2011, 20(2):1-4.
Abstract:Family Informationization is given more and more attention especially telecom operators of every country taking part in it. However, the perfect and mature family-oriented services and applications are very lacking. The paper designs a family-oriented community informationization application system based on analyzing the developing situation and family service requirement, and then analyzed the function of parts of the system.
ZHAO Peng-Fei , WANG Xiao-Hong
2011, 20(2):5-8.
Abstract:In order to resolve the problem of the heterogeneous integration of digital-printing data in network environment, on the basis of analysis digital-printing data characteristics, an overall framework of heterogeneous digital-printing data integration system is put forward in this paper. After the methods of framework development being studied, the implementation process of heterogeneous data access and extraction are mainly discussed. Finally, the virtual data center and query engine of integration system is studied, and an effective solution is provided in order to realize transparent access to data between the chains or the business sectors in digital-printing company.
MA Wei-Min , ZENG Yu-Xiong , YANG Yong-Ping
2011, 20(2):9-13.
Abstract:A cross-platform, distributive network measure system is introduced which is helpful for traffic measurement, performance evaluation and network planning and designing. The system is composed of three modules: controlling center, measurement probe and data storage server. It realizes both active measurement and passive measurement of network traffic. It realizes multi-task controlling and RIA application by adopting IPFIX standard and FLEX web technology. It is of good deployment, extensibility, compatibility, and data presentability.
2011, 20(2):14-17.
Abstract:The paper developed a platform to share resources of mechanical production based on PaaS considering small and medium company not have enough fund to build website to advertise production. The platform has a 4 layers architecture, applying X3D to display 3D model, SAI used to realize interaction dynamic. Thinking about the characteristic that mechanical product contain much non-structure data, files of X3D and 3D model that can be index via MechanicalProductionList table were not keep in database for saving space. The platform can meet the increasing of users for having the scalable ability. The platform render 3D models quickly, interactive strongly, can advertise production powerfully.
WU Si-Qi , DAI Yu-Xing , XIAO Bin , WANG Wei-Guo
2011, 20(2):18-21,124.
Abstract:In order to realize Ethernet and CAN bus’s data conversion, Constructed a interconnect system based on embedded technology between CAN bus and Ethernet. Hardware platform of the system let LPC2119 ARM7 as the core, including Ethernet interface module based on ENC28J60, CAN interface module and HMI interface module; Software platform used real-time operating system uC/OS-II and embedded LwIP protocol stack. The PC user interface was designed by VC++. Experimental debugging results showed, stable and reliable operation of system on voltage circuit breaker, will have certain practicability and commercial worth.
2011, 20(2):22-26.
Abstract:With massive open information resource welling up and large-capacity devices entering into private life, it come in true that everybody own gigabytes information. On contrast with traditional books, personal information resource derive from building by their hobby and demand, then it is difficult to manage personal information as managing books with the classification of chinese books. Since large information landed on personal storage devices, we can’t manage them efficiency by such as directories. It is a big challenge to manage personal information more efficiency in information management. The paper builds up file management system based classifying indexing to handle information management of personal computer, and introduces architecture, design and practice, also challenges of the file system.
2011, 20(2):27-30.
Abstract:Customer oriented Web-based modular product design system can demonstrate customer-centered design concept. The sofa design system is chosen as a sample to show how to make this be a reality. This system uses RIA as client solution which can make the user interface more lively, chooses Flexlib as component library. Spring is selected as AOP and IoC solution in the backend. Degrafa as the graphics engine, BlazeDS is chosen to make the communication between frontend and backend. So a cooperative operation environment for both customer and professional designer can be established. And the customer can self-design their style’s sofa in this environment.
2011, 20(2):31-34.
Abstract:Chis a script language of C/C++. Employing Ch script language to test communication equipment is simple, rapid, directly embedded, etc. RobotFramework is a test automation system based on the Python language. It has simple structure of upper and lower levels and flexibly reused keywords, which is independent from platforms and applications, and also highly scalable. Firstly, this paper studies and implements a new framework which is suitable for automated testing of embedded communication devices, it also integrates Ch script language into RobotFramework by using the highly scalable feature of RobotFramework. The integrated test framework has the advantages of both Ch script and RobotFramework.
