• Volume 19,Issue 8,2010 Table of Contents
    Select All
    Display Type: |
    • Development of CGF System in Virtual Battlefield Environment

      2010, 19(8):1-5.

      Abstract (1896) HTML (0) PDF 4.66 M (4332) Comment (0) Favorites

      Abstract:Battlefield environment simulation plays an important role in battle and training simulation systems. As part of the virtual battlefield environment, CGF is the critical technique of virtual battlefield environment. In order to provide effective support of tactical training, combat missions training and tactics research for the flight simulation training system, a CGF system is developed through the CGF entity framework of VR_Forces based on the Object Parameters Database making use of the CGF entity modeling based on the component factory mechanism. The CGF system mainly generates enemy forces, provides with realistic simulation campaign environment, and better meets the training requirement of the simulation training system.

    • Graphics Card Direct Assignment Based Virtual Machine Graphics Acceleration System

      2010, 19(8):6-9.

      Abstract (1840) HTML (0) PDF 7.17 M (4552) Comment (0) Favorites

      Abstract:This paper presents Gracias (Graphic Card Direct Assignment), which directly assign a graphics card to a certain virtual machine. Thus, access request from device driver of the graphic card in virtual machine will not cause any traps into the virtual machine monitor and the request will be handled directly by the hardware instead of software emulation. This makes the programs that have high demand on graphic processing give much better performance than with ordinary virtualization approaches.

    • Application of Workflow System to Automobile Industry Based on ASP Pattern

      2010, 19(8):10-15.

      Abstract (1961) HTML (0) PDF 7.45 M (2213) Comment (0) Favorites

      Abstract:Automobile industry has developed rapidly recently, and made itself significant in national economy of China. And we can tell that the significance will be greater as time goes. And dynamic alliance is the most advanced in automobile industry among all industries, but there are many problems in its information process. From the perspective of workflow system, with the international-advanced ASP pattern, this paper helps automobile dynamic alliance to advancee in information process.

    • Design of a Distributed Flight Control Computer for UAV

      2010, 19(8):16-19.

      Abstract (1894) HTML (0) PDF 4.59 M (3545) Comment (0) Favorites

      Abstract:Distributed architecture has been widely used in the design of reliable avionics. Distributed flight control computer designed based on Controller Area Network (CAN) is used for flight control law solution and system management of unmanned aerial vehicle (UAV). According to real-time UAV control and reliability needs, an inner communication mechanism of distributed flight control computer which integrates CAN communication, dual-port random access memory (DPRAM) communication and control tasks is put forward. Experimental results show that the communication mode designed according to the communication mechanism meets the real-time UAV control and reliability requirements, and solves the problem of the data delay caused by distributed architecture.

    • Research and Design of Real-Time and Adaptive Mobile Map System

      2010, 19(8):20-23.

      Abstract (1709) HTML (0) PDF 4.15 M (3542) Comment (0) Favorites

      Abstract:Contraposing the shortage of mobile map in existence, a design of mobile map service system is introduced. The system organizes the map data effectively, records, analyses user interactions, and automatically classifies the objects which interest the user, thereby providing real-time updates and adaptive mobile maps.

    • Generic Modeling Framework of Management Information System Development

      2010, 19(8):24-28.

      Abstract (1833) HTML (0) PDF 5.39 M (2725) Comment (0) Favorites

      Abstract:To deal with the complexity and difficult maintenance on management information system development, a management information system modeling method based on Eclipse Modeling Framework (EMF) is proposed and a common modeling and development framework is formed. Taking the college educational management system for example, this paper realizes the auto change from platform independent mode1 to platform specific mode1 on J2EE platform. It also validates that this development framework has advantages in improving development efficiency, expansibility and low maintenance cost.

    • Design and Application of Personalized Recommendation System Based on Users Behavior

      2010, 19(8):29-33.

      Abstract (2340) HTML (0) PDF 4.14 M (10059) Comment (0) Favorites

      Abstract:It is difficult for the e-commerce system to meet users individual requirements. As one of the most successful algorithms, the Collaborative Filtering Algorithm still has problems like sparsity of data and lack of authenticity in user rating. Based on the related work, a recommendation algorithm based on users actions is designed and implemented. It avoids the weakness of collaborative filtering techniques. This paper describes the recommended system’s ideas and the implementation process, and proves that the recommendation system performed well through experimtnts.

    • Wireless Sound System Based on Embedded USB-HOST Device and ZigBee Technology

      2010, 19(8):34-38.

      Abstract (1659) HTML (0) PDF 4.19 M (3405) Comment (0) Favorites

      Abstract:Currently, the wired mode in household audio system is complex and difficult to change, whereas it costs too much to use Bluetooth to transmit aundio data. Based on these issues, we design a low-cost, low-power wireless audio system which uses TI's MSP430F1611 as the master chip to control the USB interface chip CH375 to read mp3 audio files inside a U disk, and transmits the data streams through ZigBee network to the sub-node, then decode and output the signal by audio decoder chip VS1003. It innovatively uses embedded USB-HOST and ZigBee technology in domestic sound system and achieves the wireless transmission of audio data.

