• Volume 20,Issue 4,2011 Table of Contents
    Select All
    Display Type: |
    • Remote Monitoring System of Computer Control Center Based on SCM

      2011, 20(4):1-5. CSTR:

      Abstract (2487) HTML (0) PDF 709.53 K (3515) Comment (0) Favorites

      Abstract:The remote monitoring system is made of GSM network, SCM and PC which are control centre, various sensors which are used for data gathering equipments. This paper introduces the PC control centre monitoring system. It includes many technologies, for example, the design of SCM, serial port data communication, netework monitoring, application of GSM network, program compiling written by Labwindows CVI for SCM, and so on. This system achieves a low-cost intelligent unmanned supervisory function, and realizes a 24-hour unmanned surveillance, and with real-time news reporting and emergency alert function.

    • Intelligence Police Information System Based on GIS Technology

      2011, 20(4):6-10. CSTR:

      Abstract (2200) HTML (0) PDF 642.92 K (4119) Comment (0) Favorites

      Abstract:The rapid development of communication, information technology and the Internet of things bring new chances for the construction of Police Information System. City Intelligence Police Information System is the core of the construction of intelligent cities. The Intelligence Police Information System proposed in this paper is based on the GIS technologies and guided by the concept of collaborative police. The System is aimed to implement the system merge and technology integration, by which to build a horizontal integration, vertical translation City Intelligence Police Information System. The scheme combines many aspects of the city management, including city public security, the mechanism of seamless linkage for traffic management, to promote the process of police informant and speed up the construction of “intelligent cities”.

    • 3D Training System for New Mine Based on OpenGL

      2011, 20(4):11-15. CSTR:

      Abstract (2389) HTML (0) PDF 660.70 K (3688) Comment (0) Favorites

      Abstract:In order to overcome the difficulties in new mine training, the method and course of building the 3D training system for new mine based on Visual C++ and OpenGL are introduced. The paper concentrates on how to realize the interactive control of 3D objects in the OpenGL program developing environment. The process of building the training system demonstrates the feasibility of the method.

    • Real-Time Oil Depot Monitoring System Based on the Arm and Can Bus

      2011, 20(4):16-20. CSTR:

      Abstract (1949) HTML (0) PDF 725.34 K (3500) Comment (0) Favorites

      Abstract:According to the safety of oil and real-time reliability management requirements, this paper puts forward the CAN Bus distributed control system scheme. It introduces the core data processing unit S3C2410 in the use of expansion devices CAN Controller realizing sending, receiving and filtering bus packet, including the working principle of CAN Controller SJA1000, the methods of the general CAN Bus access controlling, and the design of CAN Bus Driver Program. Experimental results show that the technology in this paper, based on ARM CAN driver design and message transceiving and filtering is universal.

    • POL Service Simulation Training System

      2011, 20(4):21-24. CSTR:

      Abstract (2089) HTML (0) PDF 653.85 K (4052) Comment (0) Favorites

      Abstract:The paper designs POL service simulation training framework system. Starting from the analysis of POL service simulation training system’s features, it provides the design objective of POL service simulation training system. As an example of field depot unit, simulation training system design is set up. It annlyzles the key component of POL service simulation training system, simulates field depot unit simulation training subsystem using the related technology and designs field depot system simulation training process figure. It sets up the content of POL service simulation training system preliminarily and improves the quality effectiveness of POL service informationization training.

    • ESB-Based Quality-of-Service Evaluation System

      2011, 20(4):25-29. CSTR:

      Abstract (1854) HTML (0) PDF 657.61 K (3363) Comment (0) Favorites

      Abstract:Enterprise Service Bus is a flexible infrastructure to integrate applications and services. Quality of Service (QoS) is an important measurement of the Web service’s quality. According to the analysis issues of the existing QoS evaluation system, we design and implement a QoS evaluation system based on the ESB, which uses the functions and information of ESB properly. This system does not only reduce the complexity of modular design, but also improves the performance of evaluation system’s capability. The result shows that the quality of service evaluation system has a better performance in the situation of heavier load.

    • Design and Application of Unify Portal Framework for MRBT

      2011, 20(4):30-34. CSTR:

      Abstract (1669) HTML (0) PDF 901.55 K (3437) Comment (0) Favorites

      Abstract:In this paper, a new framework for MRBT(Multimedia Ring Back Tone) is presented, which is based on the traditional Spring + Hibernate development framework. It extends and optimizes the hierarchical architecture, uses the design of Interface-oriented programming and AOP (Aspect Oriented Programming) and unifies the development methods of portal system. This framework consists of identified data, reasonable business processes and exception handling system. Portal development using the framework can simultaneously support multiple access modes and ensure high reusability and maintainability. UP framework can also be promoted as a development framework for the most portal system.

