AIPUB归智期刊联盟
LU Guan-Qun , HU Guang , TU Shi-Liang
2010, 19(7):1-5.
Abstract:Inter-process communication (IPC), as one of the most important primitives in the operating system, provides the possibility of exchanging data with several different processes. This paper proposes a new design of the inter-process communication system. And this system is implemented on Minix operating system which lacks the support of IPC before. With the implementation, it eases the developers’ porting and developing useful programs based on this feature. It is extensible and efficient as seen from the experiment. The design of this inter-process communication system can be studied for other operating system.
YIN Chun-Xiang , ZHU Xiao-Min , PENG Gang
2010, 19(7):6-9.
Abstract:The Spam Call Control System is a system to find out those spam calls and intercepts them. It is effective in reducing spam calls and making customers get better mobile services. This paper firstly proposes a net- work topology and an overall architecture of Spam Call Control System. Secondly, it focuses on designing the procedure of finding out and intercepting spam calls.
ZHANG Wei , SUN Zhi-Hai , WU Er-Yong
2010, 19(7):10-14.
Abstract:This paper gives a method of realizing a video moving vehicle detecting system based on DM6446 processor, and describes the system’s hardware architecture and software design ideas. The methods of ARM-side and DSP-side communication and double-buffer switch are given combining the characteristic of dual-core of DM6446 processor. Background modeling is made on the traffic video data from DM6446 via difference accumulation. Background subtraction is used to detect vehicle movement areas. With the adoption of other algorithms such as Otsu, morphological filtering and region growing, the system is finally completed on this hardware platform. Experimental results show that the system is good in moving vehicle detection.
PAN Ze-Kai , ZHU Ming-Ri , ZHANG Zhen-Sheng
2010, 19(7):15-18.
Abstract:In process control theory, image processing is the core of industrial sugar crystallization. It lays a solid foundation for the later part of the modeling and optimization of image processing system. Using a visual sensing method, this design is based on S3C2440 embedded processor hardware platform and Windows CE 5.0 operating system image information acquisition system of sucrose. This paper introduces the design of image sensor interface and the Implementation Stream Interface Driver in detail. This design has a friendly man-machine interface, and has functions like real-time monitoring, camera, storage and others. The design reduces system complexity, saves space and reduces costs.
WU Hua-Xing , LI Zhan-Wu , LU Yi
2010, 19(7):19-22.
Abstract:For real-time simulation of the complicated display and control system of aircrafts in a simple and quick way,a design scheme of distributed display and control simulation system based on Client/Server structure is presented with its functional features. Through using C/S structure, the system is divided into one server and multi clients,between which communication interfaces are established. And multithreading technology is applied to the division of the system software into modularized threads, to improve the real-time performance of system. The simulation results show that both display rate and communication rate meet the real-timere quirements, which lays the foundation for the simulation of a more complex display and control system.
2010, 19(7):23-27.
Abstract:This paper describes the importance of safety information in safe management of mines and compares traditional safety information management modes with modern ones. For all disadvantages of the traditional management modes, it designes a non-coal mines MIS based on authentication and electronic signature. The function of system, system platform, the DC role, the distribution of competences are designed. It also elaborates the design of system module-function in detail. The comprehensive use of authentication and electronic signature technology based on USB-Key effectively guarantees information’s integrity, reliability and security and prevents identity theft and operation denying. It has improved the efficiency of supervision and monitor accuracy, increased the strength and breadth of supervision, standardized business processes. The non-coal mines MIS is simple, efficient, safe and scientific.
ZHENG Xiong-Feng , HOU Ji-Gong
2010, 19(7):28-31.
Abstract:With the increasing amount of data in Administrative Service Center, how to handle these vast data has become a key issue. Thus, this paper introduces the Business Intelligence and its related technologies, taking the actual data in Administrative Service Center as background. It proposes the E-Government Intelligence System architecture, system framework, functional module, and explains in detail. Finally, it analyzes the process of building data warehouse.
