WANG Hai-Dong , ZHENG Xiao-Qing , ZHANG Hong-Jun
2011, 20(1):1-6.
Abstract:As a result of heterogeneity of network knowledge resources, knowledge fusion systems have to integrate and combine the multi-source data and information and reduce the ambiguity. Inconsistency and incompleteness leads to uncertainty in the knowledge fusion procedure due to complexity and ambiguity of the knowledge science. A web knowledge fusion system based on certainty factor theory is proposed, making up the defect on uncertainty processing of traditional knowledge systems. The subjectivity of the initial setup of the certainty factor is reduced by the feedback and self-adaption mechanism. The system is then applied to the online drug subject tracking problem, which solves the redundancy and contradiction in the drug subject fusion procedure and provides reliable drug subject information for the online drug supervisory board.
2011, 20(1):7-11.
Abstract:Medical information system has been running rely on highly available information system infrastructure construction, the traditional hot standby technology can not meet the current actual demand. This article discusses the management point of view from the shared disk type cluster failover technology program, discusses the LAN from a safety point of view and business flow load balancing, high availability implementation of technology, operating system security and terminal management. Build a real high available information systems infrastructure platform, clear the planned and unplanned outages. Medical institutions in the ordinary course of business protection, application software systems for sustainable operation, to maintain the normal order and medical services for treatment.
ZHANG Rui-Juan , PU Bao-Ming , PAN Shi-Ming
2011, 20(1):12-16.
Abstract:Train bearing system is a system with a set of information, storage, management in one and for the Automatic Storage and Automated Retrieval (AS/RS). It uses the present newly technology, to solve the problems that the storage locations of bearings are not accurate and the matching accuracy is not high. When implemented, it uses CQM1H Serial of OMRON PLC to be the control center, combines with the frequency conversion technologies, the IPCS and highly integrates with the HMIS. This paper introduces system structure, function and the major part of the subsystem design and implementation, and talks about the data collection, storage and matching algorithms in detail. Finally, PLC simulator simulates the control part. The practical application shows that the system has high control precision and performance and it will make great importance on improving the management efficiency of train bearing management.
YANG Bing , JIN Geng-Da , XU Duan-Qing , FU Qiang
2011, 20(1):17-21.
Abstract:In recent years, digital publishing share in the information society more and more, readers of the growing demand for personalized service strong traditional culture, publishing services are currently unable to meet this demand, especially for the digital home needs. For family-oriented, personalized digital publishing needs, this paper uses the method of multi-dimensional indexing metadata tissue, data mining, knowledge classification management, natural language as the three dimensions of the dynamic association to create a database; mechanical matching personalized method of data retrieval, and can take the initiative to push; through the reorganization of the publishing and content transcoding method, the layout can keep the original format of the EPUB format document; using digital watermarking and digital encryption to protect the method of combining the author’s legitimate interests. In this article based on the development of family-oriented personal digital publishing services system, in practice, demonstrate the practicality of this technology.
XIANG Wei , PU Guo-Lin , YANG Qing-Ping
2011, 20(1):22-26.
Abstract:The information system can not meet the great needs in enterprises currently. In order to satisfy the dynamic business needs with the current IT fundamental infrastructure, an approach of implementing the service-oriented architecture to integrate the heterogeneous system was put forward. Taking the case of one coal enterprise as an example. This paper focuses on the building of system model of SOA and the realization of key technologies, aiming at reconstructing the information system in the enterprises.
FANG Xin-Fei , YE Feng , ZHOU Jun
2011, 20(1):27-31.
Abstract:Now many basketball coaches only rely on their experience and specialty Skill when they do the decision. So in this case the coach’s decision may be wrong and the team may lose the game. Even the coach may be fired. Concerning this problem, we can design this DSS (Decision Support System) to solve it. Here we use Data Warehouse and Data Mining skill to realize the DSS. And we use the assist data of Rockets players to experimental analysis. From the experimental results that frequent itemsets, we found the results were helpful for coaches on how to provide effective help. So we believe to some extent that the system can certainly provide some help and reference for the basketball coach.
JI Wen-Tao , CHEN Wen-Bin , ZHANG Ping
2011, 20(1):32-35.