    • Design and Implementation of Data Mining System Based on Traditional Chinese Medicine Extracted

      2010, 19(8):39-43.

      Abstract (1583) HTML (0) PDF 4.13 M (2721) Comment (0) Favorites

      Abstract:Data mining methods are applied to the system to extract data for analysis of Chinese medicine and forecasting. First, the data integration and discrete treatment are made, to obtain appropriate data mining data sets. Then k-means and DBSCAN clustering algorithm are used to cluster the data quality control. Quality control process parameters interval are obtained. Apriori algorithm is improved by adding a user interest degree in the concept. The candidate set of exponential growth is controlled. The relationship between parameters and solids is got. By using three-layer BP neural network algorithm trained network model, the relationship between the process parameters and results quality parameters is obtained. The law implied in the data is found. It provides a scientific analysis and decision support for enterprises to optimize processes and improve their productivity and reduce the costs.

    • Instrument System of a Large-Scale Transporter Simulator

      2010, 19(8):44-48.

      Abstract (1734) HTML (0) PDF 4.39 M (3408) Comment (0) Favorites

      Abstract:The Instrument system of simulator is mainly real instrument system at present. It has shortcomings like having complex driving and high price. According to the development of a large-scale transporter simulator, an integrated plane instrument system of real instrument and virtual instrument is given and the developing methods of integration instrument system is presented. It provides new solution for instrument simulation of flight simulator.

    • Remote Harmonic Analysis System Based on LabVIEW

      2010, 19(8):49-51.

      Abstract (1761) HTML (0) PDF 5.03 M (3728) Comment (0) Favorites

      Abstract:This paper designs a new system aggregated advanced FFT and Hanning windows interpolation arithmetic based on LabVIEW in view of traditional harmonic analysis being carried inconvinently, and its weakness in graphic programming and internet transimitting. Furthermore, the results of data can be transmitted in the internet by the DataSocket technique, being real-time and accurate, which implements the remote monitor by the internet transmiting.

    • Automated Circuit Design Methodology Using Decomposition Evolution

      2010, 19(8):52-56.

      Abstract (1848) HTML (0) PDF 4.26 M (2788) Comment (0) Favorites

      Abstract:A Parallel and Recursive Decomposition algorithm is proposed. It divides the system into some simple ones regularly until the function is achieved. This decomposition process consequently dispense with human interference. The proposed algorithm regards the sought circuits as many parallel evolving subcomponents and utilizes the complementary of "elitists" during evolution to guide decomposition process. The experimental results show that it greatly enhances the efficiency and hit effort of evolving digital logic circuits.

    • Mechanism of Agent Organizational Structure Evolution Based on Role

      2010, 19(8):57-61.

      Abstract (1857) HTML (0) PDF 4.56 M (2275) Comment (0) Favorites

      Abstract:Agent organizational structure evolution is an important aspect in organizational evolution domain. To deal with the problem of agent organizational structure evolution, this paper describes the whole construct of organizational structure based on role, and forms the formalized description of the organizational structure interior characteristic. At the same time, according to the formalized description, mechanism of agent organizational structure evolution based on role is presented. That is, it analyses agent organizational structure evolution process from the three diversification forms which are the role-goals increase, the role-goals decrease and role-relations alteration. In the end, the mechanism provides the reference for the adaptive and dynamic organizational structure.

    • Optimized Apriori Algorithm for Mining Association Rules

      2010, 19(8):62-65.

      Abstract (1763) HTML (0) PDF 4.18 M (3888) Comment (0) Favorites

      Abstract:To address disadvantages of the Apriori algorithm, a new method is presented to optimize the Apriori. It can reduce the number of invalid candidate item sets through optimizing the strategy of frequent item sets pruning. In order to reduce the connections of items, avoid repeated comparison of the same items, it optimizes the joining strategy. And it also removes the useless transactions from database step by step in order to reduce the times of scanning transactions. The results of experiment show that the optimized algorithm is more efficient.

    • Design of An Improved Block Cipher Reconfigurable Architecture

      2010, 19(8):66-69.

      Abstract (1818) HTML (0) PDF 4.17 M (3107) Comment (0) Favorites

      Abstract:Coarse-Grained Reconfigurable Architecture aimed at cryptographic processing has been widely studied because of its good performance and flexibility. In a cipher reconfigurable processing architecture, a configuration circuit that has heigh efficiency can greatly reduce the configuration time and accelerate the accounting. In this paper, we improve the configuration circuit of a block cipher reconfigurable processing architecture and speed up the configuration of the block ciphers that have regular structure.

    • Enterprise Homepage Information Extraction Based on Regular Expression

      2010, 19(8):70-73.

      Abstract (1709) HTML (0) PDF 4.19 M (2937) Comment (0) Favorites

      Abstract:The paper mainly analyses the structural characteristic of the sentences that describe enterprise basic information on enterprise homepage. It proposes the method and technique of enterprise homepage information extraction based on regular expression, and develops an archetype system to extract some enterprise information items. The experimental results show that it can extract enterprise-related information from enterprise homepage effectively and get a high recall and precision.

