fluffy characteristics of fancy yarns: irregularity, random diversity and local self-similarity.
HE Chuang-Yi , CHEN Le-Geng , WANG Zhi-Da
2010, 19(5):50-53.
Abstract:In this paper, a new algorithm is proposed for image scrambling based on magic cube and chaotic. The proposed algorithm based on the idea of circulate shift regards some consecutive pixels in a row or a column in the image matrix as a group of bianry and scrambles the image by shifting these groups of bianry. And the number of shifting is controlled by the chaotic sequence generated by Logistic-map. Simulation shows that the proposed algorithm has good scrambling performance and can resist all kinds of attacks effectively.
2010, 19(5):54-57.
Abstract:This document describes the customized design and software implementation method of the multimedia processing platform based on IP MultiMedia open system. It introduces the tasks undertaken with the customized design method, focusing on how to customize products as required. The method has features like excellent design, being easy-to-use, and high practicability. It also provides guidance to the product customization in other fields of the computer industry.
YANG Bo , ZHENG Fei , GUO Qi , KONG Bin
2010, 19(5):58-62.
Abstract:A fast FBP algorithm for special density detection is given in this article. At first, reconstruction of image with incomplete data is made. Second, image is clustered and partitioned based on the density known. Lastly, the interesting area can be reconstructed exactly. The results of experiment were compared with FBP algorithm and the algorithm using geometric parameter table at the end of article. The results indicate that the algorithm is not only faster than FBP but also has no effect on the interest area reconstruction.
LI Jie , NING Fan , ZHAO Guo-An
2010, 19(5):63-67.
Abstract:A large quantity of data need to be validated to ensure accuracy, consistency and authenticity in the field of information processing. This paper introduces a general method of bulk data validation and develops a tool application. This application is a client to the data source. It accesses the data sources through drivers provided by the individual data source vendor. So the application is independent of specific data source. The application reads and validates data. It retrieves data according to the rule defined by the method. Database schema information is shown in the form of tree, which contains the name of database, the name of table and the name of field. The application can validate data from Oracle, SQL Server, Excel and so on, and it can run cross-platform.
2010, 19(5):68-70.
Abstract:The modeling method in information systems development can be seen as the correlation analysis between the entities of a system function, whether it is E-R modeling in structured way, or UML modeling object-oriented method. The article analyzes the advantages and defects of traditional methods in the entity related information modeling, raises entities associated ideas and models of function-driven, and further discusses the feasibility of achieving the integration of a variety information modeling methods based on functional relevance driven.
CHEN Kui , WANG Yi-Gang , YAN Fu-Xin
2010, 19(5):71-76.
Abstract:In the material flowing production process of the continuous/discrete hybrid system, this paper implements three-dimensional simulation of a virtual workshop's materiel flowing production process by using the open-source software package of OSG(Open Scene Graph). To exploit a virtual simulation system with good performance, it has established a reasonable system of virtual objects, which works out the relationship of model object in the scene modeling with simulation object in the three-dimensional simulation making the whole operation process run with higher efficiency. The paper finally implements three-dimensional simulation of a new hybrid system by using the mechanism of simulation timer advancement and message- based event scheduling, which effectively combines discrete event with continuous system.
2010, 19(5):77-79.
Abstract:The sensor node deployment is either deterministic or self-organizing. This paper studies node deployment of heterogeneous wireless sensor networks, which consists of two types of nodes: one is advanced nodes, the other is normal nodes. It also analyzes the two types of sensor's energy consumption, and a maximizing lifetime model is proposed, which satisfies connectivity and coverage conditions. The proportion between two types nodes is calculated, and a new node deployment algorithm for heterogeneous wireless sensor networks is proposed.
HAO Can , ZHU Xin-Zhong , ZHAO Jian-Min , XU Hui-Ying
2010, 19(5):80-83.
Abstract:Based on the local binary patterns, a new improved method for extract local texture is introduced, namely local ternary patterns. This extraction method can be used to remove the shadow of movement. The background is modeled with adaptive gaussian mixture models, to get the background and foreground object. Then the intensity property is used to obtain the probable-shadow blocks. The shadow detected is improved based on the similarity of texture represented by LTP between shadow region and corresponding region in the background. Finally, the shadow can be removed accurately. The experimental results show that the algorithm can inhibit partition noise, and accurately remove the shadow of the movement.
2010, 19(5):84-88.
Abstract:In agile development, there are differences between the test of cluster platform supporting cluster storage and other tests. It needs to find some effective methods and strategies. This paper introduces the speculative knowledge of agile software test and the traditional incremental testing model. Based on the traditional model, the paper presents a new incremental model which adapts to the agile development of cluster platform, the construction of the test environment and the effective test methods.