LIU Yi , CHEN Xiang-Lan , LI Xi
2011, 20(2):35-39.
Abstract:Code conversion technology plays an important role in fields of code generation. This paper presents a template-based “attributes match–n, replace” algorithm for code conversion between programming languages. Using this method, we successfully convert OIL, which is one of important parts of OSEK specifications, to C.
REN Chuan-Lun , LI Zhong-Xian , NIU Xin-Xin , YANG Yi-Xian
2011, 20(2):40-44.
Abstract:An USB Token & Certificate-Based Authentication Protocol (TCBAP) was proposed, which implements single sign-on in distributed network and is secure against replay attacks. It ensures authenticity of users’ identity and the privacy of users’ ticket.
2011, 20(2):45-48.
Abstract:This article, first by e-mail on the harmful impact of the unit, analyzes the Qmail mail system used by security problems, and can set the security policy studies, through the mail system security policy on the actual improvements to enhance the message of this unit System resilience of the harmful messages to ensure the safety of users e-mail. In the main text of the current of the more common e-mail security policy analysis and research unit for my actual e-mail by setting appropriate security policies, improve the unit’s e-mail security.
2011, 20(2):49-52,156.
Abstract:To improve the performance of genetic programming algorithm, the niche technology used in genetic algorithm is applied to genetic programming. It is improvement of genetic programming algorithm, which is called NGP in the next text. First, the algorithm fits the data with the original training set. Second, it tracks the extreme points of the fitting function, and according to the dimensions of the fitting function, calculate the extreme points’ Euclidean distance in the independent variable dimension and order it. Then it selects the extreme points whose Euclidean distance is larger and does not exceed the number of the ten percent of the original training set, and added them to the original training set as new training set. Finally, it deals with new training set using genetic programming. In this paper, we use symbolic regression experiment to test the accuracy of the NGP. It illustrates the accuracy and effectiveness of the algorithm.
ZHONG Bin , YANG Xue-Zhou , LI Si-Min
2011, 20(2):53-56.
Abstract:In this paper, aiming at the problems of handover existing in the Fast Hierarchical Mobile IPv6(FHMIPv6) protocol in wireless sensor networks, an Improved Fast Hierarchical Mobile IPv6(I_FHMIPv6) protocol is presented. Performance analysis and simulation experiments presented in this paper show that this proposal outperforms the current schemes on aspect of handover delay and throughput.
ZHANG Hai-Bo , GUO Zu-Long , DONG Chao
2011, 20(2):57-60,148.
Abstract:Neural networks numerical equations of collecting/integrating and ntework founding were established respectively via analyzing the components and influencing factors of cultural information resources sharing project, main functions and implementation methods of artificial neural network. The features of various classified conter sharing modle were analyzed and researched respectively. The optimal sharing modle established in the paper is provincial scale as the super conters and city level as affiliated conters.
MA Su , LI Qing-Shan , CHEN Peng-Gang
2011, 20(2):61-65.
Abstract:AspectJ, which is one of concrete realization of AOP, can analyzes Java-procedure. We abstract various necessary information, then save it to the textfile and offer the next format-transfering function module. The information to be abstracted includes three aspects: calls, returns and returned values.
2011, 20(2):66-69,129.
Abstract:For interactive ray tracing, this paper proposes a hardware architecture design of ray-triangle intersection. First of all, a minimum storage ray triangle intersection was introduced. The algorithm uses minimum storage space compared to other algorithms, but with similar performance and convenient for hardware implementation. According to this algorithm, this paper presents the hardware architecture, several hardware design techniques such as multi-threading, folding and resource sharing are used to increase the hardware utilization. Experimental results show that this hardware architecture platform has a wider improvement in terms of speed and chip area, which was compared with other platforms, which provides an effective solution for interactive ray tracing.
