• Volume 19,Issue 9,2010 Table of Contents
    Select All
    Display Type: |
    • Research and Realization of a Web Information Extraction and Knowledge Presentation System

      2010, 19(9):1-4.

      Abstract (2034) HTML (0) PDF 715.45 K (3803) Comment (0) Favorites

      Abstract:The Web Information Extraction and Knowledge Presentation System is proposed to extract information from data intensive web pages. It downloads dynamic web pages, based on a knowledge database, changes them to XML documents after preprocessing, finds repeated patterns from them, by using a PAT-array based Pattern Discovery Algorithm, recognizes their data display structure models, automatically based on the repeated patterns and an ontology-based keyword library, and then extracts the data and stores them in the knowledge database with the object-relational mapping technology of XML. Through these steps, web data is extracted automatically, and the knowledge database is also expanded automatically. Experiments on the traffic information auto-extraction and mixed traffic travel schemes auto-creation system showed that the system has high precision and is adaptive to web pages in different domains with different structures.

    • Design and Application of Ship Monitoring and Emergency System Using Google Earth

      2010, 19(9):5-9.

      Abstract (1769) HTML (0) PDF 633.92 K (4323) Comment (0) Favorites

      Abstract:High-resolution satellite geographical images, a 3D virtual environment, and a friendly man-machine interface in Google Earth provide the exploitation of information resources for Ship Monitoring and Emergency System. On the basis of research and development on KML language and COM API of Google Earth, a hierarchical design of a ship monitor, information and emergency system is created, and the whole level in Ship Management Information System is improved. The system is applied to improve the fishery emergency project in Zhejiang Province.

    • Workflow Engine Designed for Consolidated Supervision of Safety Production System

      2010, 19(9):10-14.

      Abstract (1727) HTML (0) PDF 595.31 K (2846) Comment (0) Favorites

      Abstract:Workflow technology is needed to implement many key applications in Consolidated Supervision of Safety Production system. Using the workflow technology, an embedded workflow engine is designed for Shenyang Consolidated Supervision of Production Safety System. This thesis gives an introduction to the Architecture of the application system and the workflow engine and analyzes the design of the engine. The workflow engine shortens the developmental cycle of the key application significantly. After the application system based the workflow engine is deployed, it has improved the efficiency of business greatly displaying great results.

    • Application of RIA System Integration Based on Web Services

      2010, 19(9):15-18.

      Abstract (2111) HTML (0) PDF 740.38 K (3744) Comment (0) Favorites

      Abstract:This paper designs Rich Internet Application (RIA) system integration that combines Flex and Web services. Application systems business processes are encapsulated by standard Web services. Discovery and sharing of enterprise data resources can be achieved by using the publishing and discovering mechanism of services. Transmission messages are digital signatures and encryptions by using the encryption algorithm. The unified rich client user interface and high interactivity and response of the client and rich user experience are provided by using Flex. System performance, which are improved by using modules, navigation, components of dynamic load, and components of reuse. Feasibility and rationality of the built RIA integration are verified using Flex and Web services combined with the J2EE.

    • Learning Resource Management System Based on Extended Electronic Learning Object Structure

      2010, 19(9):19-24.

      Abstract (1926) HTML (0) PDF 745.10 K (3449) Comment (0) Favorites

      Abstract:This paper presents a framework to construct a learning resource management system based on an extended electronic learning object structure. This framework makes the comparison between various learning objects and enhances the reuse and management efficiency by modeling on specific domain and extending the structure of the electronic learning object.

    • Design and Implementation of Resource List Service Model in Presence Service

      2010, 19(9):25-30.

      Abstract (2410) HTML (0) PDF 700.56 K (3520) Comment (0) Favorites

      Abstract:With an increasing number of friends, Peer to Peer subscription in Presence causes a great dataflow and many other issues. The Resource List Service is a very good approach to solve this problem by subscribing to the list. This paper proposes a framework for the implementation of Resource List Service Model which refers to SIMPLE standards. Based on this, the RLS as well as its descriptions are designed. Upon testing the RLS in WAN, the experimental results show that RLS can correctly complete the subscriptions of a list and provide an excellent solution for the frequent subscription issues.

    • LWD Data Remote Transmission System Based on GPRS

      2010, 19(9):31-34.

      Abstract (1755) HTML (0) PDF 622.77 K (3915) Comment (0) Favorites

      Abstract:This paper designs the scheme of LWD (Logging With Drilling) Data Remote Transmission System based on GPRS. First, the paper introduces the GPRS technology in the remote transmission system application, and then describes system components, business processes, implementation process of LWD Data Remote Transmission System Based on GPRS in detail, and the application effect of LWD Data Remote Transmission System Based on GPRS.

    • Technology of Rural Socio-Economic Statistical System Based on GIS

      2010, 19(9):35-38.

