• Volume 20,Issue 3,2011 Table of Contents
    Select All
    Display Type: |
    • Basic Information Platform for Dynamic Monitoring and Control of Military Railway Transportation System

      2011, 20(3):1-4,10. CSTR:

      Abstract (2052) HTML (0) PDF 680.37 K (3332) Comment (0) Favorites

      Abstract:Based on the request of developing Dynamic Monitoring and Control of Military Transportation System, design concept and many development methods, the basic information platform is designed. According to demands of function, platform is analyzed and designed. Some key solving schemes are presented, such as data encoding, picture data encryption and decryption and space basic information maintenance.

    • Architecture Design of Infrared Spectroscopy Software

      2011, 20(3):5-10. CSTR:

      Abstract (2788) HTML (0) PDF 1.39 M (3742) Comment (0) Favorites

      Abstract:The IR analysis software lacks a unified open software architecture model currently, this resulted in a series of problems, software stability, data format interoperability and software scalability was poor. The article aimed at this situation, proposed a flexible and reusable IR system architecture design. In the software data structure, referenced the JCAMP-DX standard spectral data format, re-designed the software underlying data structure to meet the spectral data processing needs. In the system design, the system was divided into three separate layers: UI layer, spectral data processing logic layer and instrument control layer. The IR analysis systems adopted the modular design, which can be customized according to functional requirements. Spectral data processor use multi-core design, this makes it is easy to extend and update the chemometrics algorithms.

    • Design and Implementation of Rating Function Module to IP Media Subsystem Online Charging System

      2011, 20(3):11-17. CSTR:

      Abstract (2370) HTML (0) PDF 703.68 K (3441) Comment (0) Favorites

      Abstract:In the system of 3G IMS, online charging is an important module for charging. The rating function is a core founction of online charging system. Because 3GPP IMS charging system has to deal with complex charing intent with many services and applications, there is a high standard for desingning and implementing a rating function module. It is a hotpoint for studying rating funtion. This article suggests and realizes a model for rating funtion based on analyzing online charging system, defines complex application and service. Also, it specifies the tariff request module in rating function. At last, we test IPTV service based on the online charging system which uses this rating funtion, the testing result proves the model is feasible.

    • Multithreading Technology Office Object Model Scoring System

      2011, 20(3):18-22. CSTR:

      Abstract (2292) HTML (0) PDF 625.54 K (3688) Comment (0) Favorites

      Abstract:A Multithreading Technology software can use the system resources more efficiently. Office document scoring which is based on the Object Model has accurately achieved to analyze and compare to the test documentation, in order to achieve automatic scoring. Multithreading Technology Office Object Model Scoring is accurate, stable and efficient through program practice and application test.

    • Sales Contract Management System Based on UML

      2011, 20(3):23-26. CSTR:

      Abstract (2002) HTML (0) PDF 1002.58 K (5329) Comment (0) Favorites

      Abstract:The application of UML is discussed in Sales Contract Management System modeling based on the software development project. Beginning with the requirement analysis, several kinds of models have been built by StarUML. These models include the user requirement model, object structure model and behavior model.

    • Machinery Manufacturing Warehouse Real Time Management

      2011, 20(3):27-31. CSTR:

      Abstract (2315) HTML (0) PDF 840.41 K (4324) Comment (0) Favorites

      Abstract:Through the research and analysis of the past procurement and flow of taking materials, we put forward the concept of real-time warehouse management. During the process of taking materials, storing issue, canceling after verification for the warehouse and warehousing, with the use of wireless bar code scanning technology, the enterprise can greatly avoid the subjective causes that lead to taking and storing materials error because of the human factor; and in the procurement process, using relevance rules Apriori algorithm data mining on taking material to achieve the guidance on the procurement scheme to reduce the blindness. Thus it can realize the real-time warehouse management, improve storage efficiency and instantaneity and accuracy of inventory information.

    • Mobile Advertising Order System Based on OSGi

      2011, 20(3):32-35,44. CSTR:

      Abstract (1868) HTML (0) PDF 773.25 K (3352) Comment (0) Favorites

      Abstract:Building applications from components is the ongoing trend. Lack of the theoretical basis and guidance to separate the software modules, the paper represents the module partition approach. It divides fine basic units based on software data model, and then according to the service interaction frequency and weight between modules, It analyses the relativity among the basic units. Finally, it assembles the basic units to module using fuzzy dendrogram. An example named order system in Mobile Advertising platform based on Open Services Gateway Initiative’s framework (OSGi) was used to illustrate the rationality and validity. The approach is suitable for simple applications based on data model.