ZUO Shuang-Yong , CHEN Guang-Xi
2011, 20(2):70-74.
Abstract:This article presented a subject trust model based on fuzzy comprehensive evaluation, and gave the concrete method of realizing the model to evaluate the trust degree of a subject in the network. The article could confirm the weights of evaluation factors dynamically by means of Analytical Hierarchy Process(AHP), and drew into the weights that expert had made for evaluation functions, to make a twice comprehensively evaluation for the first consequence. Example analysis showed the correct, novel and practical value of the method.
PAN Zhi-Fang , YANG Feng , SHAO He-Hong
2011, 20(2):75-79.
Abstract:The paper analyzes vowel data using reduced-rank linear discriminant analysis (RRLDA), reduced-rank quadratic discriminant analysis (RRQDA) and principal component analysis plus linear discriminant analysis (PCA+LDA). Then it drew some curves of false classification about the three model. A curved surface of the best classification has drawn for RRLDA and PCA+LDA after reduced rank to two dimensions. From the result, it can be conclude that RRLDA is good than PCA+LDA. The false classification of RRQDA is considerably big, because PCA ignores the information of classification about data and only disperses data during reducing rank. Simultaneously these curves prompts RRLDA owning the best generalizing ability when its dimension is 2 in subspace, and PCA+LDA owning the best generalizing ability when its dimension is 4 in subspace, and RRQDA owning the best verify error rate in tenth dimension.
2011, 20(2):80-84.
Abstract:With the explosive growth of web message, personalized information service becomes a focus for researchers, user interest model is a key technology in personalized service, this paper research tag-based User Modeling contrary to the shortcomings of the current user modeling and the extensive use of tag. Firstly, through some experiments prove that the tags which user using contains stable interest and other characteristics about tags distribution; then presents a weighted tree from coarse to fine granularity describes the user model. To improve the timeliness of service establish weighted frequent itemset table for often used together tags for each user. The model avoids the complex process of extracting key words and expresses user’s interest from the user’s point of view, experiments show that the model can improve the quality of personalized service.
2011, 20(2):85-90,84.
Abstract:In recent years, credit issue has already become an important topic which is focused by the whole society. It is necessary to establish personal credit evaluation system for college students, which will help students be guided and supervised to attention their personal credit record, improve their personal credit behavior, also will promote the job of college student loans and employment etc. In this paper, we used PSO-BP algorithm to construct the model of personal credit evaluation for college students, which was used to optimize the BP neural network. It overcomes the inherent of BP, such as its convergence speed is slow, the result is easy into the local minimum, and initial parameters are difficult to determine. Through simulating by Matlab, it showed that PSO-BP accelerated the convergence speed, improved the generalization ability of BP model. PSO-BP model is obviously superior to BP model. PSO-BP model has certain practical significance in personal credit evaluation system for college students.
2011, 20(2):91-95.
Abstract:In order to balance the energy-consumption of nodes of the wireless sensor networks, and then prolonging the life-time of the wireless sensor networks, a minimum spanning tree based energy-balancing multicast routing algorithm is proposed. This algorithm considers the nodes’ position and energy information and introduces the modifying factor and path-blocking technology when selecting the forwarding nodes. Simulation experiments show that the proposed algorithm can effectively balance the energy consumption of sensor nodes, thereby prolonging the lifetime of networks.
2011, 20(2):96-99.
Abstract:The flaws of traditional cache invalidation reporting strategies are with poor bandwidth efficiency and extensive electrical energy consumption. Aiming at these problems, we proposed a new broadcasting strategy which partitions the invalidation report dynamically. By considering the query ratio, refresh rate and the size of data items, this strategy tries to broadcast the updating data items through different invalidation mode. It was proved that the new strategy is superior to the traditional cache invalidation report strategy in terms of bandwidth efficiency, electrical energy consumption, and the query delay.
2011, 20(2):100-103.