FANG Bing-Wu , LIU Li , ZHANG Chen-Shu
2010, 19(5):89-93.
Abstract:Web Services Composition(WSC) is becoming an important approach to EAI and its reliability needs to be guaranteed by introducing the transaction mechanism. WSC transactions differ from traditional transactions in that they execute over long periods and cross multiple loosely-coupled organizations, so traditional transaction processing mechanism is inappropriate for them. This paper summarizes the characteristics of WSC transaction and presents its multilayer framework, and then analyses the coordination procedure of WSC transaction in the framework, and finally gives its coordination protocol and designs a prototype system for WSC transaction.
XUN Zhi , HUANG De-Cai , TAO Li-Min
2010, 19(5):94-99.
Abstract:To cope with the uncertainty of Grid environment, an ER (Evidential Reasoning) based Vague multi-QoS (Quality of Service) measuring approach is proposed. The approach utilizes Vague set to denote the QoS of users or and resources, and utilizes D-S theory based ER algorithm to integrate the layered multi-QoS into a single utility value. The calculation example proves the feasibility and validity of the approach. Further- more, the approach is applied to grid task scheduling, and a new grid task scheduling algorithm (VSFM- QoS-Guided-TS) is presented. Experimental results demonstrate that the algorithm does not only reserve the uncertainty of QoS but also reduces the scheduling makespan and improves the scheduling efficiency.
2010, 19(5):100-103.
Abstract:This paper makes a comparison between Clustering algorithms such as DBSCAN, CLIQUE, CLARANS, K-means and X-means. The X-means clustering algorithm is selected to establish a customer segmentation model for financial products marketing. Based on relational analysis of financial products, a financial products customer data mining application system is designed to support the cross-marketing of financial products. In the end, a use case is given to illustrate the application of the system.
2010, 19(5):104-108.
Abstract:This article first introduces the background and the basic concepts of link aggregation technology. It then describes the contents and principles of LACP. LACP state machine module controls the operation of the LACP. It is the core and key module to ensure LACP work effectively. Finally the LACP protocol state machine module function is implemented and optimized based on LACP and Finite state machine design method. In testing, the module operates normally. It can handle all circumstances correctly when the pro- tocol is running.
2010, 19(5):109-112.
Abstract:To improve the efficiency of network fault management system, an improved FNG state machine is introduced in original CFM technology. Special fault shielding mechanism with alarm mechanism of the priority level is added. The fault life duration and fault reproduction duration are set. The priority level is determined before printing alarm messages. In running, the user interface of the system could print alarm messages with 3 grades, and will not repeatedly print the same warning. Testing results show that the improved FNG state machine can reflect the high-level alarm and single display repetitive fault alarms. It won't show transient fault alarms, thereby reduces the labor mount of network administrator to locate fault, and improves work efficiency.
2010, 19(5):113-115.
Abstract:Traditional intrusion detection systems always have such problems as distortion and leakage. To solve these problems, this paper puts forward a new intrusion detection system which could combine misuse detection and anomaly detection. The system is based on neural network ensemble and it uses D-S evidence theory to combine the two intrusion detection technologies. The paper also expatiates on the main structure of the intrusion detection system and the composing module designation.
MA Chao , WEI Gang , PEI Song-Wen , WU Bai-Feng
2010, 19(5):116-120.
Abstract:Sparse Matrix-vector multiplication (SpMV) is one of the most frequently used kernels in engineering practice and scientific computing. With the growth of the scale matrix, a large number of calculations restrict the performance of system, so SpMV can be accelerated by utilizing the high computing power of GPU. In this paper, the problem of existing SpMV on GPU is analyzed. Besides, row partition optimization and float4 optimization are designed. Experimental results demonstrate that the proposed approach can enhance the performance by 2-8 times.
WANG Jing-Xin , LI Yan-Mei , XU Juan
2010, 19(5):121-124.
Abstract:After introducing the theory of Colored Petri Net and WL_net, this paper proposes a colored workflow logic net to achieve the modeling of workflow. In a case study about handling insurance, reachability graph is employed to analyze the feasibility of the process. By using CWL_net, a business process flow could be modeled in a definite way, and in this workflow model the logic of process could distinguish the task finished information produced in different transitions.
ZHANG Wen-Fen , WANG Gang , ZHU Zhao-Hui , XIAO Juan
2010, 19(5):125-128.