    • BBS Syetem Based on Web

      2011, 20(3):36-40,182. CSTR:

      Abstract (2280) HTML (0) PDF 650.79 K (3975) Comment (0) Favorites

      Abstract:From the system functions, architecture, and system implementation aspects related technologies used introduced WEB-based BBS system architecture design. The system uses the UML techniques for system design, software development using ASP, ADO and other technologies to achieve a complete BBS system

    • Batch Extraction Information System from Dynamic Web

      2011, 20(3):41-44. CSTR:

      Abstract (1781) HTML (0) PDF 630.82 K (3358) Comment (0) Favorites

      Abstract:In order to respond some extensive requirements for getting information from Web pages, some key techniques such as URL, HTML page and HtmlParse API, were analyzed. Getting yellow page information from Google maps was taken as an example, and according to related techniques and steps of abstracting information from it, the system prototype was designed and implemented. Some related problems were presented, and its corresponding solution were discussed too.

    • Research and Development of Sensor Network Accessing Module in Home Gateway

      2011, 20(3):45-48. CSTR:

      Abstract (1961) HTML (0) PDF 805.65 K (3720) Comment (0) Favorites

      Abstract:This paper gave the Sensor Network Accessing Module Demand Analysis for Internet of Things Home Gateway in the architecture of Internet of Things, proposed the development approach of fulfilling the Sensor Network Accessing Module in the way of serial accessing Sensor Network Sink Node, based on the hardware and software platform of the Internet of Things Home Gateway and the Sensor Network, realized the Sensor Network integration in the Internet of Things architecture.

    • Revision Hops Within a Certain Space Range Dv-Hop Localization Algorithm

      2011, 20(3):49-53,69. CSTR:

      Abstract (2087) HTML (0) PDF 581.50 K (3483) Comment (0) Favorites

      Abstract:This paper proposes an algorithm of revision hops within a certain space range (RHWSR) to address the problem that Dv-hop localization algorithm of wireless sensor networks produces so much error of hops estimation. According to the localization principle of the Dv-hop algorithm, this paper proposes two improvements including the estimation of average single hop distance, the calculation of distance between unknown nodes and reference nodes. The localization performances are analyzed in theory and with simulations at different communication radius and the rate of anchor nodes. The results show that the proposed improvements can greatly enhance the localization accuracy of the unknown nodes. In addition, the proposed schemes do not change the localization process of the Dv-hop algorithm, and hence they need no further communication resource. It is an optional scheme of localization.

    • A Blind Watermarking Algorithm Based on B-rep for CAD Models

      2011, 20(3):54-59. CSTR:

      Abstract (1883) HTML (0) PDF 592.00 K (3798) Comment (0) Favorites

      Abstract:With the appearance of informatization period, digital watermarking is attached importance to a great extent in these facts such as copyright protecting, source authentication, private detection and on, and becomes one hot research field of information security. This paper proposes a blind watermarking algorithm based on B-rep for CAD models, the algorithm embeds watermarking aiming at NURBS surfaces or curves, and its merit is preserving the model’s shape exactly. Firstly, we go through the model for obtaining all NURBS primitives, and order these primitives by its length, then use interfacing knot insertion method to embed generated watermarking into ordered primitives. Semi-Blind watermarking is improved and becomes All-Blind watermarking, so we can directly extract watermarking from corresponding ordered NURBS curves, and don’t need provide origin model and origin watermarking messages. At last, through comparing the similarity both the extracted watermarking and origin messages to test if this watermarking is distorted or not. Results show blind algorithm can embed high-capacity watermarking into models, and reduce the time of extracting watermarking.

    • Security Spectrum Management Scheme in Ad Hoc Cognitive Radio Networks

      2011, 20(3):60-63. CSTR:

      Abstract (2028) HTML (0) PDF 521.29 K (3229) Comment (0) Favorites

      Abstract:Point to the security of four sub modules in spectrum management, with the cryptographic protocols that include zero-knowledge proof, group key management, bit commitment proof and security multi computation design a novel scheme to protect the network security, which has the four substantial problems of primary identity, secure channels, information share and shared channels. This scheme not only protects the security of spectrum management, but also improves the efficiency of security management, which is more complete and flexible than the physics scheme.

    • A Source Peer Selection Algorithm for Linear Dependent Redundancy Optimization

      2011, 20(3):64-69. CSTR:

      Abstract (2189) HTML (0) PDF 568.59 K (3746) Comment (0) Favorites

      Abstract:One advantage of the network coding based P2P live streaming system is that multiple source peers can serve the requests efficiently without explicit cooperation control. However, the lack of cooperation also brings redundant data due to the linear dependence, even when the Galois field of the coding coefficients is large enough. In this paper, we first analyze the causes of the redundant data. Then, we propose selecting active source peers from the source set given by the tracker to handle this problem. Active source peer selection problem can be regarded as a variant of 0-1 knapsack problem, which is NP hard, such that we design an approximation algorithm to compute the solution. Through formal proofs and simulations, we verify the validity of the algorithm, which can further improve the QoS of the P2P live streaming.