Abstract:Selective recover allows a self-healing database to undo only errors/intrusions and those suspect transactions affected by errors/intrusions, while preserving the unaffected transactions, after being compromised by a human error or a malicious attack. This paper presents a new selective recovery mechanism which records inter-transaction dependency information, before image dates written by each transaction and transaction statement, respectively by inter-transaction dependency log, write log and transaction statement log. The database can restores its consistency after being compromised.
WANG Ling , CHEN Zhong , CHEN An
2011, 20(2):104-108.
Abstract:This article provides a technical method for ADR monitoring. By using qualitative analysis of Data Mining technique, ADR case reports were processed and analyzed by using Modeler. The qualitative analysis of data mining method is a useful attempt for ADR monitoring.
WEN Lu , DAI Yu-Xing , WANG Wei-Guo , WANG Xing-Gang
2011, 20(2):109-112.
Abstract:The design of an electrical fire monitor system in industry base on the PROFIBUS protocol was proposed, according to the demands of intelligent control system in industry. Modularization was adopted in this design and the whole system was divided into two module, monitor and protocol conversion respectively. The main circuit diagram of hardware and software was given and the human-machine interface of monitor system was designed by using configuration software of WINCC and STEP7 in this paper. The practical run result has proved the design was feasible, the system was reliable and timely and it had good extensibility.
2011, 20(2):113-115.
Abstract:Long-distance monitor and control pattern based on Internet/Intranet is given more and more attention. However, long-distance industrial control result a lot of problems. One of these typical problems is its difficulty to regulate the transmission time on the Internet. Just because of them, some industry enterprise asking for high real time ability meet with lots of difficulties to realize long-distance control on the Internet. But they also cry for experts’ online instructions by reason of craftwork and technique complicacy. Aiming at ammoniacal synthesis manufacture technique, an ammoniacal synthetical optimization online instruction system based on GIS is researched and developed. The experiment shows the research can help people to solve complicated producing problem.
QI Chang-Xing , DU Qing-Dong , WANG Hong-Wei
2011, 20(2):116-119.
Abstract:Aiming at the professional training teaching for undergraduates, this paper discusses a professional training model oriented to the software delivery process. According to the model and flow, it designs the professional training teaching management system of undergraduate. It describes the platform structures of the system and the functions of the modules in the different platforms, provides the indexes for evaluation and algorithm for calculate the final score in the Professional Training, and finally, analyzes the score after completing the professional training. The results show that this system can significantly improve the ability of students to grasp the software project and software development skills, and facilitate the teachers to grasp the direction of teaching and analyze the problems to improve teaching quality during the process of the professional training.
WANG Zhi-Jun , WANG Shi-Long , REN Heng-Bin , CAI Bin
2011, 20(2):120-124.
Abstract:Considering the disadvantages of the traditional development methods for small-and-medium-sized Web applications, the presently mainstream lightweight frameworks based on Java EE were studied, and a new solution based on AOM-Spring-Hibernate was proposed. The UI design and business logic were totally decoupled by the Inversion of View Control(IoVC) technology of AOM in the presentation layer. Spring was used to as the kernel framework in the business layer. The tables of the database were persisted into Java Bean by Hibernate. Based on the solution, the lean production management system in a multi-specification and small-batch production environment was developed. Finally, application was carried out to validate the feasibility of the system.
2011, 20(2):125-129.
Abstract:Based on the theory of role-based access control, a method of finely granular access control in object orient programming is proposed in this paper. Introducing the idea about finely granular access control through Inherit attributes of object, decomposes the access privilege from menu to atom control. The privilege is assigned to role, then access control can be manage easily by defining the user of the role to simplify management of permissions. Finally, the specific implementation process has been applied in practice to verify the correctness and feasibility of this method.
LUO De-Rong , HUANG Zhen-Hua , SI Zeng-Qin
2011, 20(2):130-133.