      Abstract (1657) HTML (0) PDF 770.53 K (3918) Comment (0) Favorites

      Abstract:With the rapid development of rural socio-economics in China, how to make an in-depth analysis on the volume of multi-source statistical data to enhance decision-making for the government has become a major problem. In this paper, a set of GIS spatial analysis methods of rural social-economic data are proposed and researched and spatial data and statistical data are integrated to create a comprehensive spatial database to enhance data sharing with the existent e-government system. On this basis, a GIS based rural socio-economic statistical system is constructed using COM pattern and is put into effect in the National Bureau of Statistics of China. It has been proven that GIS technology applied in rural statistics department, which provides an information platform that manages and analyzes statistical data and spatial data, is feasible and increases the efficiency proces.

    • Analysis and Design of Supplier Selection System Based on MAS

      2010, 19(9):39-43.

      Abstract (1656) HTML (0) PDF 755.69 K (4177) Comment (0) Favorites

      Abstract:Based on a review of supply chain management and intelligent agent theory, this paper establishes a multi-agent technology as a tool for solving strategic selection of supply chain management. It also constructs a supply chain framework based on MAS. Secondly, emphasis has been put on the combination and work content of data-agents, dynamic forecast-agents and decision support-agents. Moreover the operation mechanisms of supply chain framework and vendor status of framework are also discussed. Furthermore, this paper makes use of data-mining technology and genetic algorithms to optimize system learning ability as well as strengthen the self-determination and sociality of the system to find the appropriate vendors.

    • Design and Implementation of SEDA-Based Enterprise Service Bus

      2010, 19(9):44-48.

      Abstract (1792) HTML (0) PDF 710.89 K (4277) Comment (0) Favorites

      Abstract:The Enterprise Service Bus (ESB) is the infrastructure for the implementing of SOA (Service Oriented Architecture). The existing enterprise service bus has a serious decline in the performance in a high-concurrent situation. To address this issue, this paper analyses the principles of SEDA (Staged Event-Driven Architecture) model and the ESB functional requirements. The SEDA model is applied to the design of ESB, and a SEDA-based Enterprise Service bus is designed and implemented. According to the test and the analysis of the SEDA-based ESB, the SEDA-based ESB performs better in the case of high-concurrency.

    • RBAC Model on Dynamically Adjustable Trust Degree

      2010, 19(9):49-54.

      Abstract (1716) HTML (0) PDF 595.80 K (3654) Comment (0) Favorites

      Abstract:The disclosure of user identification password can endanger information data in a role-based access control (RBAC) policy. In order to achieve access control action for the users, a RBAC policy on dynamically adjustable trust degree is proposed. The policy combines a trusted computing theory with access control policy. Firstly, an analytical hierarchy process is adopted to evaluate the trust degree of the system. Then, a dynamical regulation method of a trust degree is introduced to make the user’s trust degree a foundation of the system while assigning user's roles. This model is applied to a virtual database experiment. The result shows that through the implementation of the trusted access control, it is possible to effectively improve the security of database.

    • Improved Immune-Based Anomaly Algorithm with Variable-Size Detector

      2010, 19(9):55-59.

      Abstract (2081) HTML (0) PDF 1.24 M (3792) Comment (0) Favorites

      Abstract:Previous research has indicated there are some defects in the traditional immune-based algorithm of detecting abnormity. Two common defects of this are as follows: the detectors created by the algorithm cannot cover all Nonself-space, and the number of the detectors in the algorithm is too big to keep the detectors from covering each other. These defects are the main reasons why the algorithm is not efficient. In this paper, an algorithm, which can deal with mixed-type data and produce detectors in different sizes to improve the capacity of covering Nonself-space is proposed. The simulated and compared experiments show that this algorithm can preferably process mixed-type data and effectively improve the efficiency of generating detectors .

    • Application of the Technology of XML-Based Dynamic Form Rapid Generation

      2010, 19(9):60-63.

      Abstract (2933) HTML (0) PDF 638.62 K (5005) Comment (0) Favorites

      Abstract:The XML-Based dynamic forms designer can modify the forms dynamic management and the database. The dynamic form designer harnesses the power of writing by constructing the data items into XML, saving the XML into a big field. The dynamic form designer harnesses the power of reading by searching the big field XML, reading and resolving the XML, and displaying the data on the output device.

    • Design and Implementation of Grid Software SCE Based on Command Client

      2010, 19(9):64-68.

      Abstract (1914) HTML (0) PDF 723.02 K (3113) Comment (0) Favorites

      Abstract:How to make use of computing resource effectively and conveniently is one of urgent topics in grid computing. In order to solve the problem, this paper introduces Super Computing Environment (SCE) based on Linux command line. SCE can do job process such as submission, compiling, query, download file and so on. It has characteristics of deploy simple configuration and high extensibility. Through shielding the bottom of heterogeneous computing nodes, it can be used in more grid computing environments.