Abstract:UAV is a complex mechatronic system, in order to meet the needs of fault diagnosis, based on the theory of fuzzy mathematics, and integrate case-based reasoning into fuzzy inference machine. This paper focuses on how to determine the fuzzy relationship matrix and the principle of case-based reasoning, described in details of the case matching process, put over a new fuzzy inference mechanism, ultimately, design and implementation of system functions. It is shown from application results that this method improve the diagnostic process efficiency, accuracy and reliability.
2011, 20(1):36-40.
Abstract:This paper researches existing popular Single Sign-On model and Kerberos authentication protocol, and discusses the limits of Kerberos protocol in symmetric key technology, improves Kerberos protocol with the public key technology. Then it designs and realizes the agent-based single sign-on system, and by the second ticket method, ensures the safety of the SSO system. Meanwhile, the program has better performance in implementation, operating and management.
SHEN Yuan-Yi , ZHENG Xiao-Qing , GU Yi-Ling
2011, 20(1):41-47.
Abstract:This article addresses defects of current Web information extraction technology such as low accuracy, low coverage, and manual intervention required, proposes a novel extraction algorithm of web medicine information. The algorithm sets up a three-dimentional semantic dictionary by introduction of the semantics technology, masks the isomerisms of the web page contents and structures, and at the same time, taking advantage of the fact that the attributes of the target medicine tend to have a character of aggregation, designs a way of intellectually locating and extracting the target information based on the theory of information entropy. Through related experiments proves that the algorithm is able to reduce the requirement of manual intervention of the information extraction, and has a high accuracy and recall rate. The application of this algorithm can automatically, comprehensively, and accurately obtain Internet medicine information in real time, offers abundant basis of supervision for the medicine supervision department, and therefore has a significant practical meaning of normalizing medical e-business and ensuring secure medication.
SHAO Jin-Jin , CHEN Feng , SUN Xin-Xin , ZHU Te-Hao , GUAN Sheng-Xiao
2011, 20(1):48-51.
Abstract:Inductive control is one of important methods of urban traffic signal control. It is suitable for the control of traffic flow with larger fluctuation. In order to overcome the drawbacks of classical inductive control, the formulas of the primary parameters in inductive control are given, impact of phase sequence on inductive control is analyzed, and then a multi-phase inductive control algorithm with dynamic phase sequence is proposed in this paper. The simulations show that the proposed algorithm has lower average delay than classical inductive control. It is easy to implemented and practical.
ZHONG Jin-Fa , XU Li , YE A-Yong , HUANG Chen-Zhong
2011, 20(1):52-56.
Abstract:A range-free algorithm based on mobile sink node and DV-Hop localization scheme is proposed in order to decrease the hardware cost and implement complexity of WSN, the sink node mobiles in the network field based on Gauss - Markov mobility model, and sends location information periodically. Nodes sensing the information will compute the distance between sink and itself based on log-normal distribution model of RSSI. Those nodes who received more than 3 pieces of location information in short distance will be updated as virtual nodes. At last, the algorithm's efficacious and feasible was proved by the simulation experimental results.
WANG Yong-Ping , WEI Shao-Qian
2011, 20(1):57-61.
Abstract:To solve the problem of isolated digital museum information, cultural information which is scattered and isolated will be shared by constructing a virtual space for digital museum. The role of the virtual space is to use some strategy to collect and find heritage information through the Internet, and then to complete its conduct, extraction, organization and processing. Using multi-thread, information filtering and information reclassification in the design process, techniques of information access, analysis and classification will be improved. The technology can solve the limitations of digital museum information, and can also increase the accuracy of information, which makes a clear classification of cultural information and realize fast retrieval of cultural information.
2011, 20(1):62-65.
Abstract:For the high-security needs of CA private key, a new (t,n) secret sharing mechanism is proposed. First, the CA private key is generated using the RSA algorithm to ensure its un-Forged; then CA private key is shared based on the new (t,n) secret sharing mechanism. It uses its identification as a share of the private key and the private key as a secret share. It also provides a simple and efficient method to detect partner deceive, there is no real secret share is needed when secret is reconstructed, and without the need to maintain security channel too, so it enhances the efficiency. Applied to CA private key protection, it improves its security.