ZHANG Shuo , XU Ai-Gong , SUN Gui-Bo
2010, 19(7):32-36.
Abstract:This paper analyzes the key technologies of GPS-positioning and navigation system for Mobile GIS and designs the system based on Smart Client Architecture. Through the GPS Intermediate Driver and embedded development, it realizes the GPS-positioning and navigation on PDA.
HUANG Li , FANG Hou-Hui , HE Cai-Jun
2010, 19(7):37-41.
Abstract:This paper analyses the basic theory of the EZW algorithm, and proposes an improved EZW based on eight symbols instead of four symbols used in EZW. In this method, giving the definition of zero-tree structure anew does not only reduce the complexity of encoding and decoding, but also saves the storage space and improves compression ratio. In e-classifying the significant symbols, the edge information is considered. At the same time, the number of zero tree roots is geatly redued and compression ratio is improved. Experimentsal results show that the improved algorithm performs better than EZW in reconstructing image quality .
2010, 19(7):42-46.
Abstract:To optimize online smoothing of real-time VBR video streaming, this paper proposes a SPSF(Shortest Path Smoothing based on Funnel) algorithm. In the SPSF, the real-time VBR video is piecewise processed by sliding window. Each video frame is read and cached into the window and the shortest path for the data transmission in the window is calculated based on funnel principle. When the window is filled with data, data start transmission according to the obtained shortest path. Window simultaneously slides according to the characteristics of the path to start smoothing and transmission of the next piece, and so complete the smooth transmission of the entire video. The experimental results show that compared with conventional online smoothing algorithm, SPSF has better bit-rate peak, valley, and variance. Compared with traditional shortest path algorithm, SPSF takes less time in computation of shortest path so as to be able to meet the real-time requirement.
2010, 19(7):47-49.
Abstract:Password-based remote user authentication is a hotspot in authentication protocol research. The security of a proposed remote user authentication scheme, the Lee-Kim-Yoo protocol, advanced by Sung-Woon Lee is analyzed, which used nonce random and had very low computational costs. However, this scheme still has many security faults. The weakness of the scheme is demonstrated. This paper proposes an improved scheme, a novel nonce and hash-based remote user authentication scheme using smart cards and analyses the amended protocol with BAN logic. It indicates that the amended protocol can reach the goal of the protocol.
WANG Yan-Feng , WANG Zheng , YAN Bao-Ping
2010, 19(7):50-53.
Abstract:Domain name system (DNS) redirect is expected to be the emerging functionality to perform a value added services for users by the Internet Service Providers (ISP) and the DNS Application Service Providers (ASP). This paper specifies the error description as the list of suggested domain names other than the original one, which are sorted by their relevance. Two handover processes for the redirected server is proposed, which can facilitate finding the suggested domain names both correctly and timely. Besides, the request handling algorithm is proposed using the prolonged resource records. The message structure of the redirect is defined to accommodate the redirect IP information in the DNS protocol.
LIU Yan-Yu , ZHANG Jie-Xin , CHEN Xiao-Hui
2010, 19(7):54-59.
Abstract:The paper studies the storage management for object-oriented database, and a new scheme based on the ODMG3.0 standard. is presented by Java binding. By studying the typical storage structure of persistent objects, it proposes a layered storage structure that takes into account the characteristics of diversified data type. Combining with the architecture here, it transforms a file structure based on Slotted-Page Structure, substituting storage unit from page to database file. After analyzing the introduced indexes for OODB, the paper presents a uniform indexing scheme, based on a B+-Tree and with both the inheritance and the aggregation hierarchy.
ZHANG Kai-Xuan , ZHANG Da-Wei , YAN Ye , GUO Yang
2010, 19(7):60-64.