    • Intelligent Alarming System Based on Streaming Media in Railway Crossing

      2011, 20(4):35-39,5. CSTR:

      Abstract (1990) HTML (0) PDF 1.00 M (3359) Comment (0) Favorites

      Abstract:In order to reduce the probability of traffic accidents in China’s railway crossing, an intelligent alarming system based on combination of streaming media with motion detecting is presented. In the system, we use the Client/Server mode. The server is responsible for video capture, image processing, H.264 encoding and transmission of video and alarm information. The client which based on embedded wince device is responsible for receiving real-time video and alarm information. The design and implementation of all parts are expounded in this paper. The key technologies and algorithms are explained in detail. Experiments show the system can accurately detect obstacles, paly the video smooth and greatly reduce the risk of crossing traffic accidents.

    • Manufacture Time Management Information System Based on PLM

      2011, 20(4):40-44. CSTR:

      Abstract (1789) HTML (0) PDF 649.50 K (3615) Comment (0) Favorites

      Abstract:This system targets enterprises manufacturing machine shop, analyzes their business needs and builds the plant management information system of working hours and working hours for manufacturing process information management. Combined with WEB technology, based on EXCEL VBA development of methods, it constructs a hybrid model based on PLM workshop working hours management information system framework, and discusses the functionality of the system architecture, database structure.

    • Open Motion Controller Design of Human-Machine Interface

      2011, 20(4):45-49. CSTR:

      Abstract (1826) HTML (0) PDF 862.22 K (3788) Comment (0) Favorites

      Abstract:This paper is a CNC system application. It studies the touch screen as a motion controller interface, and Implements the visualized, simplified and effective control over the CNC machine tool production process. Through the Modbus protocol, the touch screen controls and monitors the motion controller. The touch screen, the hardware and software of open FBI motion controller show that the system's functionality and performance have achieved the desired design requirements and realized the self-concept, simple, clear user interface.

    • Design and Implementation of Privilege Management Framework Based on Core RBAC Model

      2011, 20(4):50-54. CSTR:

      Abstract (4493) HTML (0) PDF 1006.48 K (8114) Comment (0) Favorites

      Abstract:The most intuitive description of RBAC is that permissions are granted to roles, and roles are granted to users. The permissions are the only credits to access resources, but users can’t directly associate with permissions. With core RBAC and some mainstream selections in JavaEE, design and implement the privilege management framework which consists of user login modules and a variety of management operations modules that can manage users, roles and privileges.

    • New ID-Based (t,n) Threshold Signcryption Scheme

      2011, 20(4):55-58. CSTR:

      Abstract (1956) HTML (0) PDF 613.19 K (3100) Comment (0) Favorites

      Abstract:Against the shortage of low efficiency of the existing threshold signcryption scheme and the key escrow in the id-based cryptosystem, a new identity-based (t, n) threshold signature encryption scheme is proposed from bilinear pairings. Our scheme can resist the private key generator to entrap through the introduction of secret information of the signcryptioner. Our scheme is more efficient and practical than the existing scheme.

    • Scientific Literature Trend Mining Based on Co-Word Analysis

      2011, 20(4):59-63. CSTR:

      Abstract (2272) HTML (0) PDF 632.94 K (4330) Comment (0) Favorites

      Abstract:In this paper, co-word analysis was used for researching and analyzing the literature published in Journal of Chinese Information Processing in 2000-2009, using clustering method of multiple statistical, and map every two years’ themes strategic diagram. The result reveals every period’s research focus and themes’ evolution and summarizes the general pattern of the research themes’ development in emerging subject, and explores the themes of Chinese information processing trends.

    • Design and Empirical Research of Fuzzy Comprehensive Evaluation Software

      2011, 20(4):64-68. CSTR:

      Abstract (1855) HTML (0) PDF 1.00 M (4397) Comment (0) Favorites

      Abstract:Fuzzy comprehensive evaluation is widely used in evaluation. Based on thorough analysis of the FCE model, this paper puts forward the design idea of FCE general software, develops a stand-alone prototype, which can be used to give the solution of those problems whose condition is undetermined, boundary is not clear and difficult to describe quantitatively. Finally, it takes economic benefits evaluation on enterprise quality as an example, using the software to evaluate. The results prove the effectiveness and practicality of FCE software, provide a reference for the design and development of higher class evaluation software.

    • Building Three-Dimensional Network for P2P Overlay Network

      2011, 20(4):69-71. CSTR:

      Abstract (2450) HTML (0) PDF 594.78 K (3128) Comment (0) Favorites

      Abstract:Analyzing the algorithm of DHT and studying the thinking of the B + tree, we got a new network models -Frustum of a cone network. This network models will bring us to three-dimensional network from two-dimensional network, from plane to solid. Setting the end points, the routing table to be dynamic growth two-dimensional tables, we realized three-dimensional end point search and improved query efficiency. The updates of Limited length of follow-up list and limited delivery times, ensure that the entire network will be stable, also ensure that the system be much less than the chord algorithm in costs of the maintenance.

    • Reliable Mobile Agent Communication Algorithm Based on Binding Mailbox

      2011, 20(4):72-75. CSTR:

      Abstract (1739) HTML (0) PDF 567.34 K (3427) Comment (0) Favorites

      Abstract:In recent years, mobile Agent communications algorithm has been the focus of the study. This paper analyzes several mobile Agent communication algorithms and puts forward a reliable, secure, flexible and optimal utilization of message binding mailbox Agent communication algorithms based on previous studies.