2011, 20(1):66.
Abstract:Barefoot plane footprint computer program identification algorithm and build system model consistently is one of the key research content in the criminal investigation of image processing. According to the criminal investigation technical requirement and reference relevant technical data, have researched the model of barefoot plane footprint recognition system, have selected and definited Biological characteristics points and characteristics lines of barefoot plane footprint, have proposed the method about feature point positioning and characteristic parameters calculation, and Has been realized the computer programming of interactive Barefoot plane footprint recognition system to use Matlab language, calculated and analyzed the Morphological characteristics parameters error, had been Realized the technology solutions of interaction barefoot plane footprint recognition system. By experiment, the scheme has been fulfilled the actual requirements of criminal investigation technology, can be used as reference about barefoot plane footprint automatic identification system research and technology.
CAI Liang , WANG Bing , LI Hui
2011, 20(1):70-74.
Abstract:Abstract:For the SOAP message transmission process may lead to security threats. In this paper we address to mine SOAP messages using association rules, and establish IIFA-SOA security model. Based on the requirements of system real-time, we introduce Index Induce Frequent algorithm for frequent itemsets mining association rules. Experimental results show that the IIFA-SOA security model can make the prediction and elimination of security threats, accordingly improve system security.
HUANG Tao , LI Tong , GAO Song-Yan
2011, 20(1):75-79.
Abstract:In order to solve the remote access, monitor and control the demand of data acquisition terminal of electric energy, the thinking of building Web Server based on BOA and CGI technology is proposed. On the basis of the discussion of overall design, Web server data query and management system uses the D2000H data acquisition terminal of electric energy as a platform and is based on embedded Linux system. The paper describes the system design, data interact and the design idea of each module. The system is stable, easy to operate and the design has met the power management’s requirements of the information sharing and the remote control.
2011, 20(1):80-83.
Abstract:In the field of initialization of clustering for large data set, random sampling is used as an important reduction operation. This paper focuses on the process and property of random sampling, and proposes a novel random sampling method which is based on KD-Tree samples. Sample spaces were further divided into several sub spaces using KD-Tree. KD-Tree samples were created for each sub-space. This overcomes the defect of skewness of the random samples. Thus the good initial centroids can well describe the clustering category of the whole data set. The experiment results show that the cluster initial centroids selected by the new method is more closed to the desired cluster centers, and the better clustering accuracy can be achieved.
2011, 20(1):84-88.
Abstract:Firstly this paper gives a brief overview about the general network topology discovery method in network management system, then on base of the character of GPON structure and the reference of SNMP protocol, it designs a project which can discover and display the topology of OLT(Optical Line Terminal) and ONU(Optical Network Unit)in passive optical networks, and using C++ language, we write a detection and display module at the network management station. Finally, by use of the simulative receive and send system at the agent side ,it achieves the function which can discover the topology as well as the status of ONU through OLT agent at the network management side.
ZHOU Chao , ZHOU Cheng , DING Chen-Lu
2011, 20(1):89-94.
Abstract:Endpoint Admission Control technology takes authentication and security state checking on endpoints accessing to network on the basis of pre-determinate security policies. It makes sure that only the trustworthy and secure endpoints could access to networks while rejects or limits the accessing of insecure endpoints. It’s exemplification of the combination of Endpoint Security and Access Control, which can efficiently improve the active defense ability against security threaten of networks. However, the existing solution has shortages in authentication and security state checking that it could easily attacked by Man-in-the-Middle Attack and Session Hijack. What’s more, it also has limitation in Virtualization appliance as well. It’s considerable to consummate the mechanism of authentication and communication processes for improvement.
2011, 20(1):95-99.
Abstract:In this paper, a content-based image retrieval algorithm using texton and color is proposed. Firstly, it converts color image from RGB color space to HSV color space and quantizes the color image into 256 colors. Then texton-images can be extracted based on the five texton types which are defined for image analysis. Finally, color features of texton-images are represented by color histogram whose similarity can be measured by the improved cross color histogram. Experimental results indicate that: the proposed algorithm can effectively remove the effects of the background color and can make a better description on the color image texture and edge features possessing higher rates of precision and recall compared with the edge detection method.