Abstract:Generating three-dimensional landscape model is a hot topic in the field of GIS in recent years. It can convert aerial survey data into three-dimensional visual maps, which can show the terrain of the routevividly, and have broad application prospects. In this paper, basic spatial data that three-dimensional landscape modeling needed are obtained by the microstation software and ImageStation SSK based on aerial image, and the data are analysed and processed. The collected data are optimized so that the errors can be found and revised. Existing buildings in the city are modeled by using the IMAGIS 3D geographic information system software, and the application of real photos veneer them made the results closer to the reality. Finally the three-dimensional urban landscape maps are generated, and AVI video is created with 3Dbrows .
2010, 19(7):65-68.
Abstract:The cryptographic algorithm is public in modern cryptography. The security of user’s file relies on the protection of the user’s private key. Common practice of protecting private key is to encrypt it with a password and store it in the user’s device. However, the private key is vulnerable to offline dictionary attack when the device is captured by an adversary. In this paper, we analyze the S-RSA protocol and propose an SS-RSA protocol which can resolve the problem of S-RSA that can’t resist the DOS attack and can’t get back the user’s private key after the user cancels the ticket.
2010, 19(7):69-73.
Abstract:Skill test was proposed in the extension of Knowledge Space Theory, but it gave nothing about the process of skill test. This paper defines question function, skill function, skill state function, and completes the mapping of knowledge structure onto skill structure. It also proposes a concrete process of skill adaptive test and gets the skill level of the testees. Furthermore, it introduces neighbor and boundary of knowledge state and optimizes a key process about selecting strategy in adaptive test, which helps tests to adapt to testees in knowledge.
CHEN Xian-Chuang , XU Xiao-Liang
2010, 19(7):74-78.
Abstract:In order to reduce the cost of java virtual machine garbage collector, we propose a stack-allocation based garbage collection algorithm. We improve the stack frame and make it support object storage, analyse and identify stack-allocation object when compiling the java source code, and mark the object with new byte command. Stack-allocation object will be allocated from java stack and released immediately when leaving its scope. Other object will be allocated from heap and released by garbage collector. Experimental results show that, compared with traditional garbage collector, the new algorithm improves the performance of allocating and releasing, reduces the burden of garbage collector and runs faster.
2010, 19(7):79-82.
Abstract:To meet the actual demand of oil network information system in B/S model, and to improve dynamics of users’ authority management and security of authorized access, this paper presents a fine-grained privilege management model combining the role-based access control principle for the fact that users are complicated and they change jobs frequently in B/S application system. This model decomposes the access privilege of sources by fine-grained, and realizes access control of different levels from coarse-grained to fine-grained, and this model cannot only authorize the role but also authorize the user directly, which greatly improves the flexibility and scalability.
ZHU Kong-Guo , LI Shu-Quan , LI Yong-Hui , LI Wu , Fu Yin-Dan , MA Jian-Yong
2010, 19(7):83-86.
Abstract:The evaluation of major S&T program is of significance for implementing the national S&T plans. However, with the complexity of major S&T program, the evaluation would be faced with a lot of problems. This paper structures and perfects evaluation index system based on balanced scorecard, and explains the relationship of evaluation index briefly. Then, the evaluation index carries out factor analysis with primary component analysis method. Thus, the primary components are obtained. Subsequently, the evaluation model is constructed via GA-BP neural network. Finally, taking provincial S&T program of Tianjin city as the case, the paper proves that the model is not only scientific but also practical.
2010, 19(7):87-90.
Abstract:With the development of SVM,its application has been extended from binary class classification problem to multi-class classification problems. Its concepts and algorithms become various and different. The main study in this paper is DDAG, which is one of the popular algorithms, whose principle is combining the binary class classifiers with multi-class classifiers. This paper also points out the strengths and weaknesses of DDAG, when it is used in multi-class SVM text classification, and presents an improved algorithmic concept to make up for the weaknesses.
2010, 19(7):91-94.
Abstract:Data prefeching is used to improve system performance and thuoughput, which ignores the disk energy comsumption. As for this problem,a delaying asynchronism prefeching, clusting disk I/O handle way is proposed based on tradition prefeching to reduce the disk state switching and extend the length of disk idle phases for saving power. We also validate and evaluate this algorithm based on the really running simulator. Our simulations show that compared to stand prefeching with negligible loss performance, our algorithm saves 17% more disk energy.
