• Volume 20,Issue 1,2011 Table of Contents
    Select All
    Display Type: |
    • Web Knowledge Fusion System Based on Certainty Factor Theory and its Application

      2011, 20(1):1-6.

      Abstract (2549) HTML (0) PDF 918.08 K (5955) Comment (0) Favorites

      Abstract:As a result of heterogeneity of network knowledge resources, knowledge fusion systems have to integrate and combine the multi-source data and information and reduce the ambiguity. Inconsistency and incompleteness leads to uncertainty in the knowledge fusion procedure due to complexity and ambiguity of the knowledge science. A web knowledge fusion system based on certainty factor theory is proposed, making up the defect on uncertainty processing of traditional knowledge systems. The subjectivity of the initial setup of the certainty factor is reduced by the feedback and self-adaption mechanism. The system is then applied to the online drug subject tracking problem, which solves the redundancy and contradiction in the drug subject fusion procedure and provides reliable drug subject information for the online drug supervisory board.

    • Medical Information System Infrastructure

      2011, 20(1):7-11.

      Abstract (2312) HTML (0) PDF 585.69 K (4167) Comment (0) Favorites

      Abstract:Medical information system has been running rely on highly available information system infrastructure construction, the traditional hot standby technology can not meet the current actual demand. This article discusses the management point of view from the shared disk type cluster failover technology program, discusses the LAN from a safety point of view and business flow load balancing, high availability implementation of technology, operating system security and terminal management. Build a real high available information systems infrastructure platform, clear the planned and unplanned outages. Medical institutions in the ordinary course of business protection, application software systems for sustainable operation, to maintain the normal order and medical services for treatment.

    • Train Bearings Warehouse System

      2011, 20(1):12-16.

      Abstract (2631) HTML (0) PDF 964.18 K (3878) Comment (0) Favorites

      Abstract:Train bearing system is a system with a set of information, storage, management in one and for the Automatic Storage and Automated Retrieval (AS/RS). It uses the present newly technology, to solve the problems that the storage locations of bearings are not accurate and the matching accuracy is not high. When implemented, it uses CQM1H Serial of OMRON PLC to be the control center, combines with the frequency conversion technologies, the IPCS and highly integrates with the HMIS. This paper introduces system structure, function and the major part of the subsystem design and implementation, and talks about the data collection, storage and matching algorithms in detail. Finally, PLC simulator simulates the control part. The practical application shows that the system has high control precision and performance and it will make great importance on improving the management efficiency of train bearing management.

    • Family-Oriented Personalized Digital Publishing System

      2011, 20(1):17-21.

      Abstract (2050) HTML (0) PDF 671.99 K (3445) Comment (0) Favorites

      Abstract:In recent years, digital publishing share in the information society more and more, readers of the growing demand for personalized service strong traditional culture, publishing services are currently unable to meet this demand, especially for the digital home needs. For family-oriented, personalized digital publishing needs, this paper uses the method of multi-dimensional indexing metadata tissue, data mining, knowledge classification management, natural language as the three dimensions of the dynamic association to create a database; mechanical matching personalized method of data retrieval, and can take the initiative to push; through the reorganization of the publishing and content transcoding method, the layout can keep the original format of the EPUB format document; using digital watermarking and digital encryption to protect the method of combining the author’s legitimate interests. In this article based on the development of family-oriented personal digital publishing services system, in practice, demonstrate the practicality of this technology.

    • Heterogeneous System Integration Based on Service-Oriented Architecture

      2011, 20(1):22-26.

      Abstract (2289) HTML (0) PDF 651.76 K (4367) Comment (0) Favorites

      Abstract:The information system can not meet the great needs in enterprises currently. In order to satisfy the dynamic business needs with the current IT fundamental infrastructure, an approach of implementing the service-oriented architecture to integrate the heterogeneous system was put forward. Taking the case of one coal enterprise as an example. This paper focuses on the building of system model of SOA and the realization of key technologies, aiming at reconstructing the information system in the enterprises.

    • Basketball Coach’s Assistant DSS Based on Data Warehouse

      2011, 20(1):27-31.