    • Research and Improvement of TFRC Congestion Control Mechanism

      2011, 20(3):70-73. CSTR:

      Abstract (2191) HTML (0) PDF 522.87 K (3770) Comment (0) Favorites

      Abstract:The congestion control mechanism TFRC, which is widely used in current real-time streaming media, is analyzed in this paper. A proposal aiming at the requirement for short delay and jitter of real-time streaming media has been made to adjust to the transmit rate of the sender to the change of single trip delay jitter. Meanwhile, a dynamic adaptive method is used in the determination of the jitter threshold. The result of simulation indicates that with the improved algorithm the jitters has been reduced remarkably and other related QoS has also been improved.

    • Performance Testing Tool for RTSP-Based Streaming Server

      2011, 20(3):74-79. CSTR:

      Abstract (5170) HTML (0) PDF 750.42 K (10990) Comment (0) Favorites

      Abstract:The attention on the streaming media applications based on RTSP protocol is growing, so the main issue we address in this paper is how to evaluate the serving performance of RTSP streaming media server. With comprehensive analysis of the performance metrics of streaming applications, we propose an approach to design and implement a Performance Testing Tool for RTSP-based Streaming Server. The tool creates the testing environment by obtaining parameters from the script of test case, utilizes multi-thread mechanism to create multiple pseudo-terminal instances to simulate a certain number of concurrent users for sending RTSP signals, receives media flow, analyzes RTP packets without decoding, and calculates the related performance metric values of the server finally. Experiments validate the efficiency and accuracy of the tool.

    • Interworking of MRBT Service in IMS and 3G CS Domain

      2011, 20(3):80-84. CSTR:

      Abstract (1968) HTML (0) PDF 1.22 M (3886) Comment (0) Favorites

      Abstract:IMS has been added to Telecommunication core network since 3GPP Release 5, which is committed to providing users with consistent services based on different networks. This paper briefly introduces the typical implementation and signalling flow of MRBT (Multimedia Ring Back Tone) service in IMS and 3G CS Domain, then it focuses on the interworking of MRBT services in these two networks.

    • A New Method for Pattern Generation

      2011, 20(3):85-89,97. CSTR:

      Abstract (2151) HTML (0) PDF 777.80 K (4387) Comment (0) Favorites

      Abstract:To address how to use computer-generated patterns with the Characteristics of ethnic minorities in Xinjiang is a challenging problem. A new pattern generation method is proposed and confirmed in the practicality of the method. First, a segmentation algorithm is used to extract different texton of pattern. Then, pattern similar transformation rules are designed to generate fractal texton matrix. Re-introduction of almost-Arnold transformation rules, the fractal texton matrix perturbation are brought into generation a new pattern. A variety of patterns are generated by extracting patterns texton and introducing transformation rules in the database of Xinjiang Folk Art pattern. The proposed method is simple and able to quickly generate a large number of patterns with different national characteristics patterns.

    • Implementation of the Pattern Matching Technical on FPGA

      2011, 20(3):90-93. CSTR:

      Abstract (3016) HTML (0) PDF 664.25 K (4007) Comment (0) Favorites

      Abstract:The pattern matching algorithm was mostly implemented based on software, but software realized of low efficiency, a design was applied to make the pattern matching algorithm implementation on the hardware. This paper combines the principle of the Aho-Corasick (AC) algorithm and the characteristics of FPGA, implements the Aho-Corasick (AC) algorithm on the FPGA. Then, it uses the Quartus II to validation and performance analysis for this design. The test results indicate that the design has high quality and is an effective solution to the fault of slow speed.

    • Design of Network Time Synchronization System Based on Network Satellite Disciplined Clock

      2011, 20(3):94-97. CSTR:

      Abstract (2369) HTML (0) PDF 636.21 K (4225) Comment (0) Favorites

      Abstract:In this paper, the design of an ARM + FPGA for network time synchronization server analysed the network time synchronization protocol. Researching use satellite clock solution to tame a network time server, tackled clock accuracy is not high and susceptible to interference characteristics, using PI regulator clock model Experimental results of the server can satisfy the power system synchronous timing of secondary equipment.