    • Design and Implementation of SIP Agent in IMS Client Based on OSGi

      2010, 19(9):69-72.

      Abstract (1711) HTML (0) PDF 769.56 K (3248) Comment (0) Favorites

      Abstract:This paper proposes the design and implementation of Sip Agent, which meet IMS(IP Multimedia Subsystem) specifications based on OSGi(Open Services Gateway Initiative). It uses the Equinox, which implements OSGi specification as the core framework, combined with JAIN-SIP, as the underlying protocol stack, and can meet most of the IMS application. This paper includes the explanation of the logical structure, the main module's structure, the introduction of key technology, and the development of a call procedure using Sip Agent, to prove its availability. The applications, which is built on Sip Agent presented in this paper, has low coupling, high cohesion, easily extensible, high-performance features, and it can build SIP-related application quickly and easily.

    • Sleep-Mode Algorithm in IEEE 802.16e Based on Self-Similar Stream

      2010, 19(9):73-76.

      Abstract (1769) HTML (0) PDF 725.78 K (3346) Comment (0) Favorites

      Abstract:In order to reduce the power consumption of a mobile station, IEEE802.16e introduces the sleep mode, in which a mobile station stops its normal service. Network arrivals are often modeled as a Poisson process for analytic simplicity,but recent traffic Studies have shown that data packet inter-arrivals including Pareto distribution, are not exponentially distributed, but are heavy-tailed distributed, including Pareto distribution. In order to balance the average energy consumption and the average waiting time, this paper proposes a power function decrease algorithm for sleep mode based on Pareto distribution. Experiments and theoretical analysis show that the algorithm has a lower average energy consumption and shorter average waiting time than the algorithm proposed in IEEE 802.16e standard.

    • 3D Vessel System Segmentation of Liver

      2010, 19(9):77-80.

      Abstract (1887) HTML (0) PDF 956.30 K (3430) Comment (0) Favorites

      Abstract:A method of 3D liver vessel system segmentation is presented. Firstly, a statistic threshold is used to segment vessel roughly. Secondly, a vas tree search method based on spatial connected area is presented to remove noise. In the end, linear curve evolution is used to smooth the edge of vascular image. Experiments show it’s a useable method to extract liver vessel systems.

    • Nonlinear Study on Web Data Anomaly Recognition

      2010, 19(9):81-83.

      Abstract (1942) HTML (0) PDF 835.12 K (3403) Comment (0) Favorites

      Abstract:Because the number of web pages is sharply increasing, information searching and excavation have drawn people's increasing attention. However, besides some thematic information, there is also inappropriate noise information on the Web pages, so Web purification technology has become a concern for more and more researchers, and various algorithms have been proposed. This paper refers to the application of artificial immune system in the computer network intrusion detection and proposes a Web page de-noising algorithm based on the AIS. At the same time, this paper does non-linear study on the data anomaly recognition of the Web.

    • Implementation of Cloud Computing Based on ITIL

      2010, 19(9):84-87.

      Abstract (1873) HTML (0) PDF 1.05 M (4058) Comment (0) Favorites

      Abstract:With the development of information technology, enterprises are facing a serious problem--IT manage- ment. To solve this problem, this paper introduces the principles of cloud computing and ITIL, and then proposes the implementation of cloud computing based on the ITIL.

    • Single Sign-On for Heterogeneous Applications

      2010, 19(9):88-91.

      Abstract (2402) HTML (0) PDF 960.57 K (6351) Comment (0) Favorites

      Abstract:Traditional Single Sign-On solution is not suitable for the heterogeneous applications since it’s generally for web portals and other distributed web applications, there isn’t a suitable solution for the disparate applications in which both C/S and B/S mode exist, and whose server sides are not allowed to modify. This paper introduces the characteristic of the traditional single sign-on solution CAS, combines it with the assistant technology in B/S and C/S mode that are Windows message mechanism and browser plug-in technology, then proposes a new sign-on model for heterogeneous applications that is based on assistant technology and authentication data centralized managed.

    • Triangulation Mesh Reconstruction for Heart Surface Slice Data

      2010, 19(9):92-96.

      Abstract (1586) HTML (0) PDF 1.48 M (3258) Comment (0) Favorites

      Abstract:In this paper, a general method of heart surface triangulation mesh reconstruction is studied and designed for different contour data formats from various contour extraction methods in the heart slice images process. Through utilizing the basic characteristics of the heart shape and slice data, both Cosine rotating and postponed sorting are combined with the three-subdivisions. The recovering of the relationship among contour points and reconstructing the triangular mesh is implemented simultaneously. This paper describes the basic principle, implementation strategy and algorithm design. The experiment verifies the effectiveness of the proposed approach.

    • Minimum Vertex Cover Algorithm for Solving the Planar Graph

      2010, 19(9):97-100.