      Abstract (2318) HTML (0) PDF 619.64 K (3964) Comment (0) Favorites

      Abstract:Now many basketball coaches only rely on their experience and specialty Skill when they do the decision. So in this case the coach’s decision may be wrong and the team may lose the game. Even the coach may be fired. Concerning this problem, we can design this DSS (Decision Support System) to solve it. Here we use Data Warehouse and Data Mining skill to realize the DSS. And we use the assist data of Rockets players to experimental analysis. From the experimental results that frequent itemsets, we found the results were helpful for coaches on how to provide effective help. So we believe to some extent that the system can certainly provide some help and reference for the basketball coach.

    • Case-Based Fuzzy Fault Diagnosis System for UAV

      2011, 20(1):32-35.

      Abstract (2664) HTML (0) PDF 791.85 K (3714) Comment (0) Favorites

      Abstract:UAV is a complex mechatronic system, in order to meet the needs of fault diagnosis, based on the theory of fuzzy mathematics, and integrate case-based reasoning into fuzzy inference machine. This paper focuses on how to determine the fuzzy relationship matrix and the principle of case-based reasoning, described in details of the case matching process, put over a new fuzzy inference mechanism, ultimately, design and implementation of system functions. It is shown from application results that this method improve the diagnostic process efficiency, accuracy and reliability.

    • Improvement and Application of Kerberos Protocol to Single Sign-On System

      2011, 20(1):36-40.

      Abstract (2420) HTML (0) PDF 786.95 K (3925) Comment (0) Favorites

      Abstract:This paper researches existing popular Single Sign-On model and Kerberos authentication protocol, and discusses the limits of Kerberos protocol in symmetric key technology, improves Kerberos protocol with the public key technology. Then it designs and realizes the agent-based single sign-on system, and by the second ticket method, ensures the safety of the SSO system. Meanwhile, the program has better performance in implementation, operating and management.

    • Web Medicine Information Extraction Algorithm Based on Semantics

      2011, 20(1):41-47.

      Abstract (1818) HTML (0) PDF 733.37 K (3956) Comment (0) Favorites

      Abstract:This article addresses defects of current Web information extraction technology such as low accuracy, low coverage, and manual intervention required, proposes a novel extraction algorithm of web medicine information. The algorithm sets up a three-dimentional semantic dictionary by introduction of the semantics technology, masks the isomerisms of the web page contents and structures, and at the same time, taking advantage of the fact that the attributes of the target medicine tend to have a character of aggregation, designs a way of intellectually locating and extracting the target information based on the theory of information entropy. Through related experiments proves that the algorithm is able to reduce the requirement of manual intervention of the information extraction, and has a high accuracy and recall rate. The application of this algorithm can automatically, comprehensively, and accurately obtain Internet medicine information in real time, offers abundant basis of supervision for the medicine supervision department, and therefore has a significant practical meaning of normalizing medical e-business and ensuring secure medication.

    • Optimization Design of Multi-Phase Inductive Control Plan

      2011, 20(1):48-51.

      Abstract (1707) HTML (0) PDF 678.42 K (4218) Comment (0) Favorites

      Abstract:Inductive control is one of important methods of urban traffic signal control. It is suitable for the control of traffic flow with larger fluctuation. In order to overcome the drawbacks of classical inductive control, the formulas of the primary parameters in inductive control are given, impact of phase sequence on inductive control is analyzed, and then a multi-phase inductive control algorithm with dynamic phase sequence is proposed in this paper. The simulations show that the proposed algorithm has lower average delay than classical inductive control. It is easy to implemented and practical.

    • Localization Algorithm Based on Virtual Beacon Nodes

      2011, 20(1):52-56.

      Abstract (1894) HTML (0) PDF 922.92 K (3624) Comment (0) Favorites

      Abstract:A range-free algorithm based on mobile sink node and DV-Hop localization scheme is proposed in order to decrease the hardware cost and implement complexity of WSN, the sink node mobiles in the network field based on Gauss - Markov mobility model, and sends location information periodically. Nodes sensing the information will compute the distance between sink and itself based on log-normal distribution model of RSSI. Those nodes who received more than 3 pieces of location information in short distance will be updated as virtual nodes. At last, the algorithm's efficacious and feasible was proved by the simulation experimental results.

    • Web-Based Digital Museum Construction and Realization of Virtual Space

      2011, 20(1):57-61.