WEN Xin , WANG Xi-Fa , YUE Yun-Tian
2010, 19(7):95-97.
Abstract:Considering the structure characteristic of telemetry data frames of UAV wireless communication and the requirements of real time and high quality, this paper presents an encryption method based on self- synchronizing stream cipher. This encryption method is not only higly secure,but can also be easily realized with few error-spreading and no message-spreading. The realization of FPGA shows that the design of the scheme has higher feasibility and trustiness.
SHUAI Xun-Bo , MA Shu-Nan , SHAO Yan-Wei , WANG Jian-Zhong
2010, 19(7):98-102.
Abstract:In order to resolve the contradiction between global searching and local searching of genetic algorithm, matrix genetic operator and Boolean genetic operator are proposed based on binary code describing search space fine and calculating fitness easier. Global searching of genetic algorithm is improved by the matrix genetic operator making good use of colony information to find new space, while local searching of genetic algorithm is improved by the Boolean genetic operator making good use of chromosome information. An optimization combination genetic algorithm is constructed through combining the two new genetic operators. It does not require parameters of crossover probability and mutation probability, which are important to general genetic algorithm. The constructed genetic algorithm is proved to be convergent, and its better searching efficiency is shown by experiments results. It is a significant reference for other optimum problem resolved by genetic algorithm based on binary coding.
WANG Wei , MA Yong-Qiang , TIAN Xin-Yu
2010, 19(7):103-106.
Abstract:An edge detection and color segmentation-based algorithm to locate the plate region is proposed for complex vehicle images, which makes use of high frequency characteristics and the background color of the plate. The algorithm can quickly find the accurate position of license plate from the whole vehicle picture with all kinds of interference factors. Experimental results show that the method is accurate and robust.
SUN Xia , YANG Run-Ping , LUO Ting , HUO Rui
2010, 19(7):107-110.
Abstract:Designing a software to connect an object-oriented business system with a relational database is a tedious task. This article proposes a data persistence model based on DAO Pattern. It completely makes the access to underlying data independently encapsulated, and makes object model and relational database independent of each other by Variable Mechanism. In addition, the data accessing efficiency is greatly improved through the buffering mechanism.
CHENG Bo-Bo , ZHANG You-Hua , LI Shao-Wen , GU Li-Chuan , ZHU Li-Jun
2010, 19(7):111-114.
Abstract:A concept extraction method is presented based on tea dictionary and statistics. The method takes tea dictionary as basis. Firstly, unstructured data source is in Chinese word segment processing, and then, two statistics algorithms are applied to extracted tea concept from Chinese segment results. The approach improves the precision and efficiency of Chinese segment and concept extraction by reducing the time complexity of statistical algorithms with the rich tea dictionary. The experimental results show that the degree of dictionary richness determines the efficiency of tea concept extraction, and can be improved by updating tea dictionary.
SUN Li-Li , LI Jun , LI Huai-Jia
2010, 19(7):115-118.
Abstract:The production rule-based decision expert system takes drilling oil well as an example. It adopts the methods of production knowledge presentation based on the data of drilling oil well. It stores the experience and knowledge of experts into knowledge base, gives reasonable proposal through efficient reasoning and then improves the efficiency of the project.
2010, 19(7):119-121.
Abstract:An embedded image detection system for liquid reagents based on color character is designed and implemented. System fitting the concentration of liquid reagents by color characters includs detection image. The core hardware of system is embedded microprocessor, and CCD camera is used to acquire detection image. The design of image acquisition function and color image processing algorithms is important to the system. The experiment of content detection for DNA shows the feasibility of system.
ZHANG Zao-Sheng , HUANG Ting-Lei
2010, 19(7):122-125.