    • Design of Video Image Processing Chip Based on USB2.0

      2011, 20(4):76-79,15. CSTR:

      Abstract (2371) HTML (0) PDF 1.01 M (3839) Comment (0) Favorites

      Abstract:Real-time image processing is a hot topic in image processing. The paper gives a real-time image processing solution using a video image processing chip based on USB2.0. It introduces the overall design framework of the system, and describes the core hardware implementation principle, then carries out a simulation utilizing several software simulation tools and in the end verifies on the platform Virtex-5 XC5VSX50T FFG1136. The results show that the solution could satisfy the practical requirements of real-time image processing.

    • Formation Control of Multiple Mobile Robots

      2011, 20(4):80-85. CSTR:

      Abstract (1936) HTML (0) PDF 700.98 K (3284) Comment (0) Favorites

      Abstract:This article conducts the formation control research of walking robot under the modelling difficulty and the sensing information limited. Through establishing the robot’s knowledge library about the formation positional information, based on the priority selective rule to the reference robot, and unifying the limite sensing interactive information, it proposes the host from the knowledge association parallelogram law to obtain the movement vector, the follow robots analysis the next deflection and speed in the fiction parallelogram, and considers the time delay and appropriate control cycle in the analysis. And uses the fuzzy control theory in the robot formation controll process, rests on the artificial experience to avoid obstacles by fuzzy control rules, the robots avoid obstacles flexiblely. The simulation results show the effectiveness of the algorithm.

    • Face Pose Estimation Based on Edge Statistics and Feature Location

      2011, 20(4):86-90. CSTR:

      Abstract (3159) HTML (0) PDF 788.22 K (8184) Comment (0) Favorites

      Abstract:This paper proposes an edge statistical-based face pose estimation method, which uses the overall information to extract the features firstly. And then the linear regression algorithm is applied to build the corresponding relationship between features and poses. Feature location-based face pose estimation is another method proposed in this paper. It is a local information-based method, which utilizes mathematical morphology operators to pinpoint the nostril. Then according to the location of the nose and eyes, face poses are estimated. The aforementioned methods are compared in the same dataset. Experimental results show that the method can accurately and fast estimate face pose.

    • Analysis of Energy Consumption of Data Transmission for Underwater Acoustic Sensor Networks

      2011, 20(4):91-95,29. CSTR:

      Abstract (2220) HTML (0) PDF 956.59 K (4472) Comment (0) Favorites

      Abstract:One of the aims to design the underwater acoustic sensor networks is to supply the reliable communications between nodes and minimize the energy consumption as well. According to the absorption loss of underwater acoustic signals in the ocean and the parameters of the components, parameter of sensor node and actual surroundings, it also states the methods of forming the energy consumption model of the underwater sensor networks in the structure of centralized topology and Multi-hop topology.Application of the relay in fact a waste of energy. In short-range communication, however adopt the centralized topology structure have high energy efficiency. In long-range communication application of Multi-hop topology and choose the suitable number of nodes have the high energy efficiency. At last, that result is validated by simulation.

    • A High-Performance Algorithm of Face Detection and Eye Localization Based on Near-Infrared Image

      2011, 20(4):96-101. CSTR:

      Abstract (1601) HTML (0) PDF 787.77 K (4227) Comment (0) Favorites

      Abstract:This paper proposes a novel face detection and eye localization algorithm based on near-infrared (NIR) image. Initially. The AdaBoost algorithm is introduced here to detect face, and then detection of the presence of glasses is performed in the candidate face area. If glasses are not present in face area, N-Quoit filter will be used to locate eyes. Otherwise, eye location can be determined by the “Faceness” criterion. Experimental results demonstrate that our method is capable of achieving high accuracy and real-time performance, and is an effective solution to the issue of specular reflections of NIR lights on glasses in eye localization.

    • Reliability Scheme of the Core Control Network-Element S-CSCF in IMS

      2011, 20(4):102-108. CSTR:

      Abstract (2008) HTML (0) PDF 950.12 K (4505) Comment (0) Favorites

      Abstract:The reliability of the core control network-element S-CSCF in IMS is the key to assure the continuity of IMS services as well as the precondition to deploy the commercial IMS networks. Based on the analysis of S-CSCF’s functions and features, the paper proposes an approach to design and implement an S-CSCF reliability scheme, and discusses in detail the contents and occasion to be backed up in the process of the S-CSCF providing services, the policy to assure data consistency, fault detection, switch in the main and standby server, recovery as well. Additionally, we carry out an experiment on S-CSCF with the reliability scheme in the OpenIMSCore, an open source project. The results show that the reliability scheme is not only feasible and effective, but also costs less in data backup. When the main S-CSCF1 goes wrong, the standby S-CSCF2 can rapidly recover without influencing the experience in user’s enjoying services.