      Abstract (2242) HTML (0) PDF 668.62 K (3890) Comment (0) Favorites

      Abstract:To solve the problem of isolated digital museum information, cultural information which is scattered and isolated will be shared by constructing a virtual space for digital museum. The role of the virtual space is to use some strategy to collect and find heritage information through the Internet, and then to complete its conduct, extraction, organization and processing. Using multi-thread, information filtering and information reclassification in the design process, techniques of information access, analysis and classification will be improved. The technology can solve the limitations of digital museum information, and can also increase the accuracy of information, which makes a clear classification of cultural information and realize fast retrieval of cultural information.

    • Protection for CA Private Key Based on Secret Sharing Scheme

      2011, 20(1):62-65.

      Abstract (1836) HTML (0) PDF 614.55 K (3892) Comment (0) Favorites

      Abstract:For the high-security needs of CA private key, a new (t,n) secret sharing mechanism is proposed. First, the CA private key is generated using the RSA algorithm to ensure its un-Forged; then CA private key is shared based on the new (t,n) secret sharing mechanism. It uses its identification as a share of the private key and the private key as a secret share. It also provides a simple and efficient method to detect partner deceive, there is no real secret share is needed when secret is reconstructed, and without the need to maintain security channel too, so it enhances the efficiency. Applied to CA private key protection, it improves its security.

    • Barefoot Plane Footprint Biological Feature Extraction and Measurement

      2011, 20(1):66.

      Abstract (2038) HTML (0) PDF 951.63 K (3338) Comment (0) Favorites

      Abstract:Barefoot plane footprint computer program identification algorithm and build system model consistently is one of the key research content in the criminal investigation of image processing. According to the criminal investigation technical requirement and reference relevant technical data, have researched the model of barefoot plane footprint recognition system, have selected and definited Biological characteristics points and characteristics lines of barefoot plane footprint, have proposed the method about feature point positioning and characteristic parameters calculation, and Has been realized the computer programming of interactive Barefoot plane footprint recognition system to use Matlab language, calculated and analyzed the Morphological characteristics parameters error, had been Realized the technology solutions of interaction barefoot plane footprint recognition system. By experiment, the scheme has been fulfilled the actual requirements of criminal investigation technology, can be used as reference about barefoot plane footprint automatic identification system research and technology.

    • SOA Security Model Design Based on IIFA Algorithm

      2011, 20(1):70-74.

      Abstract (1668) HTML (0) PDF 693.23 K (3581) Comment (0) Favorites

      Abstract:Abstract:For the SOAP message transmission process may lead to security threats. In this paper we address to mine SOAP messages using association rules, and establish IIFA-SOA security model. Based on the requirements of system real-time, we introduce Index Induce Frequent algorithm for frequent itemsets mining association rules. Experimental results show that the IIFA-SOA security model can make the prediction and elimination of security threats, accordingly improve system security.

    • Application of Embedded Web Server in Data Acquisition Terminal of Electric Energy

      2011, 20(1):75-79.

      Abstract (1977) HTML (0) PDF 721.30 K (4422) Comment (0) Favorites

      Abstract:In order to solve the remote access, monitor and control the demand of data acquisition terminal of electric energy, the thinking of building Web Server based on BOA and CGI technology is proposed. On the basis of the discussion of overall design, Web server data query and management system uses the D2000H data acquisition terminal of electric energy as a platform and is based on embedded Linux system. The paper describes the system design, data interact and the design idea of each module. The system is stable, easy to operate and the design has met the power management’s requirements of the information sharing and the remote control.

    • Initialization Algorithm of Clustering Using Subsample for KD-Tree

      2011, 20(1):80-83.

      Abstract (2269) HTML (0) PDF 607.25 K (4448) Comment (0) Favorites

      Abstract:In the field of initialization of clustering for large data set, random sampling is used as an important reduction operation. This paper focuses on the process and property of random sampling, and proposes a novel random sampling method which is based on KD-Tree samples. Sample spaces were further divided into several sub spaces using KD-Tree. KD-Tree samples were created for each sub-space. This overcomes the defect of skewness of the random samples. Thus the good initial centroids can well describe the clustering category of the whole data set. The experiment results show that the cluster initial centroids selected by the new method is more closed to the desired cluster centers, and the better clustering accuracy can be achieved.

    • Design of the Network Topology Display Module in GPON Network Management System of SNMP-Based

      2011, 20(1):84-88.