    • Daily Load Forecasting System with Segmented Multi-Model Combining Forecasting Method

      2011, 20(3):98-101. CSTR:

      Abstract (2044) HTML (0) PDF 568.66 K (4075) Comment (0) Favorites

      Abstract:Daily load forecasting is a basic role of power market. Most of load forecasting methods use one same model in one day, regardless of the change of load composing and characteristic at different time segments. A new segmented multi-model combining load forecasting strategy was proposed in this paper. According to different load composing and characteristic, 96 points daily load was separated into many time segments. At each time segment, a multi-model combining load forecasting, composed by multivariate linear regression, grey prediction, SVM and neural network forecasting, was used to forecast load. The forecasting results of a city in east China showed that, the MSE forecasting error of 96 points daily load is only about 1.78%. The method can satisfy the request of real power system well.

    • A Content-Based Retrieval Algorithm for Video Emotion Types

      2011, 20(3):102-105,79. CSTR:

      Abstract (2514) HTML (0) PDF 631.08 K (3504) Comment (0) Favorites

      Abstract:A novel content-based retrieval algorithm is presented for video emotion types recognition in this paper. Considering the fuzzyness and uncertainty of the human's cognitive behavior, we established the relation between low-level video features and high-level emotion types by the unascertained theory. The principle of video features selection and implementing method are introduced in detail in the part of video low-level emotional feature extraction. And the specific process of building the measure matrix and the degree of confidence method are discussed in the part of emotion type determination. Experimental results show that the proposed algorithm is feasible and and effective.

    • Usage Control Enhanced Access Control Based on XACML

      2011, 20(3):106-111. CSTR:

      Abstract (2423) HTML (0) PDF 669.28 K (3990) Comment (0) Favorites

      Abstract:Combining the feature of resource access control in the grid environment, this paper presents an access control model based on UCON, combined with XACML and SAML. The paper describes authorization policy about access control by XACML, combines SAML statement and request/response mechanism, executes access control decision based on user, resource and environment attributes, evaluates access request dynamically, and provides fine-grained access control and good interoperability.

    • Multi-Document Summarization System Based on Sub Topic Partition and User’s Query

      2011, 20(3):112-115. CSTR:

      Abstract (2053) HTML (0) PDF 537.40 K (3161) Comment (0) Favorites

      Abstract:A multi-document summarization method based on sub topic partition and user’s query is described in this paper. The similarity of sentences is measured by a thesaurus dictionary. Sub topics are found by sentence clustering and sorted by user’s query. Then sentences from all sub topics are selected by using a dynamic strategy of scoring the sentences. The experiment result indicates that the summarization has less redundancy and more information.

    • Design of Filter in 3D Cone Beam Reconstruction

      2011, 20(3):116-120. CSTR:

      Abstract (2192) HTML (0) PDF 892.33 K (4474) Comment (0) Favorites

      Abstract:This article analysises designes for several filters using in the approximate three-dimensional cone beam reconstruction principle, and analysises the effect of CT’s image quality. CT is an advanced imaging technology, and have been used in many fields. The current CT image reconstruction alrorithms mostly use filtered back projection method.Filtering is the core of this method. This article analysises and designes for several filters using in the approximate three-dimensional cone beam reconstruction principle. It analysises the different filter functions affecting the quality of CT image reconstruction according to the results of the projection data’s image reconstruction. These filters can be better to meet the requirements of the actual image reconstruction.

    • Embedded Vision System Based on Linux

      2011, 20(3):121-124. CSTR:

      Abstract (1821) HTML (0) PDF 586.71 K (3769) Comment (0) Favorites

      Abstract:The embedded technology was becoming more and more popular in various fields. Thus, embedded vision system based on ARM9 and Linux was proposed. It has expounded hareware structure and software composing. The image gather and display’s program were written with B4L interface functions by configging and loading kinds of device drivers. The embedded vision system designed has some characteristics such as little volume, low cost and better transplant. The experiment wave and data show it has better performance of image gather and display.

    • Motorcycle Web-Based Remote Diagnosis System

      2011, 20(3):125-128. CSTR:

      Abstract (1792) HTML (0) PDF 732.51 K (3511) Comment (0) Favorites

      Abstract:For the motorcycle market situation and problems, we design and build a set of remote fault diagnosis system for motorcycle. The paper describes the basic framework of the system and its diagnostic processes, and combined with practical problems encountered in developing gives technology solutions. Finally, with diagnosis to different failure types of motorcycle, different fault algorithm is given.

    • Cooperation Work Platform Based on SOA

      2011, 20(3):129-131,144. CSTR:

      Abstract (1765) HTML (0) PDF 623.94 K (3317) Comment (0) Favorites

      Abstract:On the basis of analyzing question of information, the paper brings forward to Cooperation Work Platform Based on SOA that conforms accessing and communication information systems, describes requirement, design, configuration and difficult key question.