    • Software Monitoring Model About Component and AOP Technology

      2011, 20(4):109-113. CSTR:

      Abstract (1523) HTML (0) PDF 652.42 K (3321) Comment (0) Favorites

      Abstract:In this paper, a model for software monitoring is proposed by taking advantages of component technology and AOP (Aspect-Oriented Programming) technology. This model for monitoring is modular and flexible with notions of component at the level of AOP. The function of monitoring is encapsulated into an aspect component in the model. In this way, the code tangling and the code scattering issues caused by monitoring code inserted into function code are resolved.

    • DO Control for Rice Wine Fermentation Based on Kalman Filter and Genetic PID Control

      2011, 20(4):114-117. CSTR:

      Abstract (2259) HTML (0) PDF 678.58 K (4415) Comment (0) Favorites

      Abstract:The Dissolved Oxygen (DO) control system for rice wine fermentation is an unstable system with multi-disturbance, time-varying and nonlinearity. A novel DO control method is proposed. The system is based on Labview, SIMATIC PLC300 and sensors, the Kalman filtering and Genetic PID control strategy are introduced. The PID control parameters are tuned by genetic algorithm on line, while a Kalman filter is used to reduce the impact of control interference and noise on system. Finally, a simulation experiment is performed by Matlab, and simulation result shows that the control method not only has a good adaptability and Anti-disturbance but also has strong robust ability and fast convergent rate.

    • Data Compressing in Nuclear Power Ultrasonic Nondestructive Detection

      2011, 20(4):118-121,49. CSTR:

      Abstract (2482) HTML (0) PDF 784.45 K (2704) Comment (0) Favorites

      Abstract:In nuclear power Ultrasonic nondestructive detection, because of the wide detection range and more probes, the amount of the acquireddata are reserved. Therefore, the design of data compression system plays an important role in ultrasonic nondestructive detection application in nuclear power. Methods of existing data compression are studied. Transferring the signal to be compressed from the one-dimensional space to two-dimensional space are presented. And then it carries out two-dimensional wavelet compression, realizes the two-dimensional signal and spatial signals compression. It analyses and compares with a one-dimensional compression of the signal. Experimental results prove that this scheme of the algorithm is effective.

    • Application of Semi-Supervised Learning to Graduate Adjusting

      2011, 20(4):122-126. CSTR:

      Abstract (2116) HTML (0) PDF 713.93 K (3562) Comment (0) Favorites

      Abstract:Graduate Adjusting is an important step for Graduate Admission. The traditional adjusting methods which are all manual, make it very hard for students to choose a proper school from a huge number of data. This paper proposes a data-mining method based on semi-supervised study. Using the association rules, which are extracted from the labeled training samples, as supervised information, and combining with the K-mean algorithm in non-supervised study method, this paper elaborates on the semi-supervised study algorithm by classifying a large number of unlabeled data. This method overcomes the defects of inaccuracy in traditional methods which are influenced by a large number of factors. The method is simple to implement, has high accuracy, and can be widely used.

    • Application and Realization of 3D Reconstruction of Medical Images of VTK

      2011, 20(4):127-130,85. CSTR:

      Abstract (2623) HTML (0) PDF 785.92 K (10360) Comment (0) Favorites

      Abstract:VTK, which is an open source free software system, can be applied to image processing, computer graphics and visualization in scientific computing, and it is widely used in all walks of life at home and abroad. This dissertation describes the basic composition, system architecture, and visualization process of VTK. Furthermore, it applies VTK to the visualization of medical images, uses a surface rendering- Marching Cubes algorithm- and a volume rendering- Ray Casting algorithm- to achieve 3D reconstruction of medical images under the Microsoft Visual Studio 2005, and has designed the system examples. Practice proves, using VTK to develop medical images’ reconstruction system has good reconstruction results, less development time and high code reuse rate.

    • Middleware to Integrate CORBA and Web Services

      2011, 20(4):131-135. CSTR:

      Abstract (1883) HTML (0) PDF 747.65 K (3790) Comment (0) Favorites

      Abstract:With the development of middleware technology and electricity application system, many middleware technologies have been applied to the research of EAS. This paper firstly discusses the application of middleware on energy measurement system(EMS), and a new method for CORBA/Web services integration is investigated on analyses of CORBA and Web Services. On this basis, the paper designs and implements a new middleware, to solve the problem of information sharing between eterogeneous EMS. Through practical application, the middleware can excellently improve the sharing of information of distributed EMS and company operational efficiency.

    • Modeling and Simulation of Space Scene

      2011, 20(4):136-140. CSTR:

      Abstract (2376) HTML (0) PDF 779.19 K (4438) Comment (0) Favorites

      Abstract:The visual simulation architecture of space scene is very important in managing, analyzing and displaying the space objects. With the knowledge of computer graphics, astronomy, mathematics, and kinematics etc. A platform of space scene, which mainly focuses the earth, is developed. In addition, a visual simulation system of satellite motion in orbit based on the platform is also developed. This paper describes the design and the implementation of the platform and the visual simulation system. Some key technologies are involved, such as overlay area modeling, geometry modeling and kinematics modeling, communication special effect modeling and distributed displaying. The simulation results show that the visual effect is vivid and realistic, and can meet the requirement of real time visual system.