Abstract:In this paper, a data acquisition and transmission system based on the Ethernet technology has been proposed. It adopts the single-chip solution, exchanges information between the Ethernet and other channels, and implements a variety of measures to improve system stability. Its parameters are configurated by a configuration software running on the computer through TCP connection. The system has the advantages of low cost, high reliability, easy to use and so on.
2010, 19(7):126-129.
Abstract:A solution based on WMI is introduced to solve the problem of data and program management in Windows system. Based on the research work of WMI’s structure, functions and application methods, we summarize the specific WMI methods for data management, program management and applications integration. This solution is simple, clear, and powerful and can be used by plenty of interfaces. A successful use of this solution in an enterprise project is also introduced.
WANG Hao-Yi , ZHAO Guo-Cai , JI Nan
2010, 19(7):130-134.
Abstract:To address the disunity proplem of sheugang communication protocol when SCADA processes data frames from serial communication in the engineering of SCADA , a real-time data gateway developed with VC++ is proposed to complete the analysis of communication protocol and data dump.
HONG Hua-Jun , LENG Wen-Hao , ZHU Long-Chao , WU Jian-Bo
2010, 19(7):135-139.
Abstract:WebGIS develops along with the web applications. The traditional model of the independence between server-side services and desktop-side services cannot meet the modern needs. Therefore, this paper proposes 2N model based on Web Services. It makes data exchange more easily between the server and the client. Through the selection, integration, optimization of related technologies, an UMXGIS system is designed and implemented based on the 2N model.
2010, 19(7):140-143.
Abstract:The paper introduces the communication system of vending machine based on Dex/Ucs and how to realize communication and data acquisition between terminal and vending machines on Platform Vb6 + Borland according to feature and communication theory of Dex. The core of the system is communication between terminal and vending machine which is realized via three-way handshake of Dex session layer. The format of data during transmitting is also based on Dex session layer Protocol. Implementation platform of the system is Vb6+C module which is a perfect combination of advantages of the two.
2010, 19(7):144-147.
Abstract:At present, the data transfer protocol of vending machine monitor system in our country is not unified. There is no compatibility in these management platforms developed by different vending machine factories. To tackle this problem, a vending machine monitor system based on EVA-DTS(European Vending Association Data Transfer Standard) and GPRS(General Packer Radio Service) is researched and designed. This paper completes the network construction between vending machines and data center by the use of GPRS,builds the data format of information by the use of EVA-DTS,and finally works out the monitor system which is real time and safe. The system ensures the steady communications between vending manchines and data center. It is easy to help managers run the machines and good in its compatibility. It can handle any vending machine which obeys the EVA-DTS.
2010, 19(7):148-152.
Abstract:This paper firstly introduces the background and current situation of Remote Meter Reading Systems, and points out their merits and shortcomings. Then, a design and implementation of a Remote Meter Reading System’s concentrator based on embedded Linux is illustrated in detail according to the author’s development experience in this field. This paper contains the architecture of the whole Remote Meter Reading System, the structure of the concentrator and its software design method.
2010, 19(7):153-157.
Abstract:Based on the analysis of the relevant intelligent prediction algorithm, it is found that existing algorithms don’t consider the potential relevance of the relationship among the virtual scene node, and they reduce the prediction accuracy of the algorithm. To tackle this problem, based on a new cube virtual scene model,an intelligent roaming algorithm is proposed. The algorithm establishes complete BiTree structure for each node, uses the potential association between the nodes to predict the object which may be operated next, protracts the predicted object in advance and then transfers it into the memory. This algorithm effectively compensates for the shortcomings of the related algorithm, thereby imptoves the efficiency and real time of roaming virtual scene. The algorithm is highy accurate.
ZHAO Ying-Chuan , WANG Wan-Liang , JIANG Yi-Bo
2010, 19(7):158-161.
Abstract:Transformation from feature to semantic info is the important step of Video Retrieval. Based on the improved SVM procedure for Video Retrieval according to relevance feedback, reranking and BOOST, this paper proposes a framework. Using the data of TREC2007, the experimental result shows the framework has sufficient improvement in AP and MAP.