      Abstract (2771) HTML (0) PDF 867.01 K (5630) Comment (0) Favorites

      Abstract:The minimum vertex cover problem is a classical problem in combinatorial optimization and has a wide range of values in real life. The problem of the minimum vertex cover and the maximum independent set is actually the equivalence problem in the graph theory. In this paper, the maximum independent set angle and design a maximum independent set algorithm for solving the planar graph is formed, according to characteristics of the maximum independent set, and then the minimum vertex cover is obtained. After many experiments, the results show adequately that the algorithm presented in the thesis is correct and effective.

    • Simulation Performance Analysis of Delay Jitter for Self-Similar Traffic

      2010, 19(9):101-104.

      Abstract (1787) HTML (0) PDF 921.96 K (3637) Comment (0) Favorites

      Abstract:The focus of current research is how Self-similarity impacts network performance. A queuing delay jitter model, based on FBM for self-similar network, is proposed and self-similar traffic as input on the impact of the delay jitter of queuing system is discussed, which is important. Theory fractional traffic and actual measured traces are used to simulate experiment. Simulation confirms the correctness and efficiency of these results. The experimental results demonstrate that the degree of the long-range dependence for the self-similar traffic has quite a different impact on the delay jitter of queuing system, especially on the condition of a large buffer size. The state changes of long-range dependence is related to the parameters of queuing system. These findings are new, which is an important reference for the performance evaluation of real-time network .

    • Implementation of Matrix Keyboard Input in Embedded Linux and Qtopia

      2010, 19(9):105-109.

      Abstract (1782) HTML (0) PDF 935.02 K (4027) Comment (0) Favorites

      Abstract:This paper introduces an input method in detail based on embedded Linux and Qtopia matrix keyboard. By reimplementing the Qt event filter, combined with signal and slot mechanism to deal with the use of two-tier status, it is possible to use the definition of the effective input to simplify the input process, reduce the number of pressing button, and enhance the efficiency of input. At the same time, with the use of Qtopia graphical display, the input interface is clearer and more applicable to the embedded device.

    • RFID Security Authentication Protocol in the Library

      2010, 19(9):110-114.

      Abstract (1746) HTML (0) PDF 981.08 K (3251) Comment (0) Favorites

      Abstract:This paper analyzes the security problems of RFID technology, builds the security model of RFID in library, designs a security protocol PA-Lock, which ensures the security of library RFID system. This paper solves the privacy and mutual authentication between Tag and Tag reader. Lastly, this paper analyzes the security and performance of PA-Lock protocol and compares it with other protocols to prove that PA-Lock protocol is secure and efficient.

    • Design and Implementation of Pattern Matching Engine

      2010, 19(9):115-119.

      Abstract (1569) HTML (0) PDF 504.10 K (3880) Comment (0) Favorites

      Abstract:Network Intrusion Prevention System (NIPS) is one of the effective tools in providing network security. The core computing function of an NIPS is Pattern Matching Engine (PME), which is used to search pattern data of a known network intrusion from network packages. In current NIPS, PME consumes a significant portion of the computing time. PME is a computing consuming application, requiring high level performance from the system’s base computing power. This article proposes a parallel pattern matching approach and maps the computation onto the existing multi-core CPU by fully utilizing the computing power of the base hardware structure of the prevention system. The implementation of the proposed approach on IBM System x3455 server shows that it provides a typical processing speed of 17.2 Gbps with a capacity of 50,000 pattern signatures, which has exceeded the results of all current documentation, including FPGA, ASIC, network CPU, and GPU.

    • Design and Implementation of Amblyopia Visual Functions Examination System Based on Hybrid Programming Between Matlab and VC

      2010, 19(9):120-123.

      Abstract (1729) HTML (0) PDF 756.54 K (3943) Comment (0) Favorites

      Abstract:Amblyopia is a developmental disorder of the visual system. There are about 2.8% of people in China who have amblyopic disease. The examinations of visual functions for amblyopia can help doctors make better treatment for patients. In this paper, a system with a psychophysics method is introduced to examine different visual functions of amblyopia. For the software system, MFC is used in the user interface and the overall framework. The Psychophysics Toolbox based on Matlab is adopted to realize the model of visual functions examination. SQL Server is used to generate back-end database. Meanwhile, a hybrid programming system between VC++ and Matlab is adopted to combine the entire system into one. For the hardware of the system, a Vedio-Switcher is used to improve the display accuracy to meet the special requirements of the vision test. The results show that this system has good stability and can meet the needs of visual functions examination for amblyopia.

    • Research and Implementation of Campus Ramble System Based on VR-Platform

      2010, 19(9):124-127.

      Abstract (1612) HTML (0) PDF 613.11 K (4722) Comment (0) Favorites

      Abstract:Most solutions in a roaming system building are using three-dimensional graphics library drawing geometric structure to produce a target object. Although this technology has already been developed proficiently, the process is complex and time-consuming. Because of the inadequacies of this technique, a solution is proposed in this paper, and thus, the three-dimensional interactive ramble system of Southwest University of Science and Technology is established, based on VR-Platform by using 3ds Max modelling and scene pictures with auxiliary, which has not only the function of a three-dimensional navigational system, but can also display campus in a multi-position combined with animation.