    • Sieving Scattered 3D Point Clouds Using Clustering Analysis for 3D Surface Reconstruction

      2011, 20(4):141-144. CSTR:

      Abstract (1830) HTML (0) PDF 806.09 K (5988) Comment (0) Favorites

      Abstract:During the course of 3d surface reconstruction, there are a large number of noises and isolated 3d points in raw 3d point clouds, which obtained from images. If we directly use these data to reconstruct surface, the algorithm will make surface sharply prominent and ineffective reconstruction. Because of above problems, a method that sieving 3d point clouds based on DBSCAN is presented in this paper, and then 3d surface is reconstructed using filtered 3d point clouds. Experiments show that good 3d surface reconstruction is obtained using this algorithm.

    • Context-Aware Smart Campus System

      2011, 20(4):145-148. CSTR:

      Abstract (1589) HTML (0) PDF 679.74 K (3107) Comment (0) Favorites

      Abstract:To improve efficiency in class Teaching, this paper uses Delphi to write the software of teacher terminal and student terminal to establish the software system of smart campus, combining the context-aware technology to establish the context aware, through reading student terminal's context message in real time to achieve intelligent response.

    • USB-to-CAN Adapter Based on MCF51JM128

      2011, 20(4):149-152. CSTR:

      Abstract (2348) HTML (0) PDF 717.98 K (4216) Comment (0) Favorites

      Abstract:In order to achieve the communication between on-board computer and vehicle sub-systems, in general, we need to design a CAN bus adapter. This article describes one method to design and implement a CAN bus adapter based on USB. As USB OTG module and MSCAN module is integrated in the MCF51JM128 microcontroller, the design and implementation of the adapter of MFC51JM128 microcontroller is simpler and easier. The way to realize the adapter driver on Linux system is also included.

    • Implementation of Electronic Signature Control Oriented to Web Page

      2011, 20(4):153-156,135. CSTR:

      Abstract (2751) HTML (0) PDF 845.45 K (5055) Comment (0) Favorites

      Abstract:The paper proposes an approach to designing an electronic signature control oriented Web page, which can implement digital signature for any html elements set on the Web page. The control can also save Web page with the electronic seal as local document for offline verification. The paper discusses the implementation method related technologies of the control, and applies the control to Web-based electronic contract system. Practical application shows that the control mate the integrity and non-repudiation of web page with electronic seal.

    • Mineral Rights Management System Based on Arc Engine

      2011, 20(4):157-160,63. CSTR:

      Abstract (2081) HTML (0) PDF 840.79 K (3180) Comment (0) Favorites

      Abstract:The purpose in exploiting mineral resources is access to resources, to protect people's lives, but our management of the mineral rights are not clear, causing a serious waste of resources and ecological damage issues. By analyzing the mineral rights management system based on the technology needed to develop C # as the second language, using Arc Engine platform based on a mineral rights management system to achieve management of mineral-related inquiries, statistics and so on.Through the database technology and information sharing technology, comprehensive and systematic summary, building libraries and display.

    • Design and Practice of the Universal Architecture of Multimedia Online Presentation

      2011, 20(4):161-164. CSTR:

      Abstract (2065) HTML (0) PDF 879.74 K (3216) Comment (0) Favorites

      Abstract:The file format will be transformed after the multimedia files are uploaded to the video and audio websites. It will need the software and hardware resources of the server to transform files. At the same time, it will bring down the quality of the videos and audios. In this article, a new universal architecture of multimedia online presentation was proposed. With this architecture, the multimedia files will not be transformed and ban be presented online. It is applied to the presentation of videos, audios, images, documents. The architecture is Real-Timing, high-quality, universal, adaptive and expandable.

    • Gas Outburst Prediction System Based on DSP and Rough Set Theory

      2011, 20(4):165-168,68. CSTR:

      Abstract (1757) HTML (0) PDF 847.58 K (2934) Comment (0) Favorites

      Abstract:Gas outburst prediction is a complex project. Based on the principle of the combination of theory and practice, the theory and practice of gas outburst prediction is combined by rough set theory and DSP technology. Data acquisition channels at different frequencies based on DSP, CAN bus communication and DSP data processing is designed in the system. A detailed description of Software design is introduced in the paper. Through specific actical applications, the system can accurately predict gas outburst.

    • Steep Coal Seam Reserves Management Information System Based on GIS

      2011, 20(4):169-172. CSTR:

      Abstract (1731) HTML (0) PDF 684.40 K (2929) Comment (0) Favorites

      Abstract:Based on analyzing the characteristics of the steep coal seam and the application of traditional coal reserves management information system, with the theory and technology of GIS, Computational Geometry and Mine Informationization, this paper designs a steep coal seam reserves management information system based on GIS. It achieves the calculation of steep seam reserves and unified management of data and enhances the efficient production and management on Coal-Mine Enterprise.

    • Image Inpainting Algorithm Based on Prediction of GM(1,1)

      2011, 20(4):173-176. CSTR:

      Abstract (1656) HTML (0) PDF 610.38 K (3398) Comment (0) Favorites

      Abstract:Based on the analysis of the reasons and the features of the data loss when images are transferred, the paper makes use of the idea of the grey prediction and comes up with a new algorithm when images are repared. The new algorithm is to apply the grey prediction method to image inpainting, which basically meets the needs of image restoration and attains the applicable conditons for the algorithm through the experiments.