    • Screen Monitoring System Based on WinSock Communication

      2011, 20(3):132-135. CSTR:

      Abstract (2609) HTML (0) PDF 610.21 K (4019) Comment (0) Favorites

      Abstract:This paper describes the design of the screen monitoring software ideas and development techniques. With the WinSock API interface and MFC Internet programming technology, the system uses C/S model, based on UDP protocol for communication. The client side (Client) sends commands to crawl the screen Control through the Winsock. The server side (Server) receive capture screen instructions from server-side, and translate them into JPEG data streams, the server-side image data stream. Experimental results show that the method can easily realize the computer screen monitoring.

    • Realization of a Video Convertion Module Based on Batch Programs

      2011, 20(3):136-139. CSTR:

      Abstract (1931) HTML (0) PDF 545.69 K (4189) Comment (0) Favorites

      Abstract:This paper realizes a module which can convert almost all formats of current video files to files of flv format which can be played on the Web pages timingly, automaticly and batchingly. Firstly, it introduces current main video formats, along with Mencoder and Ffmpeg components. Secondly, it introduces the workflow design of this module. Finally, the paper introduces function realization of its submodules, and matters we should pay attention to in practical applications.

    • Test Platform Based on Plug-In

      2011, 20(3):140-144. CSTR:

      Abstract (1609) HTML (0) PDF 576.30 K (3555) Comment (0) Favorites

      Abstract:With the Increasing promotion of computer-based test, how to construct a flexible configuration, adaptability, highly efficient and stable test platform becomes more and more important. The test platform based on plug-in is a loose coupling open-type system which works with the removable plug-in unit and the unified interface specification, it cannot only realize the flexible configuration of test items, but also enhance the stability of the system and the compatibility.

    • Application of Multi-Threading in JEPG2000 Video Decoding

      2011, 20(3):145-148,160. CSTR:

      Abstract (2567) HTML (0) PDF 604.62 K (3541) Comment (0) Favorites

      Abstract:Multithread technology is becoming widely popular. Video decoding based on multi-threading has important research value and use value, it will achieve high improvement in decoding speed. This paper introduces the impletmentation of multithread programming in Mcrosoft Windows. Applying the multithreading technique in JEPG2000 video decoding, the image datas could be processed parallelly, and the decoding speed will be increased. The experiment results show that, system with binuclear, tetranuclear and eight kernels improves the decoding speed by two times, four times and eight times, respectively, compared to system with mononuclear. The Multi-threading technique improves the efficiency of program running by making full use of the resources of multi-core computer.

    • Webpage Snapshot Report Continuous Display Technology without Plug-Ins

      2011, 20(3):149-152. CSTR:

      Abstract (2082) HTML (0) PDF 604.13 K (3186) Comment (0) Favorites

      Abstract:As a favorable method of information organization and analysis, report form is widely used in industries. It is an important part of enterprise information system. One of the important of Web-based information system is the report forms application system. Especially in the client side, users browse report forms mainly through flipping and down pages. This way makes report forms browsing dull and not intuitive. To solve this problem, this paper puts forward and realizes the technology that web snapshot displays report forms continuously without plug-ins. The technology also combines the advantage of XML and XSLT technology. In this paper, the overall design of this technology is explained in detail. The successful application of this technology in practical projects proves that it is both usable and accessibility.

    • GLSL Shader Editing Environment Based on OSG

      2011, 20(3):153-156. CSTR:

      Abstract (4043) HTML (0) PDF 757.69 K (7434) Comment (0) Favorites

      Abstract:With the era of programmable graphics hardware, shader replaces the traditional fixed rendering pipeline to achieve more realistic effects. The rise of high-level shading language gives the convenience to writing shader, but still brings some unique challenges. This paper implements a GLSL shader editing environment based on OSG, in order to greatly simplify the shader coding and help shader developers to develop a parameterized shader. We also extends the range of applications of the results by using OSG’s plug-in mechanism.

    • Specific Speech Recognition System Based on HTK

      2011, 20(3):157-160. CSTR:

      Abstract (2705) HTML (0) PDF 528.10 K (4700) Comment (0) Favorites

      Abstract:Having developed about 50 years, the speech recognition (SR) technique has a wide range of applications in many fields, such as voice dialing system, digital remote control and industrial control. But the limitation of acoustic and language model is that the computer can only recognize some words or sentences. When the speech language changes, the system often gets wrong results. To address the problem above, the speech recognition system has been built on the basis of HTK as well as hidden markov model theory. Controlling the building process by code, the system can quickly generate a new recognition model when the training data and dictionary has changed.

    • Search Engine Design of Entity Feature Based on Three-Dimensional Mechanical Parts

      2011, 20(3):161-164. CSTR:

      Abstract (1719) HTML (0) PDF 528.79 K (3913) Comment (0) Favorites

      Abstract:With the popularity of 3D CAD systems in product design and manufacturing industry, the techniques of content-based 3D model retrieval become necessary. This paper addresses the development of 3D model search engine. It presents the principle of the development of 3Dmodel search engines and highlights three-dimensional solid model normalization, feature extraction, similarity comparison algorithm.