2011, 20(1):100-103.
Abstract:When traditional full-text searching technologies based on keywords are applied on government information, low quality results will be return. It is helpful to express searcher’s meaning more completely by combining traditional full-text searching technology with ontology technology. Quality of information retrieval will be improved. A detailed solution is proposed. Later method of designing government ontology utilizing domain oriented thesaurus is discussed. How to use combined words with high frequency to assist searching is also discussed. At last a case verifies that it is right.
DONG Ting-Xing , LI Xin-Liang , LI Sen , CHI Xue-Bin
2011, 20(1):104-109.
Abstract:Computational Fluid Dynamic (CFD) codes based on incompressible Navier-Stokes, compressible Euler and compressible Navier-Stokes solvers are ported on NVIDIA GPU. As validation test, we have simulated a two-dimension cavity flow, Riemann problem and a transonic flow over a RAE2822 airfoil. Maximum 33.2x speedup is reported in our test. To maximum the GPU code performance, we also explore a number of GPU-specific optimization strategies. It demonstrates GPU code gives the expected results compared CPU code and experimental result and GPU computing has good compatibility and bright future.
QIU Jie , LIN Hu , YANG Hai-Bo
2011, 20(1):110-115.
Abstract:In the system of 3G IMS, SIP application server is the main provider for enriching the content of service. JCP(Java Community Process)defines SIP Servlet Standard to simplify the process and improve the efficiency, which also offers Java application programming interface(API)for SIP application server. The mechanism of application router for SIP Servlet is an important module for rapidly customizing 3G services and it is a hotspot of studying nowadays. In order to implement complex services by composing applications flexibly, this article based on analyzing the application router for SIP Servlet puts forward and realizes a method, which makes use of SailfinV2 standard container to design the custom defined application router, and also expounds how to employ the method according to an instance. Finally, the experiment result reflects the high efficiency and flexibility of newly increased mechanism of application router.
WU Qi-Sheng , CAI Hui , HU Shou-Hai
2011, 20(1):116-119.
Abstract:Software video conference system is quickly developed and widely applied because of its flexibility and economy with PC CPU rapidly increasing and net width expanding. Anhui meteorological bureau adopted V2 software video conference system based-on current situation, local requirement and existing video conference system. The paper introduced the construction program and operation mode of V2 software video conference system. It also introduced that the system is applied in ahui meteorological bureau’s weather forecast conference et .
ZHANG Jin , LI Ru , HU Xian-Bing
2011, 20(1):120-123.
Abstract:Test case is the central content of the test progress. In the actual test items, test case management and maintenance are important parts of the test session. The function of the case management tool is an important factor in the impact of testing quality and efficiency. Based on the analysis to current test case management tools, we give a system which can realize test case information self-register and case execute on-demand.
XIAO Fei , HUANG Zheng-Dong , WANG Guang-Hhua
2011, 20(1):124-127.
Abstract:Designing an effective safe management scheme to resolve the database encryption key for the allocation and management issues. By analyzing various key management mechanism,a key management scheme based on encryption role is designed. Security of key management scheme based on encryption role was analyzed,key management scheme based on encryption role was actualizd in database. Key management scheme based on encryption role greatly facilitated access jurisdiction management and greatly improved the key management efficiency.
2011, 20(1):128-132.
Abstract:Ajax is a front technology in the Web. It Provides a new model of intemet interaction, which greatly expanded the capacity of Web applications. In this paper, we analyze the main differences between the Ajax design pattems and traditional Web applications, then put forward four typical Ajax design pattems which are Dynamic Loading, Cache-predictable Data and Content partitioned. We described the various design patterns on the aspects of the problems, typical scene and its architecture.
2011, 20(1):133-136.
Abstract:The paper introduces storage virtualization related concepts and techniques, and emphatically expounds the design thought and virtualization of realization of comparison and the construction project in shanxi telecommunication technology selection and realization ways, in practical application of theoretical into all kinds of technical and physical link reserves are also described, The use of technology, revitalize the fixed assets of enterprises to reduce the production cost, more important is to realize the dynamic management of heterogeneous data storage and management of unification
QU Yun-Teng , LI Ping-Kang , DU Xiu-Xia
2011, 20(1):137-140.