Abstract:In the permanent magnet synchronous motor speed control system, under the VB environment, Use the RS- 232 / RS - 485 serial communication which is used by the MODBUS to make the computer(pc) communicated with the TMS320F2812. Expounded software design of the host (pc) which is in the VB environment and communication with TMS320F2812, by a way of communication with the crc check, to ensure the reliability of communication, fully uses system resources ratio nally, raise efficiency and characteristics of com munication. Meantime, use the function of VB’ store data, we can find out the historical data of motor easily. Through practical operation, based on vb environment, use of serial communication system has high relIab ility and practicability.
XIA Zheng-Long , YIN Xin-Huai , OUYANG Ji-Yue , ZHONG Yan-Wen
2011, 20(2):134-136.
Abstract:A display method based on SharpMap technology is introduced in this paper. With this method, over 2300 discrete rainfall points can be shown in choroplethic map. This method reads geographic information data and basic information of station to generate map layers and data layers, then read precipitation data to generate choroplethic map through the analysis of the contour line. At last, these layers will be displayed in a certain order to show the precipitation data. This method also can be applied to analysis other meteorological data.
2011, 20(2):137-140,210.
Abstract:Safety is essential to the interaction process between client and application server in data service. In a number of services ongoing, the authentication between client and application server is limited to the two-side interaction, so it is in a lower level both security and versatility. This paper is based on GBA process, introduces BSF, designed and implemented a method of three-way authentication. This method has high security features and versatility. Therefore, it can be used for both existing businesses and new businesses.
ZHANG Jin , WANG Chang-Feng , LI Xia
2011, 20(2):141-143,164.
Abstract:This paper proposes a semantic-based approach to abstract and encapsulate business mode. The whole approach constructs a library of component and concept dictionary which establishes the mapping relationship between phrases of the business and concept of the component. Commend apposite components to user by conversational mode. User selects the software components, draws support from quadratic development platform to complete client utility system.
2011, 20(2):144-148.
Abstract:The core function of Enterprise Service Bus(ESB) is message transformation and routing. In order to overcome the inefficient and low reliability issues in the ESB which is caused by using static routing modes, this paper proposed a dynamic reliable model-DRRSR from the two aspects of modifying the path contents which stored in the routing table and how to re-locate service providers when they has problems, based on the analysis of the DRSR model and DRESR model. Then gives a detailed description of model’s function and describes the realization of several modules. At last, from the two aspects of theoretical and practical test, we compared and analyzed the model with the previous model from the two aspects of efficiency and reliability.
2011, 20(2):149-151,79.
Abstract:A mutual authentication scheme based on elliptic curve cryptosystem is proposed, and mutual authentication is rapidly realized between user and user or between user and server. Elliptic curve cryptosystem requires less computional power, memory, delay and communication bandwidth compared to other cryptosystem, because it uses shorter secret key length on condition that security level is same.
WANG Hai-Bo , WANG Xian-Peng , WANG Fang , CHEN Zhi-Guo
2011, 20(2):152-156.
Abstract:CluStream algorithm has poor quality of clustering for non-spherical clusters, at the same time, most grid-based clustering algorithms improve the efficiency of clustering at the cost of reducing clustering accuracy. The paper gives a new kind of clustering algorithm for data stream—GTSClu, it is the minimum spanning tree data stream clustering algorithm based on grid, which is divided into online processing and offline clustering, combining with grid resolution and minimum spanning tree techniques. GTSClu algorithm cannot only find clusters with arbitrary shape and amount, but also deal with noise data effectively, the efficiency and quality of clustering is improved.
LOU Zhong-Wang , YAO Ming-Hai , QU Xin-Yu , RUAN Tao-Tao , ZHU Xiao-Ming
2011, 20(2):157-160.
Abstract:The recognition based on vision to extract features from abnormal human behaviors usually utilize straightforward sharp movement information or traditional PCA methods. The former lacks of information and the latter has ignored nonlinear information in data. Therefore, this paper will use KPCA in recognizing abnormal human behaviors to solve the aforementioned problems. Since KPCA has some defects in extracting feature abnormal behaviors, W2KPCA-KNN algorithm is proposed, which is to do weighting in both feature extraction and classification respectively. While retaining behavioral information in the image, it improves recognition accuracy and satisfies the technical requirements for abnormal behavior recognition system. The experimental comparisons show that this algorithm outperforms traditional KPCA and K-Nearest Neighbor classifier on both feature extraction and classification.