    • Design and Implementation of Universal Permission Management Based on Digital Certificate

      2010, 19(9):128-133.

      Abstract (2256) HTML (0) PDF 800.54 K (3873) Comment (0) Favorites

      Abstract:For the trivial design and the complexity of the permission management in digital certificate-based system development, human resources are being used unwisely in writing codes of various business functions.To solve this problem, a kind of general and digital certificate-based permission management module, using function vector code, is successfully designed through analyzing and comparing the differences between digital certificate-based systems and the traditional username/password system. This kind of module can be embedded in various digital certificate-based systems by replacing the verifying module without rewriting the code, which makes the separation of permission control and transaction possible. This strategy has been tested and verified through different systems and has achieved good performance.

    • Design and Implementation of Distributed Oracle Monitor System Based on CACTI

      2010, 19(9):134-137.

      Abstract (2237) HTML (0) PDF 843.22 K (4722) Comment (0) Favorites

      Abstract:In order to guarantee multiple ORACLE database system initiatively, a distributed guarantee warning system is proposed based on CACTI. By using the “one-manager-multi-agent” mode, CACTI adds agent model to ORACLE database server to enable continous centralized monitoring on a distributed ORACLE database. Multi-level and flexible monitoring strategies are realized by setting different granularity on CACTI for various ORACLE databases. The system alerts abnormal states of mail and message in a database. The experimental results and the practical application in model projects verify the effectiveness of the system.

    • Design and Implementation of Software Fax Modem Based on Blackfin

      2010, 19(9):138-142.

      Abstract (2055) HTML (0) PDF 918.84 K (3085) Comment (0) Favorites

      Abstract:It is an inevitable trend that the fax function is integrated into the traditional IP voice gateway. This paper analyzes the IP fax technology and development situation and proposes a project that adds a software fax module to the gateway without any change of the hardware, so that the gateway can be able to store and forward faxes. The paper gives the fax module’s design and implementation based on Blackfin+uClinux platform. After testing, the voice gateway can successfully send and receive faxes.

    • Design of Generator Performance Testing Platform Based on Virtual Instrument

      2010, 19(9):143-146.

      Abstract (2344) HTML (0) PDF 766.93 K (4342) Comment (0) Favorites

      Abstract:The purpose of this puper is to adopt Virtual instrument technology to collect and handle the alternator property parameter. It discusses the data acquisition system,introduces the mehtod of the signal acquired of sensor in a realistic situation with an economical suitable principle, and selects the fitting and proper data acquisition card. Lastly, by using LabVIEW of the National Insturments Co,it acquires and displays wave forms of EFI engine sensors. The data acquisition system designed by LabVIEW has stable perofmrance, high accuracy, and a user-friendly interface. It fully embodies the advantages of a virtual insturment.

    • Clustering-Based Email Filtering Method with Hazy Category

      2010, 19(9):147-150.

      Abstract (2250) HTML (0) PDF 424.73 K (4159) Comment (0) Favorites

      Abstract:Presently, a variety of rule-based classification methods in e-mail filtering obtain good results. In the training of e-mail filtering, the training set has the notion that some e-mail messages will be sent to the hazy category. Extracting these e-mails from training set will have a noticeable increase in the results of classification. Therefore, a clustering-based filtering method is proposed in this paper. The common features of the hazy-category email include cluster the training set. Experiments demonstrate that the method has better performance on the appraisal standard than that of a simple rule-based classification algorithm.

    • Fast Moving Targets Segmentation of Traffic Video Based on Between-Class Variance Method

      2010, 19(9):151-154.

      Abstract (1751) HTML (0) PDF 512.27 K (3546) Comment (0) Favorites

      Abstract:Moving object segmention in traffic video requires a large amount of information and a long computational time. A new fast moving object Segmentation method is proposed. Two appropriate images are sclected. Then, the absolute value of subtraction is taken. This paper proceeds to block images and decides which block images should be given up. The remaining sub-blocks for otsu are chosen, and the moving objects are segmented. Experimental result shows that this algorithm can greatly improve the speed of moving object segmentation.

    • Segmentation Algorithm of License Plate Characters Based on Mathematical Morphology Edge Detection

      2010, 19(9):155-158.

      Abstract (2844) HTML (0) PDF 616.28 K (4663) Comment (0) Favorites

      Abstract:Vehicle-license-plate character segmentation is one of the most important steps in license plate recognition. Traditional methods always need high quality original images and thus, will inevitably affect the ultimate recognition rate. In this paper, a method for segmentation of license plate characters, based on Renyi’s entropy and mathematical morphology edge detection, is introduced. The algorithm binaries the license plate by two-dimensional Renyi’s entropy first and then detects the edges by morphology erosion. After getting rid of the outer bounding frame, the license plate character is segmented by projection. Computer simulation results show that the character is much clearer after preprocessing based on Renyi’s entropy and mathematical morphology edge detection. This is favorable for the character segmentation based on projection. The algorithm is not only simple and fast, but also robust, and performs better than traditional methods.