      Abstract (1764) HTML (0) PDF 735.18 K (4453) Comment (0) Favorites

      Abstract:Firstly this paper gives a brief overview about the general network topology discovery method in network management system, then on base of the character of GPON structure and the reference of SNMP protocol, it designs a project which can discover and display the topology of OLT(Optical Line Terminal) and ONU(Optical Network Unit)in passive optical networks, and using C++ language, we write a detection and display module at the network management station. Finally, by use of the simulative receive and send system at the agent side ,it achieves the function which can discover the topology as well as the status of ONU through OLT agent at the network management side.

    • Technology of Endpoint Admission Control in Computer Networks

      2011, 20(1):89-94.

      Abstract (1919) HTML (0) PDF 834.75 K (6168) Comment (0) Favorites

      Abstract:Endpoint Admission Control technology takes authentication and security state checking on endpoints accessing to network on the basis of pre-determinate security policies. It makes sure that only the trustworthy and secure endpoints could access to networks while rejects or limits the accessing of insecure endpoints. It’s exemplification of the combination of Endpoint Security and Access Control, which can efficiently improve the active defense ability against security threaten of networks. However, the existing solution has shortages in authentication and security state checking that it could easily attacked by Man-in-the-Middle Attack and Session Hijack. What’s more, it also has limitation in Virtualization appliance as well. It’s considerable to consummate the mechanism of authentication and communication processes for improvement.

    • Color Image Retrieval Algorithm Based on Texton

      2011, 20(1):95-99.

      Abstract (2254) HTML (0) PDF 839.75 K (3852) Comment (0) Favorites

      Abstract:In this paper, a content-based image retrieval algorithm using texton and color is proposed. Firstly, it converts color image from RGB color space to HSV color space and quantizes the color image into 256 colors. Then texton-images can be extracted based on the five texton types which are defined for image analysis. Finally, color features of texton-images are represented by color histogram whose similarity can be measured by the improved cross color histogram. Experimental results indicate that: the proposed algorithm can effectively remove the effects of the background color and can make a better description on the color image texture and edge features possessing higher rates of precision and recall compared with the edge detection method.

    • Ontology Auxiliary Government Information Retrieval

      2011, 20(1):100-103.

      Abstract (2026) HTML (0) PDF 594.45 K (3095) Comment (0) Favorites

      Abstract:When traditional full-text searching technologies based on keywords are applied on government information, low quality results will be return. It is helpful to express searcher’s meaning more completely by combining traditional full-text searching technology with ontology technology. Quality of information retrieval will be improved. A detailed solution is proposed. Later method of designing government ontology utilizing domain oriented thesaurus is discussed. How to use combined words with high frequency to assist searching is also discussed. At last a case verifies that it is right.

    • Acceleration of Computational Fluid Dynamics Codes on GPU

      2011, 20(1):104-109.

      Abstract (2510) HTML (0) PDF 653.00 K (5712) Comment (0) Favorites

      Abstract:Computational Fluid Dynamic (CFD) codes based on incompressible Navier-Stokes, compressible Euler and compressible Navier-Stokes solvers are ported on NVIDIA GPU. As validation test, we have simulated a two-dimension cavity flow, Riemann problem and a transonic flow over a RAE2822 airfoil. Maximum 33.2x speedup is reported in our test. To maximum the GPU code performance, we also explore a number of GPU-specific optimization strategies. It demonstrates GPU code gives the expected results compared CPU code and experimental result and GPU computing has good compatibility and bright future.

    • Application Router for SIP Servlet

      2011, 20(1):110-115.

      Abstract (2136) HTML (0) PDF 760.51 K (3799) Comment (0) Favorites

      Abstract:In the system of 3G IMS, SIP application server is the main provider for enriching the content of service. JCP(Java Community Process)defines SIP Servlet Standard to simplify the process and improve the efficiency, which also offers Java application programming interface(API)for SIP application server. The mechanism of application router for SIP Servlet is an important module for rapidly customizing 3G services and it is a hotspot of studying nowadays. In order to implement complex services by composing applications flexibly, this article based on analyzing the application router for SIP Servlet puts forward and realizes a method, which makes use of SailfinV2 standard container to design the custom defined application router, and also expounds how to employ the method according to an instance. Finally, the experiment result reflects the high efficiency and flexibility of newly increased mechanism of application router.

    • Construction and Application of V2 Software Video Conference System in Anhui Meteorological Bureau

      2011, 20(1):116-119.