Abstract:This paper gives advice on population size selection from literatures and analyzes the relations between population size, dimension, precision and stability. It proposes a method of population size selection. Two benchmark functions are employed to perform function optimization with different dimensions: 20, 60, 100 and 200. For each dimension, population size is set to 20, 40, 60 and 80. This paper analyzes the results and proposes a general population size. Furthermore, an approach based on experiments is proposed for population size selection. With the approach, a relation graph of population size, time and precision can be used to determine the optimum population size.
ZHANG Shi-Heng , LUO Sheng-Xian
2010, 19(5):129-132.
Abstract:By studying the financial report system, an auto-test method of the financial report system is put forward and realized based on the "Rule Statements" in this paper. The auto-test platform supported by this method has been applied in some large financial institutions, and the application results are proved good.
2010, 19(5):133-136.
Abstract:To improve the management of water source in industrial cities, a design of data collection and communi- cation terminal of water meter applicated to AMR system is proposed, which uses a low power consume platform of Xmega256A3 and GPRS. The design of embedded platform with low power consumption and its software management are specifically introduced. Then, the test data are analyzed and the reliability of long running under the battery supply is estimated. It is proved in experiments that its power consumption and reliability have met the requirement in application and it has been applied to automatic management of water extensively.
MA Hong-Lian , QI Wei , DING Nan , LI Dong
2010, 19(5):137-140.
Abstract:Motion target detection and tracking has been widely applied in many fields. But due to the limitation of the embedded processor's speed, this application mostly concentrates on personal computers. This paper uses an improved texture-based algorithm for the background subtraction. The method is achieved with high-speed FPGA. After improving local binary pattern histogram-based algorithm, the algorithm becomes suitable for hardware implementation. In a hardware structure of the image block, the FPGA can process 12 image blocks simutaneously, which shows that the system's processing speed is greatly improved.
2010, 19(5):141-144.
Abstract:According to the test requirements of measuring the moment of inertia and based on graphical programming language LabVIEW8.2, a measurement system of moment of inertia is designed. The system transfers the collected data to PC through the LabVIEW serial communication programming. The data are transformed, curve fitted and calculated by the LabVIEW measurement system, which realizes the acquisition, exhibition and storage of data in real-time. With the method of LabVIEW, combined with MATLAB to fit curve, the processing program of curve fitting is simplified. The system meets the test requirements of measuring the moment of inertia.
WU Jia-Qi , HUI Xiao-Wei , YU Xi-Yang
2010, 19(5):145-147.
Abstract:A Sewage Discharge Monitoring Terminal is designed with wireless module SIM300, ultra-low power single-chip C8051F930 and low-power memory AT45DB081B-RI produced by SIMCOM. The hardware and software circuitry and program code flow chart are provided. The problem that the staff have difficulty in site monitering due to the bad geographical conditions of sewage discharge monitoring points is resolved,and the efficiency of environmental monitoring is improved. The terminal turns off the GPRS module power and is in low-power mode in the absence of data transmission. Practice has proved that the terminal has low cost and is stable and reliable. Its low-power work prolongs battery's lifetime signifi- cantly and it is pratical.
2010, 19(5):148-150.
Abstract:At present, the RS485 meter reading system, or the IC electricity selling system is mainly used in domestic meter reading systems. But, technical defects exist in both of the above systems. This paper presents the RFID meter system using CAN bus and ARM technology. This system cannot only avoid the shortcomings of the RS485 and the IC system, but also has the advantages of both. The user can either buy electricity directly or use rechargeable card to buy electricity. In the meantime, the management and electricity sectors can implement real-time monitoring and managing of the user's electricity utilization.
2010, 19(5):151-153.
Abstract:The general background and the basic principle of Radio Frequency Identification technology are introduced, according to which the nearest neighbor algorithm for indoor location system LARNDMARC based on RFID is proposed. Some factors influencing the positioning accuracy are taken into account. Moreover, an improved nearest neighbor algorithm is presented. It is proved that this improved algorithm achieves better positioning accuracy than the existing one through simulation.
2010, 19(5):154-159.
Abstract:Genetic algorithm(GA) is an algorithm used to find approximate solutions to difficult problems through the application of the principles of evolutionary biology to computer science. It can do a global search quickly. But premature phenomenon still exists in application. As a result, the searching converges earlier and the solution of the optimization cannot be got. Therefore, this paper analyzes the merits and demerits of the pseudo parallel genetic algorithm(PPGA) and discusses the optimum possibility by using PPGA, and at last, applies it to the optimization of maintenance planning for existing bridges. The experimental result has confirmed the validity of this method. Contrast to SGA, PPGA is quick in convergence. It provides a new method for existing bridges' maintenance plan.