    • Optimization Combination Genetic Algorithm for Graph Coloring Problem

      2010, 19(8):74-77.

      Abstract (1992) HTML (0) PDF 5.63 M (2634) Comment (0) Favorites

      Abstract:Graph coloring is a NP-Complete problem. In this paper, based on the research result of Matrix genetic operator, inverse and dual combination operator, an optimization combination genetic algorithm is constructed through the inverse and dual combination genetic operator combined with matrix genetic operator to solve Graph Coloring problem. A transform coding between integer and binary is introduced to make good use of the combination operators. Fitness function based on constraint of Graph Coloring problem is designed, and the convergence of algorithm is proved. Better efficiency of the optimization combination genetic algorithm for solving Graph Coloring problem is verified compared with current genetic algorithm.

    • Research and Implementation of Rule-Based Data Cleaning Model for Soil Data

      2010, 19(8):78-81.

      Abstract (1605) HTML (0) PDF 5.42 M (2485) Comment (0) Favorites

      Abstract:Data validation is one of the most important phases in KDD (Knowledge Discovery and Data Mining). Since Internet and computer are unavailable in some observation station and data preprocessing is necessary, most soil observation data in our country could not be included in database online. Most of the data are stored and preprocessed by software like Microsoft Excel before they are reported to Soil Sub-Center. These steps often lead to some uncxpected errors. We present a customizable rule based model in this paper. The model consists of several modules: Data format transformation module, Privilege management module, Metadata management module, Record De-duplication module, Data Cleansing module and Rule customization & parser module. Low-invasive and light-weight design make the model validatc data successfully while without affecting the old data entry system. At the same time, Customizable Rule makes the model much easier to extend.

    • Real-Time Implementation of G.723.1 Speech Coder Using BF 532

      2010, 19(8):82-86.

      Abstract (1744) HTML (0) PDF 4.32 M (3159) Comment (0) Favorites

      Abstract:This paper presents a full duplex, real-time implementation of ITU-G.723.1 speech coder using the BF 532 DSP chip with the uClinux embedded operating system. An optimization method is proposed in order to reduce the total necessary cycle time and the algorithm redundancy consumed in real-time implementation. The effect of the overall codec performance is about 10 times better than the traditional coding method and meet the real-time requirements of BF532 + uClinux platform, and all pass the test with the ITU test vectors. Finally, the optimized G723.1 code is applied to the embedded voice gateway. The experiments show that the voice calls are good .

    • Image Encryption Based on Three-Dimensional Space

      2010, 19(8):87-91.

      Abstract (1946) HTML (0) PDF 4.72 M (3302) Comment (0) Favorites

      Abstract:To make the image secure and encryption faster, this paper proposes a simple three-dimensional chaotic mapping based on the idea that the image’s pixels can insert the adjoining pixels and the thought of stretching and folding the image. First of all, the algorithm changes the two-dimensional decimal matrix into a three-dimensional binary matrix. Second, based on the thought that the image’s pixels can insert the adjoining pixels, that is left mapping or right mapping, and the thought of stretching and folding the image, it changes the three-dimensional binary matrix into two-dimensional binary matrix. Third, the compound chaotic algorithm is used to scramble the decimal matrix, and the folding algorithm is used to change the two-dimensional binary matrix into threedimensional binary matrix. At last, it changes the three-dimensional binary matrix into a two-dimensional decimal matrix, and the decimal matrix is the encryption image. Experiments show that the image encryption is rapid and highly secure, and it can change the value of pixels element.

    • Integration Methodology of MDA and HLA System

      2010, 19(8):92-95.

      Abstract (1732) HTML (0) PDF 4.32 M (3421) Comment (0) Favorites

      Abstract:MDA is one of the major trends in software development. The intergration of MDA and HLA is helpful to overcome the inherent shortcomings of HLA, prolong the HLA system life and make the HLA system easier to adapt to new simulation demands. This paper researches on the integration methodology of MDA and HLA system without modifying or rebuilding the old HLA system. It tries to rationalize traditional MDA modeling process and proposes a methodology with which MDA can be applied to the old HLA system. At last, it successfully transformed MDA model to HLA model with XSLT.

    • Optimization of Flexible Neural Tree Based on Improved Particle Swarm

      2010, 19(8):96-99.

      Abstract (1695) HTML (0) PDF 4.30 M (3198) Comment (0) Favorites

      Abstract:The Neural Tree uses a tree structure coding. It has good predictive ability and function approximation capabilities. In the model, parameters are usually optimized with particle swarm optimization algorithm, but the traditional particle swarm algorithm has following shortcomings like being easily trapped in local optimal value, being slow and having low accuracy in convergence in the later period of the evolution. It affects the performance of neural tree. This paper applies a new improved particle swarm optimization algorithm to the neural tree model, and compares it with the traditional particle swarm algorithm in the application of flexible neural tree. It shows that the improved particle swarm algorithm has better convergence accuracy, thus to improve the performance of the flexible neural tree.