    • Application of Improved K-Means Algorithm to Analysis of Online Public Opinions

      2011, 20(3):165-168,196. CSTR:

      Abstract (1913) HTML (0) PDF 553.70 K (4054) Comment (0) Favorites

      Abstract:Combining background application requirement of online public opinion analysis, this paper firstly introduces the processing of text information, and then discusses the K-means algorithm of the text clustering, according to its characteristic that clustering results depend on the centers of initial clustering, and improves it. Based on the thought that text title can express its content, the improved algorithm uses sparse character vector to express text title, calculates the sparse similarity of them and ascertains the centers of initial clustering. The experiments show that the method improves the clustering accuracy. Compared with another algorithm based on the principle of maximum and minimum distance, the improved method heightens the efficiency and ensures the clustering accuracy.

    • Application of Desktop Grid Computing Platform to Multiple Sequence Alignment

      2011, 20(3):169-172,209. CSTR:

      Abstract (1731) HTML (0) PDF 601.12 K (2957) Comment (0) Favorites

      Abstract:A new parallel processing approach for ClustalW was presented and described in this paper. This approach uses Desktop Grid Computing Platform, which is a promising idea for high performance computing as its programming environment and running platform. On Desktop Grid computing platform, task partition, parallelism strategy and implementation technology of clustalW algorithm program were discussed in detail. ParaClustalW policy is load balances which was strongly supported for its consideration of alignment length and number factors. In order to demonstrate the effectiveness of this approach, a serial of simulation experiments were also done. The results obtained from performance analysis show that it gained a quick working time and good speedup. Under the same machine configuration, our approach is better than other solutions and it is a feasible and valuable approach for Multiple Sequence Alignment in bioinformatics.

    • Server Clustering on Virtualization

      2011, 20(3):173-177,213. CSTR:

      Abstract (1860) HTML (0) PDF 767.04 K (4445) Comment (0) Favorites

      Abstract:With the rapid development of the economic and electronic commerce, the exchanging times between the enterprises and users is increasing as geometric series. However, the utilization rate of enterprise servers is only 15% to 30%. This papers illustrates a program about the combination of the Linux platform and virtualization technology. The existing server is transferred into multiple virtual servers with the VMware Workstation. At the same time, the virtual Linux clients are clustered using the VM virtualization technology and scheduling algorithm for load balancing. With this method, we cannot only strengthen its business continuity and the security and integrity of the data but also help the IT departments reduce the whole costs.

    • Performance Improvement of Service Application Layer in 3G Movie Platform

      2011, 20(3):178-182. CSTR:

      Abstract (1806) HTML (0) PDF 518.45 K (3168) Comment (0) Favorites

      Abstract:This paper promotes ways to improve the performance of website. The management website of 3G Movie platform doesn’t work very well either when analyzed by tools like Yslow or when being used by operator after it has been deployed. It seems to work slowly because there are too many files to load. For the shortage, this paper puts forwards four ways to improve the process and performance of the website, such as, making fewer HTTP requests, compressing components, caching files in browser and so on.

    • Application of Custom Method to Documentum

      2011, 20(3):183-185,225. CSTR:

      Abstract (1612) HTML (0) PDF 563.02 K (3606) Comment (0) Favorites

      Abstract:EMC Documentum is the advanced content management platform. This article describes the Sinopec Ningbo engineering company limited (SNEC) how to develop, deploy and apply Documentum custom method in the process of using Documentum to managing project document. This will provide reference for further development.

    • Application of Artificial Immune to Recommendation of Electronic Commerce

      2011, 20(3):186-188. CSTR:

      Abstract (1608) HTML (0) PDF 498.80 K (3033) Comment (0) Favorites

      Abstract:The rapid development of Internet makes it more serious the overloading phenomenon of information in electronic commerce. How to find goods required quickly and accurately from the commodity information is a problem that needs to solve. Recommendation personalized offers a solution to the problem. In order to achieve an accurate recommendation, this paper presents the use of artificial immune clustering technology to the user, and then to recommend using collaborative filtering. It shows that the accuracy rate can reach 80% in the experiment.

    • A Novel Prefix-Labeling Scheme for Update-Supporting

      2011, 20(3):189-192. CSTR:

      Abstract (1868) HTML (0) PDF 532.23 K (3151) Comment (0) Favorites

      Abstract:Most prefix-labeling scheme nowadays cannot support XML document updating fully. Based on the comparison of the current prefix-labeling scheme, a novel prefix-labeling was proposed. This scheme does not only efficiently support structure queries, which can rapidly and accurately judge the parent-child, ancestor-descent and sibling relationships between any two nodes of the XML document tree, it also adopts the new labeling rules to avoid an update coding adjustment operation that may bring about when new nodes are inserted, and effectively support update for XML document.