      Abstract (2129) HTML (0) PDF 546.12 K (3709) Comment (0) Favorites

      Abstract:Software video conference system is quickly developed and widely applied because of its flexibility and economy with PC CPU rapidly increasing and net width expanding. Anhui meteorological bureau adopted V2 software video conference system based-on current situation, local requirement and existing video conference system. The paper introduced the construction program and operation mode of V2 software video conference system. It also introduced that the system is applied in ahui meteorological bureau’s weather forecast conference et .

    • Test Case Self-Register and Execute On-Demand System

      2011, 20(1):120-123.

      Abstract (2126) HTML (0) PDF 655.54 K (3729) Comment (0) Favorites

      Abstract:Test case is the central content of the test progress. In the actual test items, test case management and maintenance are important parts of the test session. The function of the case management tool is an important factor in the impact of testing quality and efficiency. Based on the analysis to current test case management tools, we give a system which can realize test case information self-register and case execute on-demand.

    • Design of Security Key Management Scheme Based on Encryption Role in Database

      2011, 20(1):124-127.

      Abstract (2383) HTML (0) PDF 535.04 K (3386) Comment (0) Favorites

      Abstract:Designing an effective safe management scheme to resolve the database encryption key for the allocation and management issues. By analyzing various key management mechanism,a key management scheme based on encryption role is designed. Security of key management scheme based on encryption role was analyzed,key management scheme based on encryption role was actualizd in database. Key management scheme based on encryption role greatly facilitated access jurisdiction management and greatly improved the key management efficiency.

    • Typical AJAX Design Patterns

      2011, 20(1):128-132.

      Abstract (1796) HTML (0) PDF 526.39 K (4611) Comment (0) Favorites

      Abstract:Ajax is a front technology in the Web. It Provides a new model of intemet interaction, which greatly expanded the capacity of Web applications. In this paper, we analyze the main differences between the Ajax design pattems and traditional Web applications, then put forward four typical Ajax design pattems which are Dynamic Loading, Cache-predictable Data and Content partitioned. We described the various design patterns on the aspects of the problems, typical scene and its architecture.

    • Storage Virtualization Integration with Technology on Shaanxi Telecom

      2011, 20(1):133-136.

      Abstract (1856) HTML (0) PDF 1.22 M (3311) Comment (0) Favorites

      Abstract:The paper introduces storage virtualization related concepts and techniques, and emphatically expounds the design thought and virtualization of realization of comparison and the construction project in shanxi telecommunication technology selection and realization ways, in practical application of theoretical into all kinds of technical and physical link reserves are also described, The use of technology, revitalize the fixed assets of enterprises to reduce the production cost, more important is to realize the dynamic management of heterogeneous data storage and management of unification

    • Moving Human Target Tracking Based on Kalman Prediction

      2011, 20(1):137-140.

      Abstract (1559) HTML (0) PDF 638.91 K (8265) Comment (0) Favorites

      Abstract:In the process of detecting and tracking moving human target based on visual images, in order to implement fast real-time tracking and make tracking more accurately, Tracking based on Kalman prediction is used according to Kalman filter’s recursion capacity to estimate the target location of the next time. Simulation analysis in 2-D space and indoor experiment are done. Both the simulation analysis and test result confirm that the tracking speed and accuracy has been improved effectively base on Kalman prediction which offers guarantee for the following image processing and analysis.

    • Design of Trolley Wire Haulage Motor Communication System Based on ARM and Spread Spectrum

      2011, 20(1):141-145.

      Abstract (1958) HTML (0) PDF 989.16 K (3392) Comment (0) Favorites

      Abstract:Be aimed at the problem of analogy carried telephone which used in production process has large real-time calling noise, effecting managing effect, suggests that motor vehicles-line communication system based on spread spectrum famous as anti-interference. It uses ARM and spread spectrum together and gives hardware of pronunciation communication module, extended memory of main control module, spread spectrum treating module, CPLD module and so on. The design of software uses object-oriented Programming. Practice shows that the system reaches the high real-time requirements while achieving high clarity.

    • Implement of Ethernet Ring Network Technique in Design of Campus Network Reliability

      2011, 20(1):146-149.