    • Design and Implementation of 3G Interactive Video Gateway

      2010, 19(8):100-103.

      Abstract (1521) HTML (0) PDF 4.45 M (2911) Comment (0) Favorites

      Abstract:Based on the introduction of the critical techniques of 3G interactive video gateway, this article presents a detailed design and implementation method of the gateway, and the test results in the read 3G network environment are provided. The test results show that this gateway runs stably with a high call completion rate, and will meet the mobile operators’ need of providing 3G video value-added service well.

    • Stability Design of Delay Network Control System Based on Internal Model Comtroi-PID Controller

      2010, 19(8):104-107.

      Abstract (1527) HTML (0) PDF 14.14 M (2273) Comment (0) Favorites

      Abstract:The performance of networked control systems becomes poor and unstable due to the stochastic delay. To solve the problem, the controller based on IMC–PID principle is designed for the second-order system. The controller guarantees the system’s performances in stability and its robustness. The example illustrates the effectiveness of the controller.

    • Hydraulic Servo System Based on Fuzzy Sliding Mode Algorithm

      2010, 19(8):108-111.

      Abstract (1709) HTML (0) PDF 4.23 M (2861) Comment (0) Favorites

      Abstract:To deal with the great interference from outside on hydraulic position servo system and its parameters’ time varying problem, a novel fuzzy sliding control algorithm is designed as the fuzzy control can soften the buffeting and the sliding control system will not be influenced by the parameters nor the interference from the outside. The simulation of time-varying parameters and the outside interference shows that the fuzzy sliding mode control method has a greater resistance against internal and external interference with time-varying parameters.

    • Adaptive Population of Gaussian Dynamic PSO Clustering Algorithm

      2010, 19(8):112-116.

      Abstract (1746) HTML (0) PDF 4.37 M (2999) Comment (0) Favorites

      Abstract:The key issue in Clustering is the definition of similarity between samples and the evaluation of pros and cons of clustering effects. PSO algorithm has drawn more attention from the majority of researchers for its preferable impact. This paper gives a new function that measures the effectiveness of the clustering algorithm and analyzes it thoroughly. In addition, from the topology of the PSO, an adaptive population of Gaussian dynamic PSO clustering algorithm is proposed based on the Gaussian dynamic algorithm. The experiment shows the measure function could effectively evaluate the pros and cons of clustering effects, and its corresponding algorithm has good clustering efficiency, better performance in the high-dimensional data.

    • Achieve of Topology-Aware P2P Relay Search Mechanism in SIP Terminal

      2010, 19(8):117-122.

      Abstract (1761) HTML (0) PDF 5.28 M (2516) Comment (0) Favorites

      Abstract:Because of the best-effort service of the Internet, the VoIP system has QoS problem. In order to improve QoS, most systems use application-layer routing mechanism. One of the key issues of the mechanism is how to search for relay node. Combining the P2P technology, this paper proposes a topology-aware based P2P relay search mechanism. First, in order to simulate the real Internet topology, a Cluster Overlay network was built. In the Cluster Overlay network, a topology-aware relay search algorithm was designed. Finally, this program was achieved in the SIP terminal. A simulation on the Cluster Overlay network and relay search mechanism was carried out on the NS2 platform. The results show that the similarity between the Cluster Overlay network and the real Internet topology is very high. The relay search algorithm can find the optimal relay node, thus to improve the quality of the path.

    • Flexible Process Control System of Hydropower Project Based on SOA

      2010, 19(8):123-127.

      Abstract (1523) HTML (0) PDF 4.11 M (2383) Comment (0) Favorites

      Abstract:In recent years, dynamic control of business process in the project management has attracted much attention. After an in-depth study of the service-oriented architecture and flexible process modeling techniques, the paper proposes the flexible process management architecture based on the SOA architecture. It constructs the flexible workflow management system model and applies it to the engineering project management system. In the end, it gives a concrete realization of the process control system.

    • Design and Implementation of the Network System Among Finance Bureau, Taxation, National Treasury and Bank Based on Security Mechanism

      2010, 19(8):128-132.

      Abstract (1612) HTML (0) PDF 4.03 M (3374) Comment (0) Favorites

      Abstract:The network system among Finance Bureau, Taxation, National Treasury and Bank is a large database application which links the finance bureau, taxation bureau, national treasury and commercial banks. It is important to eusure security and stability of the system. Considering the security risks of the information system, we put forward a few methods on the computer hardware, network transmission, database management systems and cryptography. These methods can enhance the security of the information system. At the same time, they guarantee the safety of the taxes and timely payment.

    • SOA-Based Call Center System

      2010, 19(8):133-136.

      Abstract (1888) HTML (0) PDF 5.84 M (3202) Comment (0) Favorites

      Abstract:An SOA-based Call Center System is proposed in this paper. On the basis of analyzing the model of service-oriented architecture SOA, we use the principle of Enterprise Service Bus ESB and Web Service technology to build the system, which achieves loosely coupled and modular to meet the more flexible business needs. And it has been applied to the actual construction of the telecommunications system.