2010, 19(5):160-162.
Abstract:Software quality is the integration of a set of software inherent characteristics to meet users' needs. An inverse process approach of quality function deployment to assess software quality is proposed based on users' needs. Customer satisfaction is measured according to the given quality characteristic. The process and mathematic model to measure software quality is shown. The empirical study indicates that the method is effective in assessing software quality. According to users' needs and the evaluating results, software quality and customers' satisfaction degree are continuously improved.
ZHOU Chen-Chen , HUANG Chang , WANG Xiao-Ming
2010, 19(5):163-166.
Abstract:This paper proposes a novel template adaptive updating strategy as part of Mean Shift framework which is based on feature matching filter in the scenario of head tracking. In accordance with the color space statistical information of tracked objects in different states, by using the color space kernel density estima- tion matching filter, this method decides on the specific pixels that need to be updated in template. The experimenttal results show that the algorithm is an effective solution to the rotating head and object block which leads to the mismatch of template. It also achieves the continuous tracking of the head, and has very good tracking results. The overall stability and robustness of the tracking algorithm are improved.
2010, 19(5):167-170.
Abstract:To uncover far/near relations between clusters accurately, existing clustering visualization methods usually have poor effects under the difficult condition of many clusters in a high-dimensional dataset. A new visualization method — line-pearl pattern with (non-) linear coordinates is proposed to show far/near relations or distances between clusters. Its advantage is that it can show far/near relations between clusters accurately under the difficult condition mentioned above. Experimental results on simulated and real data sets show that the proposed method is effective and much better than the clustering visualization methods.
2010, 19(5):171-173.
Abstract:In the intrusion detection process of dynamic clonal selection algorithm, the antigens detected by memory detectors and maturity detectors are directly considered as self immature detectors to be tolerated. But there may be new attacks hidden in these antigens. To solve this problem, a new idea with clustering analysis is proposed. The clustering algorithm cluster remaining antigens then analyzes data existing in small cluster, finds hidden attacks and update memory detector set in time. The experimental results show that the dynamic clonal selection algorithm with clustering analysis can enhance the detection system's ability to discover unknown intrusions.
2010, 19(5):174-178.
Abstract:This paper makes photon mapping algorithm capable of entirely running on latest GPUs by modifying its process in CUDA and harnesses the massive parallel computing power of GPU to accelerate the implementation of photon mapping. The implementation of photon mapping in CUDA includes the construction of the photon maps and estimation of the radiance. To accelerate the search of photons in photon map, this paper uses kd-tree to store photons and search them by KNN. The rendering speed is nearly 10 times by CPU under the test environment.
HE Cai-Jun , FANG Hou-Hui , GUAN Yu-Qiu , HUANG Li
2010, 19(5):179-182.
Abstract:This paper introduces the ZigBee technology and its characteristics. It analyzes the ZigBee network structure and designs an industrial monitoring network system by using the CC2430 based on ZigBee technology. It describes the hardware designing in each node of the system and protocol stack node application design based on the MSSTATE_LRWPAN. It designs a communication protocol between PC computer and the nodes of coordinator, and finally gives testing results of the network system.
WU Chun-Xu , LI Jia-Jun , SHI Hui
2010, 19(5):183-186.
Abstract:The memory-based collaborative filtering algorithm is one of the most successful technologies for recom- mender systems, although these approaches all suffer from data sparsity and poor scalability problems. Folksonomy has emerged as a powerful mechanism that enables users to find, organize, and understand online entities. This paper focuses on how to address these problems by using tags. The experiment for the tag-based algorithm and other algorithms showed that the novel algorithm achieves better performance compared to the traditional ones, proving the validity of the algorithm.
XU Wei , HU Shu , YANG Cheng
2010, 19(5):187-190.
Abstract:A database access interface based on OCI9 is designed and implemented. Double conditional variable mechanism is presented in the interface to resolve the long time blocking problem caused by function when some anomalies occur in the database. Secondly, when the net wire is pulled out, the database reconnection will have a problem of the increase in memory. To avoid it, a solution of double detections of connection is put forward. Finally, experiments are made to test the application effect of the database access interface.
WANG Cui-Qing , CHEN Wei-Ru , ZHANG Jing
2010, 19(5):191-193.
Abstract:The article analyzes the influence of data source features on the number of sequetial parttern, which includes the number of customers, average transctions of sequences, average items of transctions, and number of different items. The model of single features influence is obtained. With the model, a primary jugdement can be got before mining.
LIANG Jing , GE Yu , HONG Jie
2010, 19(5):194-197.