2010, 19(7):162-165.
Abstract:In the development of database application, it is a technologic difficulty to access large object (LOB) data quickly and efficiently. In this paper, a simple and easy method for storing and getting large object data in Oracle database based on OCCI is presented. The process of implementing in technology is also expatiated by some examples. The codes have been debugged and provided under Visual C++ 6.0 environment.
2010, 19(7):166-170.
Abstract:This paper introduces a database-supported information acquisition application and its implementation using Windows Script programming. It proves the strong functionalities the database-supported Windows Script application could provide in web development environment. This technique could also facilitate daily maintenance for systems and increase working productivity.
WU Chun-Xu , LIU Yan-Ze , GOU Qing-Long
2010, 19(7):171-174.
Abstract:The ant-based clustering algorithm needs to set several parameters and cluster for a long time.The ant- based clustering algorithm based on entropy, which uses entropy to amend the ants picking and dropping rules, can reduce the number of parameters and shorten the time of clustering. This paper intends to apply it to the customer segmentation, and compares the segmentation results with the traditional ant-based clustering algorithm. The experiment shows that the ant-based clustering algorithm based on entropy can accelerate customer segmentation.
2010, 19(7):175-178.
Abstract:Growing attention has been paid to access control in information system, especially the access control of resource access requires in office automation area. However, traditional role-based access control model and task-based access control model cannot satisfy the workflow changeable requirements. To solve these problems, the task-role-based access control mode is introduced, which can satisfy the requirements of authority managements from business fields related to office automation. At the end of the paper, combined with the practical development of office automation system, the detailed implementation instance of task-role-based access control mode is provided.
ZHOU Lian-Dong , PAN Hui-Li , HONG Chun-Yan , WANG Qi-Feng
2010, 19(7):179-182.
Abstract:Workshop Manufacturing Process Information System is the information platform for supporting the operation of workshop manufacturing process. It is the information bridge between manufacturing enterprise’s management decision-making and equipment executive. And it also has functions for workshop production information management. This paper uses object-oriented analysis and design method. And after analying the business processes of workshop manufacturing process information system, the conceptual model, case model, dynamic model and physical model are built by using UML modeling tool.
2010, 19(7):183-185.
Abstract:In view of the security threats in the coal mine environmental monitoring system, this paper proposes a method for distributed hierarchical information fusion based on improved Kalman filter and SVM. The sensors in the system are divided into source nodes and sink nodes. In the source, the Kalman filtering are used, and in the sink SVM is used. The algorithm can reduce the energy consumption and data collision. Simulation result verifies the reliability of this algorithm, and it improves the fusioning precision of the wireless sensor network .
ZHANG Kai-Xuan , GAO Xiao-Liu , CHEN Fei
2010, 19(7):186-192.
Abstract:A number of digital cadastral maps that act as the GIS data sources are based on the AutoCAD platform. Different from GIS data, they do not pay much attention to closure property, topological property and other issues. The closure property test of ancestor parcel is an important component of the conversation of CAD data and of Standardization GIS data and that of Vector Data before cadastral data populated the database. In this paper, the ancestor parcel closure property test is conducted from the technological and theoretical base and the reason is investigated why the ancestor parcel is not closed. It also discusses the flow of testing ancestor parcel closure property, and introdnces a new method by using the technology of AutoCAD ActiveX. The second development is made under AutoCAD 2005, and the ancestor parcel test and the human-computer interaction revision are illuminated. And the problem of results output and ancestor data entering under AutoCAD is addressed. The discussion and research on ancestor parcel test has practical significance for GIS data standardization, and can accelerate cadastre information system construction.
OU YANG Liu-Bo , YANG Zhu , YI Xian
2010, 19(7):193-196.