    • Design and Implementation of EBAS Message Distribution Component

      2010, 19(8):137-140.

      Abstract (2035) HTML (0) PDF 3.89 M (3184) Comment (0) Favorites

      Abstract:This paper introduces the application server EBAS (EB Application Server) and makes an analysis of the shortcomings of its existence. Then, it designs a module of distributing the message components accordingly, to achieve distribution and load sharing of messages. It expounds the structure of news distribution and the processing logic, including the message distribution components interaction with external entities, the rules to safeguard the state guidelines for external entities and the strategy to distinguish restart from reconnect of external entities. EBAS with message distribution component is more reliable, supportive of online non-destructive upgrade and more suitable for the service model with large capacity and high concurrency.

    • Design and Implementation of Automatic Weather Station’s Monitoring and Data Query System in Running Status

      2010, 19(8):141-145.

      Abstract (2056) HTML (0) PDF 4.16 M (3287) Comment (0) Favorites

      Abstract:The development of a large number of stored procedure, function, and trigger scripts for the SQL SERVER data in the regional automatic weather station realizes the operation and the automatic data analysis and storage of daily, monthly and yearly statistics. Through accessing and making a comprehensive analysis of the information in central database, the sub-system can monitor and give SMS alarm in running status. It also provides services like query and download hourly, daily, monthly and yearly information. This system is a solution to such problems: failure to monitor equipment, to make data analysis, to download and access information.

    • Application of Workflow Management in the Discrete Manufacturing

      2010, 19(8):146-151.

      Abstract (1654) HTML (0) PDF 4.08 M (2872) Comment (0) Favorites

      Abstract:Through the enterprise business process modeling, business process management and integration workflow technology could standardize the business processes of the enterprise, optimize and restruct the business processes of the enterprise. It has of great of significance for enterprise to promotes the standardization of management and information. Windows Workflow Foundation provide a common framework for workflow-based application, through the research and study of WF framework. Combined with the applications in discrete manufacturing, the paper develops a workflow-based enterprise information systems, to improve the efficiency and the economic benefits of enterprises.

    • Design and Implementation of MRBT System Based on IIP

      2010, 19(8):152-154.

      Abstract (1643) HTML (0) PDF 4.17 M (2845) Comment (0) Favorites

      Abstract:This paper first introduces the realizing principle of Multimedia Ring Back Tone (MRBT) service based on IP Multimedia Subsystem(IMS). After analyzing the advantages and disadvantages of that implementation, it presents a faster and more economical implementation scheme of MRBT service based on Independent Intelligent Peripheral(IIP) platform. In the new schema, CN(Control Node) controls the MSIP(MultiMedia Server Intellectual Processor) board to implement the MRBT service via VIPS(Virtual Integrated Programmable Switch) proxy application. The system structure and the internal signal interactive process are also presented. Finally, it gives the brief implementation mechanism for improvement of IIP.

    • Design and Implementation of Drug Administration Information System

      2010, 19(8):155-158.

      Abstract (1685) HTML (0) PDF 4.21 M (2533) Comment (0) Favorites

      Abstract:Being lacking in effective means of monitoring the status of domestic drug sales enterprise, combined with the actual work demands of Food and Drug Administration of Yichun City, a Drug Administration Information System is designed. B/S and C/S structure are adopted and Microsoft Visual Basic .net platform is used. Real-time monitoring and supervision of drug sales are realized, and administration efficiency is improved. Drug administration paperless office is realized. The sudden vital events will be quickly dealt with. Management of enterprise is regulated. The practical problems in drug sales and drug supervision are effectively resolved. There is practical significance of the promotion of the drug administration.

    • Monitoring System of Tire Pressure in Mining Vehicle Based on Bluetooth

      2010, 19(8):159-163.

      Abstract (1797) HTML (0) PDF 4.15 M (3503) Comment (0) Favorites

      Abstract:Mine Vehicle Tire Pressure Monitoring is based on the non-destructive testing technology. It researches on the real-time vehicle tire pressure signal to understand the pressure changes of the mine vehicle tire, so as to gurantee the security for mine vehicles. This paper surveys the research of the tire pressure monitoring detection device, with LPC2132 as the core. Vehicles tire pressure sensor signal with the Bluetooth module is launched and compared. When it exceeds the security value, the alarm is started, and the vehicle CAN bus can read the data. On this basis, the paper designs a Bluetooth-based tire pressure monitoring device, whose hardware system is composed of the sensors, signal conditioning circuitry, Bluetooth module and alarm module. The software system is made up of the firmware, the display module and the data transceiver module, etc.

    • Image Definition Evaluation Method Based on Wavelet Scale Correlation

      2010, 19(8):164-167.