      Abstract (2047) HTML (0) PDF 715.94 K (4089) Comment (0) Favorites

      Abstract:From the benefit of network reliability, the essay analyze and contrast the reliability of Ethernet Ring Network. According to campus network users’ telecom requirement on the network performance, the essay, combining with existing equipment situation, puts forward to correct my school LAN topology structure by EAPS technology. The results show that: in the campus network environment, the reliability of adopting EAPS technique to construct Ethernet ring network is superior to other loop solution and it satisfies the users’ requirements to network telecom level. The method, being easy to implement and convenient to reconstruct in the existing network environment and good in practice, can be extended to the design of large-scale campus network reliability.

    • Application of Greedy Algorithm to Sequential Fault Diagnosis

      2011, 20(1):150-154.

      Abstract (1809) HTML (0) PDF 667.39 K (3787) Comment (0) Favorites

      Abstract:Diagnostic strategy is to have a certain order of test sequence. Diagnosis strategy aims to generate fault isolation, and to minimize testing costs. This paper introduces the test sequence generated by comparing the various algorithms and an algorithm on diagnostic strategies discussed Rollout algorithm.

    • Improving the Performance of Streaming by Using MTOM Encoding and Asynchronous Calls

      2011, 20(1):155-159.

      Abstract (2198) HTML (0) PDF 605.27 K (4360) Comment (0) Favorites

      Abstract:When formatting message using Text Encoding, the data transmission will increase between the client and service channel capacity. With the increment of the file length, throughput will increase linearly and its performance will be greatly reduced. As a new generation development architecture of network transmission, WCF (Windows Communication Foundation) has extremely powerful productivity in building the service-oriented application . This paper is to be modeled on this structure. The message layer constructs SOAP (Simple Object Access Protocol) package using MTOM (Message Transmission Optimization Mechanism) and the transport layer achieve streamming mode. The use of asynchronous calls can improve applications’ performance of response. This program can significantly improve file stream transmission performance.

    • Analysis of Illumination Treatment Methods in Face Recognition

      2011, 20(1):160.

      Abstract (2733) HTML (0) PDF 781.68 K (4808) Comment (0) Favorites

      Abstract:At present, Light has become a key factor of affecting face recognition rate, the common method of deal wih illumination were compared in face recognition, experimental results show that the illumination cone method and the approximate light cone light methods have strong robustness when have significant illumination changes. while the other algorithms in the changing illumination cases, the recognition rate has significantly decreased. Deal with three-dimensional face image algorithm, illumination cone algorithm and the spherical harmonic theory have been elaborated. Extensive in-depth efforts have been put into the research toward illumination treatment methods in face recognition. Their strategies, advantages/disadvantages and performances are elaborated. Several promising directions for future research have been suggested.

    • Optimization of BLAS Level 2 Based on Multi-Core Loongson 3A

      2011, 20(1):163-167.

      Abstract (2221) HTML (0) PDF 668.99 K (4360) Comment (0) Favorites

      Abstract:According to characteristics of Loongson 3A architecture and BLAS level 2, this article derives the parallel solutions from instruction level, storage level and thread level. We summarize some suitable optimization methods and make a quantitative analysis. Experiment shows that the single-threading performance of BLAS level 2 is increased by 20%, and the multi-threading speedup reaches to 2.5. All of these will give some help to the optimization of system software on multi-core Loongson 3A.

    • Solutions to DNS Data Security Threat

      2011, 20(1):168-172.

      Abstract (2154) HTML (0) PDF 497.58 K (7282) Comment (0) Favorites

      Abstract:DNS system is currently facing many security threats. This paper firstly introduces two major DNS security solutions: DNSSEC and DNSCurve, then conducts a thorough and detailed comparison, finally draws some conclusions which are that DNSCurve cannot substitute DNSSEC but can supplement it, and afterwards makes a proposal which is to deploy DNSCurve as a supplement after the deployment of DNSSEC.

    • WebGIS System Oriented E-Business Applications

      2011, 20(1):173-177.

      Abstract (2127) HTML (0) PDF 659.59 K (4554) Comment (0) Favorites

      Abstract:At present, WebGIS is becoming one of the hottest internet applications. For e-commerce domain, however,industry application mapping system is still relatively little. In this paper, we set metal industries as an example, and describe the design ideas and key technologies of web map application, which is developed in .NET development environment and based on MapABC API2.It can meet the needs of industry users of e-business applications.

    • Design and Implementation of Matrix Multiplication on GPU

      2011, 20(1):178.