Abstract:In the process of detecting and tracking moving human target based on visual images, in order to implement fast real-time tracking and make tracking more accurately, Tracking based on Kalman prediction is used according to Kalman filter’s recursion capacity to estimate the target location of the next time. Simulation analysis in 2-D space and indoor experiment are done. Both the simulation analysis and test result confirm that the tracking speed and accuracy has been improved effectively base on Kalman prediction which offers guarantee for the following image processing and analysis.
LI Wen-Jiang , WANG Guo-Zhen , YAN Xiao-Heng , SHI Xu-Peng
2011, 20(1):141-145.
Abstract:Be aimed at the problem of analogy carried telephone which used in production process has large real-time calling noise, effecting managing effect, suggests that motor vehicles-line communication system based on spread spectrum famous as anti-interference. It uses ARM and spread spectrum together and gives hardware of pronunciation communication module, extended memory of main control module, spread spectrum treating module, CPLD module and so on. The design of software uses object-oriented Programming. Practice shows that the system reaches the high real-time requirements while achieving high clarity.
2011, 20(1):146-149.
Abstract:From the benefit of network reliability, the essay analyze and contrast the reliability of Ethernet Ring Network. According to campus network users’ telecom requirement on the network performance, the essay, combining with existing equipment situation, puts forward to correct my school LAN topology structure by EAPS technology. The results show that: in the campus network environment, the reliability of adopting EAPS technique to construct Ethernet ring network is superior to other loop solution and it satisfies the users’ requirements to network telecom level. The method, being easy to implement and convenient to reconstruct in the existing network environment and good in practice, can be extended to the design of large-scale campus network reliability.
SUN Yu , LIU Song-Feng , MA Li
2011, 20(1):150-154.
Abstract:Diagnostic strategy is to have a certain order of test sequence. Diagnosis strategy aims to generate fault isolation, and to minimize testing costs. This paper introduces the test sequence generated by comparing the various algorithms and an algorithm on diagnostic strategies discussed Rollout algorithm.
LUO Xiao-Ping , HU Wei-Dong , YAN San-Hu
2011, 20(1):155-159.
Abstract:When formatting message using Text Encoding, the data transmission will increase between the client and service channel capacity. With the increment of the file length, throughput will increase linearly and its performance will be greatly reduced. As a new generation development architecture of network transmission, WCF (Windows Communication Foundation) has extremely powerful productivity in building the service-oriented application . This paper is to be modeled on this structure. The message layer constructs SOAP (Simple Object Access Protocol) package using MTOM (Message Transmission Optimization Mechanism) and the transport layer achieve streamming mode. The use of asynchronous calls can improve applications’ performance of response. This program can significantly improve file stream transmission performance.
LIU Du-Jin , SUN Shu-Xia , LI Si-Ming
2011, 20(1):160.
Abstract:At present, Light has become a key factor of affecting face recognition rate, the common method of deal wih illumination were compared in face recognition, experimental results show that the illumination cone method and the approximate light cone light methods have strong robustness when have significant illumination changes. while the other algorithms in the changing illumination cases, the recognition rate has significantly decreased. Deal with three-dimensional face image algorithm, illumination cone algorithm and the spherical harmonic theory have been elaborated. Extensive in-depth efforts have been put into the research toward illumination treatment methods in face recognition. Their strategies, advantages/disadvantages and performances are elaborated. Several promising directions for future research have been suggested.
LI Yi , HE Song-Song , LI Kai
2011, 20(1):163-167.
Abstract:According to characteristics of Loongson 3A architecture and BLAS level 2, this article derives the parallel solutions from instruction level, storage level and thread level. We summarize some suitable optimization methods and make a quantitative analysis. Experiment shows that the single-threading performance of BLAS level 2 is increased by 20%, and the multi-threading speedup reaches to 2.5. All of these will give some help to the optimization of system software on multi-core Loongson 3A.
XU Hai-Tao , JIN Jian , MAO Wei
2011, 20(1):168-172.