    • Behavior-Based Control for Adaptive Formation of Robots

      2011, 20(4):177-181. CSTR:

      Abstract (2230) HTML (0) PDF 724.70 K (3254) Comment (0) Favorites

      Abstract:Aimed at the formation control of multiple robots in complex environment, the leader-follower method is combined with behavior-based method. The proposed robots can track the chain through the barrier in a complex environment and then re-team to adapt to the environment, avoiding the robots’ droping out from other robots in a complex environment. In the obstacle-avoidance activities, the robots can avoid barriers based on the predictable trend, so that the control behavior of both simple and effective. Simulation results show that the formation control algorithm is effective. The feasibility and validity of the formation control strategy are also indicated.

    • Identification of Vehicle Types Based on Spiking Neural Network Model

      2011, 20(4):182-185. CSTR:

      Abstract (2650) HTML (0) PDF 774.21 K (5079) Comment (0) Favorites

      Abstract:Accurate feature extraction and recognition of moving objects are the hot spots in image processing and artificial intelligence research domains. In order to identify the types of moving vehicles, this paper proposed an identification approach in which edges of the moving vehicle are extracted by a spiking neural network model. The line moment of moving vehicle is used as the features to train a neural network, and then the neural network is used to identify type of the moving vehicle. The results of the simulation show that the approach can accurately extract the features of the moving vehicles so that the accuracy of identification has been improved. This approach shows a promising prospect in the application of intelligent surveillance systems in the future.

    • Decompression System Based on SOPC

      2011, 20(4):186-188. CSTR:

      Abstract (1805) HTML (0) PDF 603.51 K (3532) Comment (0) Favorites

      Abstract:The method of using software to decoding image cannot satisfy the timely request. This paper proposes a system design plan of JPEG image decompression. It mainly gives the JPEG image decompression algorithm’s hardware realization and system’s principle of work as well as the hardware realization. The result indicates that this system can speed up the decoding speed of image only with 21.3ms when decoding a 640×320 image. It realizes the image decoding timely.

    • XML Data Extraction from Webpage of China Mobile Phone Bills Based on .NET

      2011, 20(4):189-193. CSTR:

      Abstract (2046) HTML (0) PDF 647.09 K (3522) Comment (0) Favorites

      Abstract:In this paper, a solution of automatic data extraction from HTML Webpages of China Mobile phone bills with the key technology such as ASP.NET, SgmlReader, LINQ, XML under the Microsoft .NET 3.5 framework is given. The solution provides the function of automatic data collecting from China Mobile phone bills, which contributes to a further process of the phone bills information. The solution is simple, feasible and effective.

    • Analysis on the Txterior Quality of Rice by Digital Image Processing

      2011, 20(4):194-198. CSTR:

      Abstract (1910) HTML (0) PDF 549.55 K (4156) Comment (0) Favorites

      Abstract:This paper discusses the current detection measures of rice exterior quality, and points out its shortcut, and puts forward a new detection measure of rice exterior quality based on digital image processing. At last, it briefs the the technical details.

    • Technology for Trusted IP Access Control Equipment

      2011, 20(4):199-202. CSTR:

      Abstract (1893) HTML (0) PDF 575.25 K (3560) Comment (0) Favorites

      Abstract:Trusted IP equipment proposed access control technology is proposed in this paper. The adoption of this technology can achieve a medium-sized enterprise information network for all IP devices in the management and control of access behavior. The system based on Linux system Python language to develop and management of end users in the Web interface through the IP visual resource planning, allocation, and can be used to develop a variety of IP strategy. The system realizes the information network for all IP devices on the access behavior of the control, in control, thus enhancing the security of information networks.

    • Relational Database Model of XML Storage Schema Based on Relational Database

      2011, 20(4):203-206. CSTR:

      Abstract (1813) HTML (0) PDF 704.26 K (3245) Comment (0) Favorites

      Abstract:Storage schema is a key research field in the community of XML data management. About the performance, expressions of the underlying storage have very important effects on the top queries and optimizations. Therefore, effectively building the storage schema of the XML is the primary problem. This paper proposed an edge-mapping XML document storage schema, which effectively maps the XML database onto relational database. In this schema: firstly, the XML document tree was structured according to the type of the document node. Secondly, a union-table was used to store the value of nodes, and we only recorded the path of the element nodes by the mean of the node sequence number combined with the path. Finally, based on this storage schema, we implemented the database operations on the new database model. Experiments showed that the model can speed up the query procedures and can spare more memory space.

    • Design of an Access Driver Program to Restrict Broadband Sharing

      2011, 20(4):207-210. CSTR:

      Abstract (2153) HTML (0) PDF 917.57 K (3650) Comment (0) Favorites

      Abstract:Contra-posing the deficiencies of many current mainstream methods which are restricted in sharing broadband, we design an access driver of restriction of Broadband Sharing. In the access-user's system, we install a low-level driver, through which to establish a special point to point channel method to bind the access drivers to the user's system. The driver does not only limit the user to use broadband router, it also limits the behavior that user to uninstall the access drivers to startup the proxy server. This drivers use the data property method to discriminate user who are using proxy server software to share broadband. These have some reference value in practical application.