Abstract:Since CSS+DIV Topological Mode has become the major trend of the structural layout of web pages, the efficient extraction of the topic information in these web pages has become one of the urgent tasks for all professional surfing engines. This paper puts forward a new way of extracting the topic information in web pages based on the DIV tag-tree. It divides HTML files into DIV-forest with the help of DIV-tag. Then it filters the noise nodes in DIV tag-trees and sets up STU-DIV model-trees. Finally, it crops the DIV tag-trees irrelevant to the topic information by Topic Corelation Analysis and Cut-Tree Algorithm. It proves that this method can efficiently extract the topic information in web pages by analyzing several news web pages .
ZHANG Rui-Lin , ZENG Xiang-Hui , ZHU Bao-Xiang
2010, 19(7):197-200.
Abstract:In simulating section dyed yarn, how to achieve the transition between two colors is the core. In this paper, we finish it by using the linear interpolation and the cubic spline interpolation in numerical analysis to establish the basic color gradient model. Then, taking the 2 colors and 3 colors-sections dyed yarns for example, we combine the existing yarn model with the color gradient model in the paper, in the way of texture synthesis to achieve the simulation of section dyed Yarn. At last, based on the specific process parameters in dyeing process, we optimize the established model to make it more practical and more widely.
2010, 19(7):201-203.
Abstract:How to improve the accuracy of the search algorithm is important for its search algorithm improvement. This paper researches an algorithm based on the user’s model. First, it defines a group of Search-Models.Each Search-Model contains a User-Model and an information resequence tactic. When the user does a searching, Vector Space Model will be used to choose an optimal Search-Model, and then uses the information resequence tactic defined in the Search-Model to resequence the information found by user’s input. Finall, it sends the information to the user making user attribute as the premise to filter and re-sequence the information. It provides accurate search service according to the user’s specific conditions. Results show that the algorithm can improve the accuracy with an acceptable time consumption.
LI Yan-Mei , HU Xiao-Hui , WANG Jing-Xin
2010, 19(7):204-206.
Abstract:Corner is a special edge point, which is the important geometrical features of digital image. This article uses the characteristic that edge is continual and proposes the algorithm based on the growth of the seed point SUSAN edge detection. It obtains the images of the corner points by using the Susan algorithm, and then gets the corner points as seed points, carries on the growth according to the criteria to determine the edge points. The paper realizes the edge detection finally. The experimental results based on this method was proved to be feasible.
2010, 19(7):207-209.
Abstract:To enhance the low efficiency of producing the clustering result with given number of clusters by Affinity propagation clustering (AP), the fast multi-grid searching method is proposed. The proposed method uses multi-grid searching to reduce the calling times of AP, and improves the upper bound of preference parameter to reduce the searching scope, so that it can largely enhance the speed performance of AP under given number of clusters. The experimental results show that the proposed method is very effective and reduces the running time by 22%-90%, compared with the existing method.
2010, 19(7):210-212.
Abstract:This paper first defines the average slope of curve and makes use of it together with the curved projection to find out the left and right boundaries of human face in the picture. It then finds out the upper and lower boundaries in accordance with other characteristics such as the colour of hair or skin, or the characteristics of eyes. It finally detects the whole human face region in the picture.
2010, 19(7):213-216.
Abstract:This paper explains how to read data from OneNand Flash bypass the file system in Windows Mobile 5.0 smartphone. Firstly, the characteristics of OneNand Flash and Windows Mobile 5.0 operation system are briefly introduced. Then, the paper elaborates the method of reading data from OneNand Flash with blocks and transmiting the data to PC. At last, with the instance of developing a GHOST sorftwore on Windows Mobile system, this paper explains the method in detail and shows part of the key source code.
CHEN Yao-Fei , CHEN Huan-Tong , Ni Yinghua
2010, 19(7):217-220.
Abstract:According to characteristics of the Skill operation paper, this paper proposes to build constraint mode around the skill point. It achieves the skills item bank automated test paper using the combination of the distribution. It designs skill point matrix constraint model. It discusses three key components: parameter validation optimization, the program generates combinations of skill points and becoming the skills test paper. The example indicates the this method can achieve the skills item bank to satisfy the skills points test paper. The method is simple, highly efficient and of excellent quality. It is very suitable for application of the Skill operation paper.