Abstract:DNS system is currently facing many security threats. This paper firstly introduces two major DNS security solutions: DNSSEC and DNSCurve, then conducts a thorough and detailed comparison, finally draws some conclusions which are that DNSCurve cannot substitute DNSSEC but can supplement it, and afterwards makes a proposal which is to deploy DNSCurve as a supplement after the deployment of DNSSEC.
GUO Jiao , SHI Hong-Bo , WANG Chang
2011, 20(1):173-177.
Abstract:At present, WebGIS is becoming one of the hottest internet applications. For e-commerce domain, however,industry application mapping system is still relatively little. In this paper, we set metal industries as an example, and describe the design ideas and key technologies of web map application, which is developed in .NET development environment and based on MapABC API2.It can meet the needs of industry users of e-business applications.
LIANG Juan-Juan , REN Kai-Xin , GUO Li-Cai , LIU Yan-Jun
2011, 20(1):178.
Abstract:Matrix multiplication is a basic operation in scientific computing. Efficient implementation of matrix multiplication can speed up many applications. In this paper, we implement an efficient matrix multiplication on GPU using NVIDIA’s CUDA. The experiment shows that our implementation is as fast as the implementation in CUBLAS, and the speed of our implementation can reach the peak speed’s 97%, on Geforce GTX260.
2011, 20(1):182-184.
Abstract:Data is the basis of business operations, these data are related to the lifeblood of the valuable assets of enterprises. With the continuous development of business,Increase the amount of data is very impressive. Behind the massive amount of data, data management issues enterprises are facing mainly data integration, data security and other aspects. From the perspective of enterprise data management, explained migration of enterprise-class data problems, data migration methodology and the choice of common technical solutions.
YE Liang , SHAN Gui-Hua , LIU Jun , CHI Xue-Bin
2011, 20(1):185-187.
Abstract:The fast development of the Graphics Processing Unit’s programmability and parallel computing power provides new solutions for visualization technology. Using ray-casting, a CUDA based interactive volume rendering tool is realized. Several rendering effects have been implemented, including alpha blending, iso-surface rendering, maximum intensity projection and X-ray projection. In order to improve alpha blending and iso-surface rendering effect, a per-pixel based Phong Lighting Model is added in. The experimental results show that the tool can make use of GPU's parallel computing capability and render high quality image. It’s interactive and extensible.
2011, 20(1):188-191.
Abstract:In the case of the administrator’s maintenance of remote system,they have to rebuild the database service. The Article provides the process of the reconstruction of the Sybase database system in complete command-line operation.
2011, 20(1):192-196.
Abstract:The overall program of the portable multimedia player is proposed based on the Intel PXA27x microprocessor, and the hardware platform and the software cross-development environment of the system is buit up. The Cygwin running on Windows is chosen as Linux simulation environment, and the Mplayer as the transplant goal of the embedded system. With the Crosstool as cross-compilation tool the audio and video playback of the Mplayer is realized in the embedded system completely.
DUAN Gang-Long , HUANG Zhi-Wen , WANG Jian-Ren
2011, 20(1):197-200.
Abstract:A method combined of F-scores and support vector machine for customer classification was proposed, which can overcome the shortages of the existing customer classification method such as strict hypothesis, poor generalization ability, low prediction accuracy and low learning rate etc., and was applied to the problem of bank credit card customer classification. Empirical results show the validation accuracies of the final model can achieve 95% or more, which concludes that learning and generalization abilities of this model are excellent.
2011, 20(1):201-204.
Abstract:Because there are obvious differences of the structure between the presentation layer of a B/S system and other software systems, it is difficult to clearly describe the structure of that layer of a B/S system by general methods. After analysing the characters of the structure of that layer, this paper introduced some standardization methods to write design documents which accords with the characters of the structure of that layer. It can be more clearly to describe the structure of the presentation layer of B/S systems by these methods. Now, these methods have been used in software projects with good effects.
2011, 20(1):205.
Abstract:This article from the design pattern, analyzed the abstract factory pattern (Abstract Factory Pattern), the abstract factory design pattern in a hierarchy application of distributed systems, and abstract factory design pattern to management information system (MIS). Abstract factory pattern for the system architecture provides a very flexible and powerful dynamic extension mechanism, to reduce the coupling between modules, better implementation of software reuse.