    • Improved GA-FCM and Its Application in Traffic Data Mining

      2010, 19(9):159-162.

      Abstract (2305) HTML (0) PDF 627.16 K (3095) Comment (0) Favorites

      Abstract:With the continual advanvement of Information Construction in Public Security, it is important to boost the direction and the validity of police work and improve the level of Information Construction, if interested information can be mined from the large amount of historical data. Based on an earlier study, this paper improves the GA-FCM from the population selection and the mutation operator. Finally, the improved algorithm is also applied to the traffic accident data mining. The results have shown that the algorihm contributes significantly in preventing traffic accident and improving the traffic situation.

    • Ontology Reasoner and Its Application

      2010, 19(9):163-167.

      Abstract (3177) HTML (0) PDF 687.24 K (11020) Comment (0) Favorites

      Abstract:With the rapid development of Sematic Web, application of ontology spring up and ontology reasoner application are widely used. Ontology reasoner is used to reason and query semanteme, and is one key technology in implementing Sematic Web. This paper introduces the techniques, classification, and structure of Ontology reasoner, and then introduces several Ontology reasoners. Lastly, this paper summarizes the application and the future work to be done on this topic.

    • Mining Specifications of Malicious Behaviors Based on Multiple Paths in Linux

      2010, 19(9):168-172.

      Abstract (1929) HTML (0) PDF 772.41 K (3384) Comment (0) Favorites

      Abstract:The malware detection is one of the important parts in a secure Linux frame.Most existing malware detection methods are based on the signature and generally leave behind the development of the malware technology, which cannot meet the ever increaing needs of security. Behavior-based detectors require high-quality specifications of malicious behavior. This paper introduces an automatic technique to mine specifications of malicious behavior based on system calls and explores multiple execution paths for malware specifications, which helps the specifications to be more specific and more comprehensive, and improves the rate of detection of the behavior-based detectors.

    • File Integrity Check on Mobile Platform Based on Merkle Tree

      2010, 19(9):173-176.

      Abstract (2653) HTML (0) PDF 990.32 K (4610) Comment (0) Favorites

      Abstract:In addition to the message service, the download service is another important business. The effective management and control of the download process is a prerequisite for stable operations for the business. The data integrity is the core content for download business. This article describes the content integrity check program in the download process of a mobile platform. It proposes a content integrity check strategy on the mobile platform based on Merkle tree, which reduces the cost of the integrity check effectively by shortening the size of checksum on the course of the network transmission. Theoretical analysis and the project has proven that the mechanism has high security connectivity and low network latency.

    • Research and Implementation of RCS Privacy Based on IMS

      2010, 19(9):177-182.

      Abstract (2462) HTML (0) PDF 858.79 K (3369) Comment (0) Favorites

      Abstract:RCS is an interoperable standard for IMS communication services, which was developed by GSMA. Presence and authorization are important parts of the RCS program. According to the requirement of presence and authorization, as well as referring to IETF, OMA, GSMA standards, this paper proposes an implementation project for RCS privacy, which includes a framework and a SIP signaling sequences. This paper mainly discusses the key technologies used in the implementation process of RCS privacy, which includes the processing strategy of presence, signaling sequences of subscription, and the processing strategy of authorization documents. The experimental result shows that this project has implemented functions, which are required by RCS privacy.

    • Personalized Recommendation System Framework Based on Fuzzy Interest Model and Multi-Agent

      2010, 19(9):183-186.

      Abstract (2308) HTML (0) PDF 799.55 K (2866) Comment (0) Favorites

      Abstract:The paper proposes a personalized recommendation system framework based on Fuzzy Interest Model and Multi-Agent to solve the recommentdation system’s inability to collect information from the customers’ evaluation on the commodity’s properties implicitly. The recommendation system creates and updates the UserProfile in accordance with customers’ private information collected on the client and combined with information in which customers are interested in.

    • Application of Principal Component Analysis to Palmprint Images Recognition

      2010, 19(9):187-190.

      Abstract (2460) HTML (0) PDF 810.21 K (3191) Comment (0) Favorites

      Abstract:The palmprint recognition is a new biometric technology, which has a good prospect of applications in the areas of network security, identity authentication etc. In this paper, the principal component analysis method is applied to palmprint image feature extraction, and the differences between the traditional principal component analysis(PCA) and the weighted principal component analysis(WPCA) in addressing the palmprint image are explained. According to the experimental results of two methods on two databases, PCA has a higher precision of palmprint recognition than WPCA, and the affection of light condition is weakened by WPCA.