HUI Xiao-Wei , ZHANG Ping-Ping
2011, 20(2):161-164.
Abstract:Pervasive computing applications on all aspects of computer science have raised new demands and challenges. In the system software, a variety of heterogeneous devices demanding for interactive collaboration have brought huge Challenges for system software. This article aims to present a interactive and coordinate software architecture which can meets the requirements for pervasive computing. Based on which, we also present an Interactive and coordinate model and a method of cooperation, we also present the response algorithm.
YUAN Sheng-Gui , FANG Dong , LI Xiao-Kai
2011, 20(2):165-168.
Abstract:This paper presents a design of automatic Monitoring Software for a Sewage Factory based on the industry control software platform of Intouch. The design and realization of monitoring interface, data communication, storage and output of datas and reports were introduced in detail. The results indicate that the new system runs precisely and steadily.
2011, 20(2):169-172,244.
Abstract:Python is one of the most popular script language, but the performance is a problem. In this paper, we evaluated the performance of integer arithmetic difference between the Python and C languages by experiment, and analyzed the causes of performance difference from the virtual machine source code level. The paper summarizes several common methods of Python script performance optimization, by one of these, we achieved good results on test.
2011, 20(2):173-177.
Abstract:Nowadays, with the rapid development of the software industry, the importance of exchange information among different systems has become more and more prominent. While the protocol formulation and the conversion from the exchange protocol to the systems’ inner protocol is inevitable. At this point, the formulating of a service-unrelated communication-protocol, can solve all those troubles in the process of developing new systems, when the developers only have to concerns about the service-related parts, and thus the time for the system to be developed being shorten. The design of different message content formulates in the protocol, also brings flexibility and applicability to the protocol.
HU Jun-Hao , HE Chun , ZONG Zhu-Lin
2011, 20(2):178-181.
Abstract:This paper presents a novel approach of generating system testing automatic test cases from UML design diagrams. This method can be applied to any system modeled by UML. Associating Graph Theory innovatively, we abstract use case and sequence diagram and define coverage criteria to generate test cases in our test case generation scheme. Through two levels traverse, generate test cases automatically and satisfy the coverage criteria stated in this paper. The test cases thus generated are suitable for system testing and to detect operational, use case dependency, interaction and scenario faults. The coverage reaches at its maximum level, covering all use cases, use case dependency, and each sequence of message path of interaction.
2011, 20(2):182-185.
Abstract:For the seeded-K-means and constrained-K-means algorithm limitations that complete category information in labeled data is required, this paper put forword an semi-supervised K-means clustering algorithm based on incomplete labeled data, focused on selection of the initial cluster center of unlabeled category. We gave a definition of the Best Candidate Set of cluster center of unlabeled category, proposed a new method that selecting initial cluster center of unlabeled category from the Best Candidate Set using K-means. Finally, a complete description of semi-supervised clustering algorithm based on the new method is given, the validity of the new algorithm is verified by experiment. Experimental results show that the proposed algorithm is superior to existing algorithms not only in clustering effect and in execution speed.
2011, 20(2):186-188.
Abstract:As the tobacco industry facing the dual challenges of the market and national plans, and automatic arrangement in tobacco production line becomes more and more important, optimizing production schedule becomes an important means to improve production efficiency. The paper analyzes the business process and quality indicators of automatically tobacco production, modeled production section, process cabinets, etc. in the tobacco production line, and in the end puts forward the solution based on backtracking algorithm.
FENG Chi , GAO Xiao-Cheng , CHEN Rui-Bin
2011, 20(2):189-192.