      Abstract (1609) HTML (0) PDF 4.57 M (3365) Comment (0) Favorites

      Abstract:A novel definition measurement based on correlation of the wavelet transform at adjacent scales is presented, which improves the sharpness function`s performance of unimodality and noise-immunity. It takes advantage of the property that wavelet coefficients magnitude of signals increase as scale increases and wavelet coefficients magnitude of noise decrease with increasing scale and calculates the multiplication of wavelet coefficients at the adjacent scales to construct the evaluation method. It is capable to amplify signals and suppress noise. Compared with traditional algorithms using Image Data acquired by CCD, the proposed method is found to be more robust and accurate to estimate the focusing extent.

    • Application of Self Organization Map to Classification of the Telecommunication Company

      2010, 19(8):168-172.

      Abstract (2712) HTML (0) PDF 4.12 M (3896) Comment (0) Favorites

      Abstract:This paper applies the SOM neural network to the customer segmentation of the telecommunication company, and compares the results of the K-means clustering algorithm and the SOM. The experiment indicates that the SOM is effective to classificate and the cluster effect is better when the data assemble is large, but it takes the training time. At the same time, it analyses the algorithm complexity and the errors of the two algorithms.

    • Image Edge Detection Based on Improved Artificial Fish-School Swarm Algorithm

      2010, 19(8):173-176.

      Abstract (2327) HTML (0) PDF 4.00 M (3296) Comment (0) Favorites

      Abstract:A method of image edge detection based on artificial fish swarm algorithm(AFSA)with chaos differential evolution algorithm(CDEA) is proposed in this paper. The method gets gradient matrix of grayscale image by first-order derivative, and search the maximum of image gradient with artificial fish. The detecting image edge could be achieved rapidly and accurately. The ability of search can be improved with adjustment factor in CDEA. It dynamically adjusts the vision, makes the fish jump out of the local extreme. The simulation shows that the proposed algorithm is feasible and effective.

    • Improved Watershed Algorithm for Bone Removal from CTA

      2010, 19(8):177-181.

      Abstract (1933) HTML (0) PDF 6.32 M (3644) Comment (0) Favorites

      Abstract:In this paper, we present an improved interactive watershed algorithm for bone removal from CTA (Computed Tomography Angiography). The improved watershed algorithm builds upon the sorting step of the fast immersion-based watershed transform. After the sorting step, each element is processed with the respect to its neighborhood in the specified order, and the resulting basins are organized in a tree structure. After that, the tree partitioning and basin merging are controlled by one global parameter called merging value and some markers are given by users to suppresses the over segmentation. The experiment indicates that the algorithm prevents the over segmentation effectively, and removes the bone structure excellently.

    • Application of Binary Decision Diagram BDD to the Network Call Fault Analysis

      2010, 19(8):182-186.

      Abstract (1923) HTML (0) PDF 4.94 M (3330) Comment (0) Favorites

      Abstract:With the growing problems of mobile network calls, it is necessary to create a fault tree analysis (FTA) model. Using the BDD method, this paper analyses each basic event's structural importance, probability importance and critical importance. The order of the basic event of fault tree has a direct impact on the number of BDD nodes, as well as the structural importance and probability importance degree. With the neighbor-event-first method, the number of BDD nodes and the important degree of impact can be minimized. The importance degree with BDD method value is closer to calculate than the traditional FTA method. And the calculation is more efficient.

    • Design and Implementation of Guangxi Meteorological Operational Based on NTP Time-Synchronization

      2010, 19(8):187-190.

      Abstract (1626) HTML (0) PDF 3.99 M (3344) Comment (0) Favorites

      Abstract:In the existing meteorological operational system, the synchronization of the reception and sending of all kinds of meteorology data plays an important role in the meteorological operations and scientific research, and the clock synchronization of the whole meteorological network is even more urgent in need. The basic principle, the work model and the architecture of the Network Time Protocol (NTP) have been introduced in this paper, and a Guangxi Meteorological Operational clock synchronization network which is build in the LAN, operated under the Linux sever and acted as a lower level of the clock synchronization network of GuangZhou Regional Center has proved to be effective in practice.

    • Prediction of Financial Distress for Listed Companies Based on Wavelet Neural Network

      2010, 19(8):191-194.

      Abstract (2226) HTML (0) PDF 5.50 M (3151) Comment (0) Favorites

      Abstract:A prediction model of financial distress based on wavelet neural network for listed companies is proposed. The method of selecting financial ratios of companies is analyzed. The self-adaptive learning rate and momentum coefficient are used to avoid the local minimum point in the training process of wavelet neural network. The prediction results show that compared with multiple discriminate analysis, and Logit and Probit models, the prediction with this method is more accurate and type I and type II errors are reduced significantly.

    • Improved Image Retrieval of Extraction Salient Points

      2010, 19(8):195-198.

      Abstract (1666) HTML (0) PDF 4.87 M (2362) Comment (0) Favorites

      Abstract:In ROI-based image retrieval, salient point is an important point feature. The classic extraction algorithm of salient points-SPARSE(Salient Points Auto-Reduction using Segmentation) is more complex. This paper presents an improved algorithm, using dynamic threshold segmentation algorithm in the between-class variance and within-class variance of the image segmentation. And then it uses three color features and three texture features of the segmentation to point out the significant features of labeling. Finally it makes similarity measurement with Euclidean distance of feature vectors of salient points. Experimental results show that the improved algorithm’s extraction of salient points for image retrieval has better search results.