    • Color Transform Model for Vehicle Detection in Static Images

      2010, 19(9):191-194.

      Abstract (1777) HTML (0) PDF 453.09 K (3512) Comment (0) Favorites

      Abstract:To make full use of the color feature of a vehicle, a color transform model based on Karhunen-Loeve(KL) transform is proposed. Utilizing the model, all pixels can be transformed from RGB color space to a 2-D color space. On this 2-D color space, vehicle pixels and non-vehicle pixels will respectively concentrate on detachable areas. On this basis, vehicles can be detected from static images by using a classifier. Testing results demonstrate that when the model is applied the vehicle detection can be used with high accuracy.

    • Efficiency of the Shortest Path Problem in Huge Amount of Road Data

      2010, 19(9):195-198.

      Abstract (1884) HTML (0) PDF 550.77 K (4413) Comment (0) Favorites

      Abstract:In huge amounts of road data, calculating the short path is time-consuming. A completed solution for improving the efficiency of Shortest Path Problem is proposed. In the solution, file-mapping, evaluation function and simplification of polylines are used for increasing huge topo file loading, filling out ineffectual data to improve Dijkstra algorithm and accelerating results. With practical experience, the system works out the problem in no more than 5 seconds.

    • Design and Realization of Improved Digital Down Conversion

      2010, 19(9):199-203.

      Abstract (2183) HTML (0) PDF 628.97 K (4047) Comment (0) Favorites

      Abstract:Based on operation principles about digital down conversion, this paper designs its structure with modules, including multirate signal processing and carrier recovery with the NDA frequency offset estimation algorithm to improve DDC. The design of each module is stated in detail. By using a System Generator to complete the simulation of an improved DDC system, applying in FRS, the correctness and feasibility of the NDA algorithm is confirmed, and the serviceability of this system in SDR receiving set is expressed.

    • Semantic Lock Model and Application of Deadlock Lifting Mechanism to Web Services

      2010, 19(9):204-207.

      Abstract (1606) HTML (0) PDF 986.26 K (3271) Comment (0) Favorites

      Abstract:The paper proposes a semantic lock mode in the Web services environment. The lock mode implements the dynamic control of locking granularity, based on the amount of resources, to apply by current transactions and also explores the deadlock lifting mechanism to minimize loss of enterprise spending on the basis of the semantic information in the semantic lock. The mode increases transaction concurrency amony transactions in Web services and reduces the probability of the occurrence of the deadlock, which effectively improves the economic efficiency of enterprises.

    • Design and Implementation of Card Game Based on Transformation of Kakutani-Conjecture

      2010, 19(9):208-210.

      Abstract (1546) HTML (0) PDF 731.56 K (3762) Comment (0) Favorites

      Abstract:With the development of information technology, more and more card games have been moved onto computers and networks. Among a large variety of poker games, Finding-Card game is more fun. After the introduction of the general situation of Kakutani-Conjecture, a deformation of the transformation is given, and used as an algorithm to design and implement a Finding-Card game.

    • Interface Design and Implementation of Digital Image Processing Platform

      2010, 19(9):211-213.

      Abstract (2125) HTML (0) PDF 778.90 K (4406) Comment (0) Favorites

      Abstract:The appearance of visual programming language has brought great changes to the design of man-machine interface. In the paper, through the research on current visual programming, a graph control is proposed and used as an interface design of an image processing platform. Algorithm information, which is implemented by DLL of VC, is encapsulated in these graphical controls through the use of packaging technology, and users can develop their own software by using the graphical controls, in order to avoid the compililation of code and improve the speed of image processing. The development methods of graphical controls can enhance the flexibility of configuration and improve development efficiency, and to achieve software reuse.

    • Stock Price Reversal Point Prediction Based on Support Vector Machines

      2010, 19(9):214-218.

      Abstract (1843) HTML (0) PDF 791.94 K (5866) Comment (0) Favorites

      Abstract:The stock market changes rapidly. Thus, the stock price reversal points play a vital role in investment decisions. Technical analysis can reveal some features of stock price reversal, but to use a sole technical indicator to predict the reversal points can end with sesults that have very low recall and precision rates. In order to improve recall and precision rates, a novel method of using Support Vector Machines (SVM) is proposed to data mine a combination of technical indicators. The experiment results show that this method has a higher recall and precision rate than the original ones.

    • Image Super-Resolution Method Based on Partial Differential Equation

      2010, 19(9):219-223.

      Abstract (1730) HTML (0) PDF 875.06 K (3122) Comment (0) Favorites

      Abstract:In Image super-resolution methods, the classical interpolation methods have checkerboard effect and image blur. Using the partial differential equations with the post-processing is more complicated. In this paper, it is proposed to obtain a new PDE model which is coupled between isotropic and anisotropic partial differential equations. This model is processed for image super-resolution. It does not only decrease computational complexity, but also ensures a better image super-resolution effect. The experimental results show the advantages of this method.