    • Dynamic Self-Adapting Multimedia Data Processing Method Based on Snort

      2011, 20(4):211-213,181. CSTR:

      Abstract (2147) HTML (0) PDF 737.80 K (3071) Comment (0) Favorites

      Abstract:To address the problem of high rate of dropping packets in high network flow of Snort network intrusion detection system, a way of multimedia data identification in network flow and two approaches to processing multimedia data has been designed by analyzing the characteristic of multimedia data in this article. The method of Dynamic Self-Adapting Multimedia Data Processing is also introduced. According to the changes of network flow and the capability of Snort disposal, this method could automatically adjust the way of detecting multimedia data. This method could effectively reduce packet loss ratio of Snort.

    • Contrast of Contour Extraction of Fish Eye Image

      2011, 20(4):214-218. CSTR:

      Abstract (2093) HTML (0) PDF 753.77 K (5103) Comment (0) Favorites

      Abstract:To resume actual image from fish eye image, the Precondition is contour extraction of fish eye image truly. At the same time, contour extraction of fish eye image is also to find the center and radius of fish eye image. This paper is to compare calculating the area of the square method, the circular region, scan line approach algorithm and the improved scan line of approach algorithm. The improved scan line of approach algorithm has the advantage of veracity, the less calculate amount, the good real-time and the fine Calibration results.

    • Method Adapter-Based for Components Composition

      2011, 20(4):219-222,193. CSTR:

      Abstract (1989) HTML (0) PDF 826.91 K (2671) Comment (0) Favorites

      Abstract:Component-based reuse technology is considered to improve software development efficiency and quality of service and effective way to have on different application areas have been widely used. In service-oriented architecture, how to use a smaller component size has been to construct a new large size as the current software component reuse in the field of a hotspot. Component-oriented interface for the existing deficiency combination of methods, this article from reusable components and combination of standard methods for analysis of both presentation and on this basis provides a universal adapter technology based on combination of components Methods.

    • Genetic Algorithm Based Immigrants for Dynamic Travelling Salesman Problem

      2011, 20(4):223-226,202. CSTR:

      Abstract (2045) HTML (0) PDF 851.05 K (3234) Comment (0) Favorites

      Abstract:Add immigrants in the standard genetic algorithm can enrich the population diversity, so that SGA can better adapt to environment changes. In order to improve the space exploration search capabilities of genetic algorithm based on immigrants, inspired by primal-dual, designed Primal-Dual based Immigrants(PDI), and add PDI to SGA to solve the Dynamic Travelling Salesman Problem(DTSP). Simulation results show that PDIGA is better able to adapt to environment changes to other genetic algorithms based on immigrants.

    • Image-Text Encryption Techniques in Mobile Communications Based on X-IDEA

      2011, 20(4):227-230. CSTR:

      Abstract (2388) HTML (0) PDF 649.09 K (4128) Comment (0) Favorites

      Abstract:This paper has studied the encryption of data in mobile’s graphic communication, and the computing power cannot be compared with the computer due to the limited performance of mobile devices. Therefore, this paper uses a highly efficient and lightweight characteristics: X-IDEA encryption algorithm, it is a improved IDEA algorithm. This nalgorithm has improved IDEA more suitable transmission used in mobile graphics safe, more suitable the current variable size Photo in 3G, while the presence of an increased possibility of the same part of the case.

    • Improvement and Implementation of ETH-AIS

      2011, 20(4):231-234. CSTR:

      Abstract (2346) HTML (0) PDF 727.14 K (4181) Comment (0) Favorites

      Abstract:Ethernet-OAM is an Operation-Administration and Maintenance mechanism for Ethernet, which is mainly go on Ethernet-Continuity Check(ETH_CC), tracking and locating link fault. However, ETH-CC yields redundant link-fault alarms on the premise that a Maintenance Domain nests another. As a result, it is difficult to locate, separate and settle network faults with them. Ethernet-Alarm Indication Signal(ETH-AIS) be able to restrict ETH-CC producing redundant alarm. This paper is based on the ITU-T Y.1731 recommendation to improve ETH-AIS, including restrict redundant alarm information with high-speed, and reduce the amount of link-fault alarms and overcome the difficulty of locating, separating and settling network faults effectively. Finally to enhance the appliance of ETH-OAM and provide the technical support for Ethernet-operation.

    • Identity-Based Signcryption Scheme Without Trust Authority

      2011, 20(4):235-237. CSTR:

      Abstract (2156) HTML (0) PDF 580.66 K (3141) Comment (0) Favorites

      Abstract:Signcryption is a cryptographic primitive that combines both the functions of digital signature and public key encryption in a logical single step, at lower computational costs and communication overheads than the traditional signature-then-encryption approach. This thesis analyzes the present identity-based signcryption scheme, and puts forward a new identity-based signcryption scheme without trust authority by using bilinear pairings. In addition, it also analyzes the safety and efficiency of this scheme. Analysis shows that this proposal meets the safety and high efficiency requirement of Signcryption.