      Abstract (2611) HTML (0) PDF 854.17 K (8012) Comment (0) Favorites

      Abstract:Matrix multiplication is a basic operation in scientific computing. Efficient implementation of matrix multiplication can speed up many applications. In this paper, we implement an efficient matrix multiplication on GPU using NVIDIA’s CUDA. The experiment shows that our implementation is as fast as the implementation in CUBLAS, and the speed of our implementation can reach the peak speed’s 97%, on Geforce GTX260.

    • Enterprise Information System Data Migration Methods

      2011, 20(1):182-184.

      Abstract (2186) HTML (0) PDF 481.41 K (4972) Comment (0) Favorites

      Abstract:Data is the basis of business operations, these data are related to the lifeblood of the valuable assets of enterprises. With the continuous development of business,Increase the amount of data is very impressive. Behind the massive amount of data, data management issues enterprises are facing mainly data integration, data security and other aspects. From the perspective of enterprise data management, explained migration of enterprise-class data problems, data migration methodology and the choice of common technical solutions.

    • CUDA-Based Volume Data Visualization Tool

      2011, 20(1):185-187.

      Abstract (2127) HTML (0) PDF 569.73 K (4497) Comment (0) Favorites

      Abstract:The fast development of the Graphics Processing Unit’s programmability and parallel computing power provides new solutions for visualization technology. Using ray-casting, a CUDA based interactive volume rendering tool is realized. Several rendering effects have been implemented, including alpha blending, iso-surface rendering, maximum intensity projection and X-ray projection. In order to improve alpha blending and iso-surface rendering effect, a per-pixel based Phong Lighting Model is added in. The experimental results show that the tool can make use of GPU's parallel computing capability and render high quality image. It’s interactive and extensible.

    • Creation of Sybase Database Service in Command Line Environment

      2011, 20(1):188-191.

      Abstract (1802) HTML (0) PDF 620.05 K (4501) Comment (0) Favorites

      Abstract:In the case of the administrator’s maintenance of remote system,they have to rebuild the database service. The Article provides the process of the reconstruction of the Sybase database system in complete command-line operation.

    • Mplayer Embedded Transplant

      2011, 20(1):192-196.

      Abstract (2045) HTML (0) PDF 494.50 K (4714) Comment (0) Favorites

      Abstract:The overall program of the portable multimedia player is proposed based on the Intel PXA27x microprocessor, and the hardware platform and the software cross-development environment of the system is buit up. The Cygwin running on Windows is chosen as Linux simulation environment, and the Mplayer as the transplant goal of the embedded system. With the Crosstool as cross-compilation tool the audio and video playback of the Mplayer is realized in the embedded system completely.

    • A Method Combined of Support Vector Machine and F-scores for Customer Classification

      2011, 20(1):197-200.

      Abstract (1852) HTML (0) PDF 525.99 K (4109) Comment (0) Favorites

      Abstract:A method combined of F-scores and support vector machine for customer classification was proposed, which can overcome the shortages of the existing customer classification method such as strict hypothesis, poor generalization ability, low prediction accuracy and low learning rate etc., and was applied to the problem of bank credit card customer classification. Empirical results show the validation accuracies of the final model can achieve 95% or more, which concludes that learning and generalization abilities of this model are excellent.

    • Method to Write Design Documents for Presentation Layer of B/S System

      2011, 20(1):201-204.

      Abstract (1952) HTML (0) PDF 682.29 K (3742) Comment (0) Favorites

      Abstract:Because there are obvious differences of the structure between the presentation layer of a B/S system and other software systems, it is difficult to clearly describe the structure of that layer of a B/S system by general methods. After analysing the characters of the structure of that layer, this paper introduced some standardization methods to write design documents which accords with the characters of the structure of that layer. It can be more clearly to describe the structure of the presentation layer of B/S systems by these methods. Now, these methods have been used in software projects with good effects.

    • Abstract Factory Design Pattern in the Application of MIS

      2011, 20(1):205.

      Abstract (1875) HTML (0) PDF 636.91 K (3735) Comment (0) Favorites

      Abstract:This article from the design pattern, analyzed the abstract factory pattern (Abstract Factory Pattern), the abstract factory design pattern in a hierarchy application of distributed systems, and abstract factory design pattern to management information system (MIS). Abstract factory pattern for the system architecture provides a very flexible and powerful dynamic extension mechanism, to reduce the coupling between modules, better implementation of software reuse.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063