    • Approach for Index Configuration of Inheritance Hierarchy in Object-Oriented Database

      2010, 19(8):199-203.

      Abstract (2248) HTML (0) PDF 4.15 M (3458) Comment (0) Favorites

      Abstract:How to balance the retrieval performance, maintenance cost and implementation complexity becomes one of the key elements in the research of OODB indexing. This paper proposes an approach for the indexing configuration of inheritance hierarchy. It estimates retrieval cost, storage cost and updates cost for all kinds of index configurations through cost model, and chooses optimal index configuration based on real database usage. The accuracy of this method is tested through experiments, and the performance of this method is compared with other indexing scheme. The results show that the proposed method can provide optimal indexing for OODB.

    • Data Preprocessing Method for Web Usage Mining

      2010, 19(8):204-207.

      Abstract (1810) HTML (0) PDF 4.00 M (3430) Comment (0) Favorites

      Abstract:Web log mining is an important research direction about web mining. Data preprocessing is a key technology in web log mining. The article describes the preprocessing of mining logs in detail. Data preprocessing includes data clean, identifying user, recognizing session, cleaning up the frame of the page and supplementing path. After the user identification, the frame of the page reduces the efficiency of data mining. The number of invalid page can be significantly reduced through filtering the frame of page.

    • Password Design Method

      2010, 19(8):208-211.

      Abstract (2093) HTML (0) PDF 3.98 M (3190) Comment (0) Favorites

      Abstract:Password is the main protection of computer safety, and the safeguard for different accounts. This paper sets up a standard to create strong password, protect these passwords and change time. It discusses password safety, protection criterion and conformation method. It studies password strategies for personal computer, work correlative system and network.

    • A Fast Adaptive Algorithm for Image Enhancement

      2010, 19(8):212-215.

      Abstract (2127) HTML (0) PDF 4.79 M (4450) Comment (0) Favorites

      Abstract:A fast and adaptive algorithm for image enhancement is proposed. The algorithm first filters the image with Gaussian smoothing filter, and then offsets the image pixel values on the basis of global and local information. Finally, the offset pixel values and non-linear function is used to transform the image, thus enhancing the details of the image. By transforming the RGB image to HSV space, the method is extended to the color image enhancement. Experimental results demonstrate that the proposed method can efficiently improve image quality, and can also self-adaptively adjust the enhancement according to the environment.

    • Search Method in P2P Considering Search Behavior and Content of Nodes

      2010, 19(8):216-220.

      Abstract (1895) HTML (0) PDF 4.16 M (2522) Comment (0) Favorites

      Abstract:There are deficiencies of the interest-based driven P2P search method in discovering interest of node and expanding interest in the context of semantic search. This paper improves the Social-P2P algorithm and puts forward a search method considering the search behavior and the content of nodes. The method introduces the concept lattice theory. According to the node content and user search behavior, a friend list is established, then formal context is etracted from the triend list to build a concept lattice, and the interest domain. It searches for messages within the query concept lattice, cuts down the search path and reduces the search message. Concepts which have deflection order expands the context of semantic query messages and enhance the search accuracy. Experimental results indicate that compared with the traditional flooding method, Social-P2P search method has better recall race and accuracy.

    • Security Transmission of Smart Home Wireless Data

      2010, 19(8):221-224.

      Abstract (2205) HTML (0) PDF 4.13 M (3864) Comment (0) Favorites

      Abstract:This paper studies the security transmission of Smart Home wireless data based on ZigBee. It briefly introduces ZigBee security structure and encryption algorithm mode, and analyzes the characteristics of ZigBee security service and the mode of data transmission. In view of smart home’s characteristics, it sets up a security network. Finally, it achieves data security transmission by encrypting, thus ensuring the confidentiality of smart home data.

    • Optimization Techniques for Query on Encrypted Databases

      2010, 19(8):225-228.

      Abstract (1956) HTML (0) PDF 4.00 M (3564) Comment (0) Favorites

      Abstract:In order to solve the problem of querying inefficiently on encrypted databases, some solutions are proposed in this paper based on practical application of database encryption techniques. Through setting marks for encrypted numerical data and creating index text in external memory, the range of querying is reduced, then the efficiency is improved. Finally, some tests are performed to validate the solutions.

    • Word Segment Based on Suffix Array

      2010, 19(8):229-230.

      Abstract (1783) HTML (0) PDF 4.00 M (3193) Comment (0) Favorites

      Abstract:Chinese word segmentation technology is the basis of machine translation, classification, search engines, as well as information retrieval. But the Internet emerging new words have seriously affected the performance of word segmentation. To improve the recognition rate of new words, suffix array is used in this paper, and the number of length of common prefix is calculated. The candidates on their words are filtered out by the threshold. Experimental results show that the new word recognition method has advantages.