2010, 19(7):221-223.
Abstract:A new texture description method of an image is proposed in the paper. Firstly, a binary image which reflects the image’s low frequency is defined by comparing the image’s gray mean with the region’s. Then, the statistic features are extracted based on the co-occurence matrix of the binary image. Finally, the new texture feature and the traditional texture spectrum are used as an index. The experimental results show that the new method is efficient and it provides noticeable improvement to the performance of texture spectrum descriptors.
2010, 19(7):224-228.
Abstract:Initially, the architecture of Hadoop is analyzed, and an improved PageRank algorithm is proposed. Then, we design system modules using Map/Reduce. The implementation presents that the distributed search engine using Hadoop is good in its performance, reliability and scalability.
ZhANG Yong-Cai , WU Shou Er·Si La-Mu
2010, 19(7):229-231.
Abstract:This paper Researches and implements the Uigur-Chinese electronical dictionary with J2ME technology on the WTK platform. It analyzes and designs structure of word file and well UI on the electronical dictionary, implements the rapid search word with Binary Search Method. In this paper Uigur word can be input with cellophane keyboard and touch screen.
2010, 19(7):232-235.
Abstract:This paper makes an introduction to requirement of software auto testing system and JMX network management architecture. It proposes an approach to build software auto testing system with JMX framework. In the end, the advantages of JMX-based software auto testing model are pointed out.
2010, 19(7):236-239.
Abstract:This paper introduces the OPC technology in connection with the need for rapid development of OPC, and studies the similarities and differences between the .NET Framework and the COM. It demonstrates a .NET Framework-based framework design for developing out-of-process OPC Data Access server, introduces the realization approach and key technologies and the practical application of case, which can be used as reference for OPC development.
2010, 19(7):240-243.
Abstract:This paper designs the intelligence home control platform based on Qt/Embedded of touch screen, realizing the intelligence control of home by way of zigbee networking. Interface designer of intelligence home uses Qt/Embedded. At the same time, interface will be transplanted to the control platform for microprocessor of ARM9, and achieve the touch-screen features of interface. Finally, the paper connects the interface of a touch-screen features with zigbee networking through the serial port driver, to realize wireless transmission about the intelligence home.
CHEN Xiao-Xia , REN Yong-Mao , LI Jun , ZHANG Xiao-Dan
2010, 19(7):244-249.
Abstract:Network measurement and analysis provides vital means for people to know, understand and better utilize the internet. Also it offers the scientific basis for scientific management, effective control and development and utilization of internet. In this paper, the chief research of the network measurement and analysis and its research situation in the world are introduced. And the key techniques are also explored. Commonly used measurement and analysis tools are presented. Lastly, the application examples of the measurement of Global Ring Network for Advanced Applications Development (GLORIAD) are given.
2010, 19(7):250-254.
Abstract:Project Manufacturing has both project features and the nature of manufacturing, and these two aspects decide that the business of project manufacturing enterprise is different from others. Especially in a complex products structure and mass production environments, the business has great impact on ERP system. Currently,the functions of ERP software have many shortcomings in satisfying the project manufacturing requirement, so it has to be customized in ERP implementation process, which caused a large number of duplication work in enterprise ERP projects. This article first goes through a typical project manufacturing companies to find out business problems, and next analyzes the special business requirement of project manufacturing. Finally, it matches one of the most advanced ERP software, Oracle EBS with the business requirements, finding out the shortcomings of ERP in supporting project manufacturing business and providing some reference to continuous improvement of ERP.
2010, 19(7):255-259.
Abstract:Hidden Markov Model (HMM) is an important probabilistic model of sequential data processing and statistical study. It has already been successfully applied in many projects in practice. Firstly, this paper introduces the basic principles of the Hidden Markov Model, and then gives a review to its latest application in the human activity analysis, network security and information extraction. Finally it summarizes the theory and latest progress of the recently proposed infinite Hidden Markov Model (iHMM).