    • Reporting Services Technology and its Application to Medicine Query System

      2011, 20(3):193-196. CSTR:

      Abstract (1648) HTML (0) PDF 630.49 K (3192) Comment (0) Favorites

      Abstract:The composition and function of SQL Server Reporting Services are illustrated. With the demand of our report, the integration solution of Reporting Services on Medicine Query System is presented. The implementation and the key technologies adopted in the solution are described in detail. The application indicates that the solution is feasible, easy and effective.

    • Mobile Phone File Transfer Software Based on Bluetooth

      2011, 20(3):197-201. CSTR:

      Abstract (1866) HTML (0) PDF 619.44 K (4223) Comment (0) Favorites

      Abstract:A file transfer software based on bluetooth mobile phones is presented, which uses bluetooth protocol stack and J2ME bluetooth communication API to achieve data transmission between phones. Based on the analysis of bluetooth communication process, the paper discusses the realization of J2ME bluetooth communication, sending and receiving file in phone, processing image and so on. It also pictures the implementation of technical and detailed description of the code.

    • OpenMP Parallel Optimization of H.264 Video Decoding

      2011, 20(3):202-205. CSTR:

      Abstract (2242) HTML (0) PDF 787.71 K (4406) Comment (0) Favorites

      Abstract:(School of Optical-Electrical and Computer Engineering,University of Shanghai for Science and Technology, Shanghai 200093, China)

    • XML Data Storage Technology Based on RDBMS

      2011, 20(3):206-209. CSTR:

      Abstract (1893) HTML (0) PDF 571.54 K (3774) Comment (0) Favorites

      Abstract:XML has become the data representation standard on Internet, and widely used in data exchange and data warehouse. But the file characteristics of XML cannot guarantee the security of data and concurrent access and the precision of RDBMS theory and maturity of RDBMS can be achieved fast and concurrent access to data. The paper combines the advantages of XML and RDBMS and comes up with a XML storage resolution based on RDBMS to simplify the management of XML data and data warehouse building. It allows users to manage XML data based RDBMS transparently by using Oracle XML DB, relative to the middleware method mapping strategy. It can significantly improve the efficiency of the XML data storage.

    • Protection of Software Data Based on AES and HASH

      2011, 20(3):210-213. CSTR:

      Abstract (2012) HTML (0) PDF 543.58 K (3613) Comment (0) Favorites

      Abstract:From the two aspects of data storage and user identification, this paper provides a program to protect the software data. It uses symmetrical encryption AES to achieve the encryption storage of the sensitive information in the database; uses SHA512 and regedit to achieve the software identification, and supplies the achieving process in VB2008, thus the software data can be double protected.

    • Principle and Realization of SYN Proxy for Defensing Syn-Flood Attack

      2011, 20(3):214-217. CSTR:

      Abstract (2904) HTML (0) PDF 557.77 K (5549) Comment (0) Favorites

      Abstract:syn-flood is a common denial of service attack. It uses the characteristics that it requires three-way handshake to establish TCP connection to send a large number of illegal first handshake packet to the target, leading to establish a large number of TCP connections of SYN_RCVD state on the target.So the target cannot establish normal TCP connection. This paper firstly describes the process of establishing a TCP connection,and then proposes a way that agency three-way handshake to solve the problem of over-consumption of resources. It is proved that it can reduce the harm of the syn-flood attack.

    • Design and Implementation of the Advertisement Scheduling in Mobile Advertising System

      2011, 20(3):218-221. CSTR:

      Abstract (2229) HTML (0) PDF 634.13 K (5180) Comment (0) Favorites

      Abstract:As a new advertising form, mobile advertising is based on the mobile communication network. It takes advantage of mobile terminals, makes use of personalized, oriented and interactive information to carry out advertising. Advertisement scheduling is the core function of a mobile advertising system, which includes organization, allocation and adjustment of the advertising space, and finally generating a complete view. This paper firstly introduces the development and characteristics of the mobile advertising, and then to give emphasis on the design and implementation of advertisement scheduling.

    • Two-Way AC Algorithm and its Application to Intrusion Detection System

      2011, 20(3):222-225. CSTR:

      Abstract (2065) HTML (0) PDF 590.89 K (4203) Comment (0) Favorites

      Abstract:Based on AC algorithm for performing multiple string matching algorithms, two-way AC algorithm was proposed. The algorithm constructs a forward finite automaton and a reversed finite automaton in the preprocessing stage. In the Matching stage it scans the text string from middle to right with a forward finite automaton and concurrently from middle to left with a reversed finite automaton. The algorithm has been implemented by modifying the source code of Snort. The experimental result shows that the time performance of two-way AC algorithm is superior to BM algorithm, WM algorithm and AC algorithm. Efficiency of the algorithm is about 1.5 times AC algorithm if the mode of detection is to discover and stop.