Abstract:The traditional temperature measurement methods are not suitable for high-temperature objects. However, objects at different temperature have different characteristics of thermal radiation, so it is a practical approach to calculate the temperature of the object according to the radiation light. The colorimetric temperature measurement is calculated by radiation intensity of two different wavelengths lights, and it reduces the errors which are created by the emission rate and signal transmission. It can greatly reduce the development cycle and provide a good interactive interface by using the virtual instrument for development of measurement system. The colorimetric temperature measurement which is developed on the virtual instrument technology platform not only implement real-time monitoring of temperature, but also transfer temperature data and control signals by accessing network via Ethernet interface.
2011, 20(2):193-197.
Abstract:High precision of the prediction of searching initial point can reduce the number of search points to improve the search speed and search precision. The median, the mean, the left block, the SAD (Sum of Absolute Difference) comparison and other methods of the prediction of searching initial point were theoretically and experimentally analysised. And according to The correlation of adjacently blocks’ motion vectors and the characteristic of the center-biased characteristic of motion vectors in image sequences, a novel method of the prediction of searching initial point was proposed. The novel method assigns different weights to the adjacent blocks. Experimental results show that the novel method gains better reduction(29.24) in the number of searching point over the different kinds of criterion testing video sequence and impoves 1.71dB in peak signal to noise Ratio(PSNR).
2011, 20(2):198-201.
Abstract:This paper aims at the multidimensional conflict with the Teacher, Time, Classroom and Class in the curriculum schedule. Through weakening and studying the complexities of the conflicts, it gives curriculum model and the algorithm of curriculum schedule in university, and can assess education resource in university according to the algorithm, offers the decision-making for management of the university theoretically.
CHEN Qin , ZHU Tao , ZHANG Min , WEN Xiao-Liang
2011, 20(2):202-206.
Abstract:With regard to the problem of slow progress and high overhead, when constructing a tree-like CDS in a fast-moving ad hoc networks, this paper puts forward a Zone-based distributed heuristic approximation algorithm for minimum connected dominating set(ZBCDS). ZBCDS defines the concept of potential-rank and candidate nodes, on the basis of calculating maximal independent set, optimizes the zone partition and the adjustment along the zone borders via nodes judging their own potential-rank, finally reaches the aim of rapidly and efficiently reconstructing CDS as topology change. Experimental results show that ZBCDS can rapidly and efficiently construct CDS, with smaller size of CDS and less time complexity.
2011, 20(2):207-210.
Abstract:Wireless sensor network usually consists of a large number of tiny sensor nodes, it can collect data in a variety of environment, it is limited by the battery to carry the energy to supply energy, usually deployed in a complex regional environment, and even the staff can not reach an occasion. Therefore, sensor networks nodes have limited capacity, and can not be replaced, how the efficient use of energy is the primary challenge faced by sensor networks. MAC protocol is the bottom of sensor network protocol for sensor network have a great impact on performance. The paper discusses wireless sensor network in a self-organizing wireless sensor network protocol--the basic idea of SMACS protocol, to study the main reasons for energy waste caused by the nodes, and provides a new, more energy efficient SMACS agreement improved algorithm for super-frame.
2011, 20(2):211-215.
Abstract:Feature space has the high-dimensional problem in text mining. This paper presented a new description method of text feature based on word clustering. The purpose is to mine semantic association between words using machine learning, then to construct the concept dictionary in specific areas dynamically, finally to describe the text feature with the concept constructed. This method analyzes the co-occurrence of words in training corpus firstly, without using theme dictionary, then generates word cluster expressed in seed words which represents a concept of theme by word clustering, finally takes the seed words as text features. The experimental results indicate that this method not only reduces dimensionality of feature space but also overcomes the limitations of the concept in HowNet, and improve the performance of text categorization.
ZHONG Bin , WU Yi-Song , LI Si-Min
2011, 20(2):216-218.