    • Text Information Hiding Algorithm Based on Dot-Matrix Character Code

      2010, 19(8):231-233.

      Abstract (1842) HTML (0) PDF 4.15 M (2865) Comment (0) Favorites

      Abstract:To address the problem of copyright protection for electronic document content and the poor robustness of watermarking algorithm based on text information, a text information hiding algorithm based on dot-matrix character code is proposed. The hiding information is firstly coded by dot-matrix, and the character has the image characteristic property. Then the coded information is encrypted by a two-value chaotic sequence generated by Logistic system. To hide the information, a slight modification of color is made based on HVS and the encrypted information. Experiments have shown that the algorithm has a better watermarking robustness and better practicability for editor attacking of text concent.

    • FPGA Low Power Design Using Pipeline

      2010, 19(8):234-237.

      Abstract (2443) HTML (0) PDF 4.06 M (4424) Comment (0) Favorites

      Abstract:By adding new registers in combinational logic, pipeline can reduce the generation and propagation of glitch. This paper compares the power dissipation of pipeline design and non-pipeline design, using low transition probability signals, random transition probability signals and high transition probability signals. It comes to the conclusion that pipeline can reduce power dissipation in high transition probability signals design, but for low transition probability signals design, pipeline may consume more power, and its reason is analyzed.

    • UNIX Forensic Analysis Method

      2010, 19(8):238-241.

      Abstract (1734) HTML (0) PDF 3.95 M (3729) Comment (0) Favorites

      Abstract:UNIX is one of the most popular operating systems, it has great practical significance to research the methodology of UNIX forensic analysis. This paper firstly introduces the method to capture the volatile data from UNIX systems, then introduces the concrete steps and method of UNIX forensic analysis.

    • Fault Diagnosis of Power Transformer Based on Fuzzy PSO Algorithm

      2010, 19(8):242-246.

      Abstract (2130) HTML (0) PDF 4.09 M (2616) Comment (0) Favorites

      Abstract:A fuzzy particle swarm optimization (PSO) method is applied to fault diagnosis of power transformer for the first time. Content of five diagnostic gases dissolved in oil obtained by dissolved gas analysis (DGA) is preprocessed through a special data processing, and six features are extracted for fuzzy PSO algorithm. Then a new objective function is proposed for fuzzy clustering algorithm. Based on the function, PSO algorithm is trained for get the optimized clustering centers of all fault type. With the optimized clustering centers, the distantance of the testing sample to centers are calculated, and then the the membership degree is abtained. Finally, the four fault types of transformer are identified. The algorithms perform well in the testing, and the correct ratios of fault diagnosis reach an average of 92%.

    • Design and Implementation of Single Sign-On Solution for System Domino Based on SUN AM

      2010, 19(8):247-250.

      Abstract (1827) HTML (0) PDF 1.19 M (4076) Comment (0) Favorites

      Abstract:The company of SUN and IBM do not have a good enterprise solution for SSO based on sun am for Domino system. The solution is currently achieved through the password. So, if intercepted by a user’s password, it will result in incalculable damage, and will not conform to the concept of SSO. The AM SSO solution for Domino is designed after analyzing the technology of domino’s DSAPI, the generation mechanism of domino session, and the AM SSO process. It has solved the technology bottlenecks of SSO based on SUN for domino system, and provided a enterprise solution for enterprise business Integration

    • Expansion of Interfaces Module Based on Modbus

      2010, 19(8):251-253.

      Abstract (2005) HTML (0) PDF 3.78 M (3658) Comment (0) Favorites

      Abstract:The method of interfaces expansion based on Modbus and the STC5410AD MCU are introduced, which is suitable for the occasions when lots of interfaces need to be expanded. The design of system would be efficient and flexible. Furthermore, the concrete method of hardware implementation and Modbus slave communication program are presented.

    • Design and Implementation of an Asynchronous Message Bus Based on ActiveMQ

      2010, 19(8):254-257.

      Abstract (4281) HTML (0) PDF 4.97 M (12469) Comment (0) Favorites

      Abstract:Message-Oriented Middleware (MOM) is an enterprise middleware technology, which is designed to solve the communication and queuing problems in heterogeneous distributed system. ActiveMQ is a cross-platform and cross-language implement ation of MOM. Firstly, this paper introduces its features and makes a back-to-back testing in stability and performance. Then, a bus controller module is added to it and the common asynchronous message bus is built. It is proved that the message bus can improve the development efficiency and processing performance of mobile value-added business.

    • Taxonomy of Web Service Fault

      2010, 19(8):258-263.

      Abstract (2699) HTML (0) PDF 1.34 M (4289) Comment (0) Favorites

      Abstract:The taxonomy of Web Service fault is the premise of effective Web service fault diagnosis. Based on the analysis of Web service fault management flow, a new fault taxonomy for web service according to types of service and procedure of service is proposed, and a Web service fault tree is composed. A Web service fault matrix based on the relationship between fault and its symptom is also constructed, which could help diagnose the Web service fault quickly and correctly.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063