    • Evaluation of Impact of Path Completion in Weblog Mining

      2011, 20(3):226-229. CSTR:

      Abstract (2094) HTML (0) PDF 503.27 K (3240) Comment (0) Favorites

      Abstract:Web user access is almost anonymous access. The main goal of weblog mining is to extract users’ behavior patterns from the Weblogs, and then understand users’ behavior by analyzing the mining results to improve the structure of the site. The first step of weblog mining is data preprocessing. Data preprocessing is the most time consuming stage in web page analysis. This paper first studies the process of data preprocessing, including data cleaning, user identification, session identification, path completion. A path completion algorithm is proposed. The paper poses the hypothesis that the path completion has a significant impact on rule extraction quantity and quality, and then experimental verification is conducted to assess the effect of path completion in weblog mining. The experiment result also provides an experimental basis to what extent data preparation should be carried out.

    • Design of Embedded E-Trade Information Terminal Based on ARM andμC/OS-II

      2011, 20(3):230-233. CSTR:

      Abstract (1818) HTML (0) PDF 713.28 K (3666) Comment (0) Favorites

      Abstract:An e-trade information terminal is designed to meet the higher requirements for processing speed, real time capability and expansibility based on the 32 bit ARM chips of high performance as processor and combining with real time operation system μC/OS-II. According to the resource requirements, the hardware structure of terminal is proposed. How to form an embedded development platform based on μC/OS-II. In addition, the transplantation of μC/OS-II in ARM microprocessor is discussed. A novel middleware module architecture is put forward, which increases reuse, transplant performance and expansibility. The division of task, assignment of software priority and the execution path of main program are determined. At last, some key technologies for implementing the information terminal are expatiated. The designed terminal runs reliably.

    • Fire Compound Detection System Based on ARM&μC/OS-Ⅱ

      2011, 20(3):234-237. CSTR:

      Abstract (1814) HTML (0) PDF 395.30 K (3131) Comment (0) Favorites

      Abstract:Based on the ARM embedded microprocessor and real-time Operation SystemμC/OS-Ⅱ, we develope a fire compound detection system which detects the the gas of CO and CO2 in the early time when fire happens. Cluster the fire feature with the fuzzy C-means clustering and decide the center of clusters and then report the fire process features based on the fire criterion to the system. The system debuged them successfully. The results of experiments proved that the system can do well in early alarm.It has high identified ability and can decrease the rate of false or missing alarm signedly. Compared to normal system this system can alarm earlier for about 5 minutes.

    • Comparison of Calculation Methods-Based Image Fractal Dimension

      2011, 20(3):238-241,246. CSTR:

      Abstract (2073) HTML (0) PDF 647.46 K (9061) Comment (0) Favorites

      Abstract:Fractal dimension is a commonly used method to measure texture coarseness. However, the definition of fractal dimension is very difficult to resolve. Many fractal dimension algorithms of image are proposed based on different application backgrounds. But they lack comparison and evaluation of the overall and are only limited to the selection of the box-counting dimension method. This paper makes a testing among these methods in sensitivity and time complexity for texture coarseness of image. Through a comparison and analysis to applicability of these methods, the recommended models are given at last.

    • Comparative Study of Knowledge Representation

      2011, 20(3):242-246. CSTR:

      Abstract (2128) HTML (0) PDF 603.67 K (10514) Comment (0) Favorites

      Abstract:Firstly, the paper describes the concept of knowledge representation and a variety of knowledge representation. Secondly, it discusses tree levels of knowledge representation: implementational level, logical level and epistemological level. For each level, it sets a framework for comparing and evaluating intelligent knowledge representation. Then commonly-used knowledge representation schemes are compared with this framework. It is believed that this framewok can be efficiently used for comparsion and selection of nowledge representation scheme in spromblem solving.

    • Development of the Internet of Things in China

      2011, 20(3):247-251. CSTR:

      Abstract (2098) HTML (0) PDF 588.90 K (4168) Comment (0) Favorites

      Abstract:Along with address of the conception of “Smarter Planet”, the development of the Internet of Things (IOT) has attracted highly attention of academia, industry, and news media. There are still many open issues in the definition, internal principles, architectures and system models of IOT. This paper concluded some concepts in the Internet of Things and analyzed the key factors which confined the development of the Internet of Things. Then the author gave the solutions of these issues and explored the future of the Internet of Things in China.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063