Abstract:In this paper, we focus on reducing the power consumption of wireless sensor network. We extend LEACH (Low-Energy Adaptive Clustering Hierarchy)’s stochastic cluster-head selection algorithm by a deterministic component to reduce energy consumption. Simulation results show that our modified scheme can extend the network life around 21.9% for First Node Dies (FND) and 40.35% for Last Nodes Dies (LND).
2011, 20(2):219-222.
Abstract:USB(Universal Serial Bus) is currently the most popular interface standard using on computer peripheral devices. In order to develop device driver for the USB device in advance, we introduce how it use DSF(Device Simulation Framework) to simulate USB devices that are not physically existed. The steps of developing a simulated device mainly include: build the dynamic link library for the device in order to describe the functional feature of the device using a COM complied language, then using a script file to describe the behavior of the simulated device. Above the operating system level, there is no difference between the simulated devices and the physically existed devices, and the simulated device can be used for developing and testing the drivers or the applications.
2011, 20(2):223-225.
Abstract:This paper makes an abstract Analysis of traditional intrusion detection system evaluation method and proposes an intrusion detection system performance evaluation method based on virtual machine technology. The method is used to build attack Vmwre software simulation environment. And simulation environment to achieve attack, testing and comparison of indicators of IDS verify the feasibility of the program.
2011, 20(2):226-229.
Abstract:A new method of software project risk mangement is presented, which uses the Bayesian networks to infer the probability of risk occurrence and the impact of risk simultaneously. The method can assess risks continuously and take proper measures to respond to risks during software project. Practice proves that by introducing this method into software development process, project risks will be well-managed and project success rate will be improved.
WANG Cheng-Liang , GU Min-Jie , CHEN Juan-Juan
2011, 20(2):230-233,26.
Abstract:Financial system demands high standard for failure diagnosis, and financial products in this system have a whole set of instruction documents covering design to production and also detailed parameters, which are all clearly defined. Based on a brief introduction of PDM and FMEA, the paper proposed a method of failure tree generated by PDM combining with FMEA to diagnose and maintain financial system. This method can execute diagnosis by the information of formation, function, and maintenance of financial products, integrated with diagnosis information acquired in product design period. It would make the processes of product design, failure diagnosis and product maintenance as an organic whole. The paper illustrated in detail the principles of knowledge and regulation for creating failure tree generated by PDM combining with FMEA, and the method was further testified on ATM case.
2011, 20(2):234-235.
Abstract:Many application systems face the problem of data reporting. This paper proposes one method based on Excel template-print. By batch copying and dynamic modification of Excel template, the approach can make a large amount of data reporting quick, simple and criterion. Compared with the other way by experiments, our method has good performance for processing more than ten thousand data records.
LI Wen-Jiang , YANG Li-Jian , WANG Guo-Zhen , MU Chang-Da
2011, 20(2):236-239.
Abstract:This paper introduces a new intelligent sensor principle, integrated design and application. With PIC16F687 microcontroller as the core, through the Modbus communication protocol using RS-485 bus to realize remote control, telemetry functions. The intelligent sensor has the advantages of having simple hardware, small size, high accuracy, being adjustable, etc., and it is easy to implement cluster control.
2011, 20(2):240-244.
Abstract:Software testing is an important means to ensure quality of software and to improve reliability of software. But with the volume and complexity of software continues to increase, people constantly improve the software quality requirements. Software testing occupies an more and more important position in software development. At the same time, software testing is becoming more and more difficult. This article introduces the outline of software testing including the definition, phase, process model and purpose of software testing, then analyses and summarizes the strategies, methods and automation.
RUAN Tao-Tao , YAO Ming-Hai , QU Xin-Yu , LOU Zhong-Wang
2011, 20(2):245-253.
Abstract:Vision-based human motion analysis is receiving increasing attention from computer vision researchers. It becomes the hotspot of the field of image analysis, psychology and artificial intelligence. It has a wide application in intelligent video surveillance, virtual reality, user interfaces and motion analysis. In this paper, moving target detection, classification, tracking and human action recognition are overviewed. We analyze some problems and challenges. Finally, some research directions in the future are discussed.