    • Quantitative Judgment on CMMI Process Stability

      2011, 20(4):238-240,210. CSTR:

      Abstract (1924) HTML (0) PDF 924.39 K (3365) Comment (0) Favorites

      Abstract:High Capability Maturity Model Integration model emphasizes the process of stability and application of quantitative management and statistical management, and quantitative management is to establish a perfect measurement system. This paper attempts to introduce some methods and tools which support quantitative management, from the process execution, quality, and effort deviation. Through the using these methods and tools, my enterprise got accurate statistics, and continuously improved the level of quantitative management, thus help enterprise improve process and enhance process stability.

    • Optimal Routing of Cigarette Delivery Vehicle Based on Genetic Algorithm

      2011, 20(4):241-244. CSTR:

      Abstract (1927) HTML (0) PDF 636.25 K (3481) Comment (0) Favorites

      Abstract:On the basis of establishing an optimized model for optimal routing of cigarette delivery vehicle problem, the paper uses techniques such as roulette wheel selection, partially matched crossover and self adaptation for fitness function, designs a genetic algorithm based on natural numbers. At the end of the paper make some experimental calculations using this algorithm. The experimental calculations results demonstrate that the optimal or nearly optimal solutions to the Cigarette Delivery Vehicle routing problem can be easily obtained by using genetic algorithm.

    • Accelerated Multi-Pixel Bresenham Line Drawing Algorithm Based on Circular Subtraction

      2011, 20(4):245-247,230. CSTR:

      Abstract (1882) HTML (0) PDF 778.45 K (3761) Comment (0) Favorites

      Abstract:Line drawing algorithm is very important in the computer graphics. It is the most famous algorithm that Bresenham Algorithm uses to draw a straightness line in a smooth fashion. The advantage of classic Bresenham Algorithm is that the operations are all integer numeric without division and decimal fraction. Meanwhile, the disadvantage of the algorithm is that it can just generate one pixel in a computation time and its low in efficiency. In this paper, an accelerated algorithm was proposed, which give full attention to the initiative relation between generation model of line and its linear slope, and it does generate more than one pixel of a line through row of raster display device. The core principle of the improved algorithm is utilizing the coordinate position of both ends of line and the symmetry characteristic for segments. After discussing theory and structure of the improved algorithm, the algorithm implementation and simulation are given at last. And finally, the hardware acceleration in the use of circular subtraction technology based on shift register was briefly described.

    • Personification Algorithm for Traveling Salesman Problem

      2011, 20(4):248-250,244. CSTR:

      Abstract (2296) HTML (0) PDF 700.10 K (3513) Comment (0) Favorites

      Abstract:In this paper, a personification algorithm for solving the Traveling Salesman Problem (TSP) is proposed, which is based on original greedy algorithm. The algorithm adopts neighborhood definition, the main idea is that to give a full array of all cities, and so full array of command to generate a loop with a greedy algorithm. Through the city exchange and Sub-sequence migration, it generates a better solution in the current neighborhood search. If the solution is found, it becomes the new current solution. Then, repeat the process. In the search process, Off-trap strategies are used to jump from local optimal solution and guide the search in promising directions. The results of the algorithm are compared to the Full Sub-path Ejection Algorithm (F-SEC) proposed by Rego .

    • Detectors Generating Algorithm Based on Modified Gene Library

      2011, 20(4):251-253. CSTR:

      Abstract (1952) HTML (0) PDF 643.33 K (3054) Comment (0) Favorites

      Abstract:The gene always comes from mutating the deleted memory detectors or no-self samples in the algorithm of generating detectors based on gene library. But after some generations, there will be some similar gene in the gene library. This is the phenomenon of cluster of gene. By using clustering, mutating, subtracting to gene library, it can increase the diversity of mutated detectors. The experimental results show that the algorithm can generate detectors more quickly and improve the ability of detection system to discover unknown intrusion.

    • Intelligent Guide System Based on Embedded Database SQLite

      2011, 20(4):254-256. CSTR:

      Abstract (1744) HTML (0) PDF 657.32 K (3683) Comment (0) Favorites

      Abstract:On the basis of comparative analysis of several major embedded database system, this paper introduces the system structure and technical characteristics of SQLite database. Then, the author disserts on the hardware and software design of GPS intelligent guide system, and presents the development of SQLite database applications on the PXA270 - WinCE platform.

    • Sending and Receiving Electronic Document System Based on Attack Resistance Algorithm

      2011, 20(4):257-259. CSTR:

      Abstract (1979) HTML (0) PDF 646.45 K (3205) Comment (0) Favorites

      Abstract:For sending and receiving electronic document System, the capablitity to resist attack is researched. The smart card is used to strengthen the safety management about electronic document. First, the principle about Hwang-L scheme to resist attack is introduced in this paper. The shortcomings of security system is analyzed, and improved scheme is brought out. The improved scheme is enumerated to many kinds forms about attack to be analyzed. Finally, the inspection was carried out in sending and receiving electronic document System in our college.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063