Abstract:Search engine is an indispensable tool for networks. How to improve the rank of website is a hot topic. Taking the Google search engine as an example, this paper analyzes the possible website evaluation strategies. It puts forward the optimize strategy to improve the rank of website. It also optimizes a Web site and has obtained satisfactory results.
DENG Zheng-Yang , CHEN He-Ping , SU Peng
2010, 19(5):198-201.
Abstract:To make full use of the characteristics of Lua dynamic scripting language for the current development of large and complex programs, which has the problem of high cost, this article focuses on how to simulate the message mechanism based on event in the Lua script and visiting the C + + interface. The design of Lua debugger is also presented.
2010, 19(5):202-204.
Abstract:The paper proposes a solution to risk estimation and uses Bayesian network and Rough Set to estimate the subjection of prior probability.
YUAN Li-Yong , JIN Bing-Yao , LIU Ri-Xian
2010, 19(5):205-208.
Abstract:In this paper, an algorithm for examination timetabling based on the PBIL (Population-Based Incremental Learning) algorithm is proposed. The relationships between the optimal function and schedule constraint are emphasized. It is proved that the PBIL algorithm is a suitable method in solving this problem, and it is flexible to attach schedule constraints. Finally, improvement of genetic selection of PBIL algorithm is proposed.
LIU Jin , YANG Shun , YU Huan-Ming
2010, 19(5):209-211.
Abstract:Classic Sobel algorithm is commonly used in edge detection. However, it has detected a lot of noise points and created broken license plate characters, which increased the difficulty of extracting license plate and characters, recognition, and reduced the accuracy of license plate location. In this paper, Sobel algorithm has been improved for license plate recognition system. The improved Sobel algorithm has achieved good results of license plate location and it has good anti-interference capability. And it can maintain the integrity of the characters to a large extent.
2010, 19(5):212-215.
Abstract:In this paper, the category of web attacks is discussed. From attacker's viewpoint, the security of college Web sites is analyzed from many respects, such as web process code, permission of document catalog, system leak, validatory leak of web, CGI parameter, SQL injection and cross-site track.
2010, 19(5):216-219.
Abstract:Shell is the interface for users to access to operating system. Shell development is of importance among Windows CE operating system development. This paper presents an overview of Windows CE Shell by establishing Shell model. It discusses how to customize Windows CE Shell and lists problems to be consi- dered during customizing Shell. The establishment of Windows CE Shell has been investigated in depth.
2010, 19(5):220-223.
Abstract:The Web application performances criteria are studied which include resource occupied, response time, concurrency users and think time. Performance testing is a significant part of the testing for Web applications. Load testing can be used to confirm the performance requirements of the tested system and load growth in the future. It is also used to troubleshoot where the software exceptions happen. With the automatic testing software LoadRunner, an online learning system is tested. The performance of trans- actions, network and response time and other performance criteria are analyzed.
2010, 19(5):224-226.
Abstract:A design method of the portable wireless searcher based on CC2430 is proposed. In this method, the values of RSSI of the wireless data frames from CC2430 RF card on the person in trouble sent to the searcher are changed into the distance values between the person in trouble and the searcher by mathematic transform, thus the above distance and the location of the person are estimated. Furthermore, this method uses schedule algorithm to optimize the communication and improve the stability of the data transmission in busy com- munication. The experiments show that the design method provides good accuracy and sensitivity, and can meet the requirement in reality.
2010, 19(5):227-229.
Abstract:The paper mainly describes a smart home system based on embedded ARM-Linux platform and GPRS technology. Building a wireless network of home based on ZigBee technology can realize wireless con- nection of ARM controller and the intelligent modules. The host uses mobile phone to send control com- mands to ARM controller through GPRS network. ARM controller controls intelligent modules through ZigBee modules. So the remote controlling of all home intelligent systems can be realized.
LI Xin-Chun , LI Yong-Xi , FAN Cui-Yan
2010, 19(5):230-232.
Abstract:In this paper, an energy-saving system for academic buildings is designed based on ARM, ZIGBEE and SENSORS technology. This paper provides an overall system block diagram and serial communication program between ARM and ZIGBEE. Besides, it provides design block diagram of light detection terminal, lighting circuits and implementation principle. Finally, it presents the practical application and value of the energy-saving system.
WANG Kai-Hui , LI Dan-Mei , QIAO Jie
2010, 19(5):233-236.
Abstract:Mipv6 will play an important role for the next generation Internet protocol. This article introduces the protocol process and analyzes the handoff delay. It constructs a simulation by using Mobiwan. The result shows that Ipv6 has good mobility.