    • Fast Detection Method of Rrolling Bearing Faults Based on BP Neural Network

      2010, 19(9):224-226.

      Abstract (1610) HTML (0) PDF 801.50 K (3645) Comment (0) Favorites

      Abstract:A method of detection about rolling bearing faults based on BP neural network and time domain features of vibration signal is proposed to realize fast fault detection. The input vector of the BP neural network are skewness, kurtosis, crest and margin. The network is trained with BP algorithm. Experimental results show that with this method fast detection of rolling bearing faults can be realized effectively.

    • Reverse C Compiler Optimization of the Intermediate Language Representation of One

      2010, 19(9):227-231.

      Abstract (2811) HTML (0) PDF 806.91 K (3284) Comment (0) Favorites

      Abstract:To redefine the data types, control flow restoration and custom function, or structure of recognition, are structured languages. In the process of reverse compilation difficulties, previous studies use more data types in assembly language to improve representation and increase the custom function or structure of the characteristic quantities as a way of optimizing the reverse compile the results. This article uses the intermediate language to be compiled against the abstract representation of the assembly language of the linguistic forms and designs a new reverse compile mode to reverse compilation. The results are an improved recognition rate, readability, and integrity.

    • Ontology Merging Method Based on Attributes Reduction of Concept Lattice

      2010, 19(9):232-235.

      Abstract (1627) HTML (0) PDF 896.28 K (2541) Comment (0) Favorites

      Abstract:This paper presents an ontology merging method based on concept lattice’s attribute reduction, which first conducts an analysis on the extension and connotation of the concept in the original sources. With this background, this paper constructs the concept lattice, then conducts attribute reduction on the concept lattice, removes redundant information on the ontology merging, and reduces any unnecessary attribute. All this is done to use the minimum amaunt of information that accurately reflects the nature and structure of the concept lattice and the body. Finally, an example analysis is used to prove the feasibility of this method.

    • Research and Implementation of AUTOSAR Flash Driver

      2010, 19(9):236-240.

      Abstract (2557) HTML (0) PDF 483.18 K (6647) Comment (0) Favorites

      Abstract:The AUTOSAR platform consists of three layers: the application layer, the runtime environment, and the basic software which includes system services, EAL(ECU abstraction layer) and uCAL(uC abstraction layer). Device drivers belong to uCAL and EAL. The memory device driver provides access to different memory devices. In the paper, the specific design of AUTOSAR is followed and a Flash driver on MPC5633M microcontroller is implemented. The proposed procedure is applicable to other device drivers.

    • FSM of Vending Machine Controller Based on Lpc2134 and UcosII

      2010, 19(9):241-244.

      Abstract (1889) HTML (0) PDF 443.19 K (3499) Comment (0) Favorites

      Abstract:Due to the increasing number of functions of the Vending Machine, the VMC(Vending Machine Controller) is becoming more and more complex, so it is becoming more and more difficul to extend and maintain the developing method used before. According to the theory of FSM, this article suggests one FSM Model on the Vending Machine. The abstract model separates and divides the system into ones to establish a list of system states and transformations. If an event occurred, it would search the system transformation list by the system event and the current state. If there is a record that matches the state and event, then the state is transformed to the NextState defined in the record. Based on the experiment, the model can solve the big problem of the system and make the system development easier to maintain.

    • Design and Implementation of ARM-Based Indoor Temperature Control System

      2010, 19(9):245-247.

      Abstract (1805) HTML (0) PDF 930.21 K (4179) Comment (0) Favorites

      Abstract:Due to the shortcomings of the winter heating system in North China, the paper designs an indoor intelligent temperature control system based on ARM-Linux platform of embedded systems and fuzzy control technology. The system uses DS18B20 and ZigBee wireless networking technology to complete the collection of multi-point temperature. The system also uses fuzzy control technology to achieve precise control of room temperature. The establishment of the QT user interface optimizes the environment of human-computer interaction. By using GPRS technology, the system's remote control, the system becomes a great convenience for the user. The implementation of the system will play an important role to reduce energy waste and improve people's quality of life.

    • Design of Touch Screen Driver System Based on Embedded ARM

      2010, 19(9):248-251.

      Abstract (1677) HTML (0) PDF 559.56 K (3951) Comment (0) Favorites

      Abstract:This paper gives an introduction about hardware connection designing and software driver designing based on FreeScale’s CPU and embedded Linux system. According to that idea, the paper designs the driver system from hardware to software. The driver system will be applied to the home wireless control system. It first introduces the theory of the touch screen, then introduces the characteristics of the AD7873. Based on the content introduced above, it designs the PCB photo of the system. It designs the soft driver which is successfully tested by the professional soft TCLIB. The results of the home smart control system are promising and convert the driver system from hardware to software under the embedded system.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063