• Volume 20,Issue 7,2011 Table of Contents
    Select All
    Display Type: |
    • Mechanical Model Multi-angle of View Hypothesized Design Assembly System

      2011, 20(7):1-4. CSTR:

      Abstract (1724) HTML (0) PDF 789.09 K (3406) Comment (0) Favorites

      Abstract:With the UML modelling language, this paper uses object-oriented “branch-refinement”, the screw type functional design. It designs a clear layered function system for the module funtions in mechanical model multi-angle of view hypothesized design assembly system, like virtual model design from multi-angles, interactive assembly interference examination and mechanical movement simulation demonstration. At the same time, it has used the MFC dynamic link module storehouse and the bidirectional iterative chain table in system's essence design, guaranting the nimble extendibility of the software system, which has laid a solid foundation for this system's procedure.

    • Design for the Internet of Things Based on Three-Stage Methods

      2011, 20(7):5-10. CSTR:

      Abstract (2422) HTML (0) PDF 809.29 K (3337) Comment (0) Favorites

      Abstract:In this paper, the design of the internet of things is discussed. Under the three-layer structure of the internet of things, a three-stage design method is proposed. According to the method, the design of the internet of things is implemented. Our study has shown that the three-stage design method of the internet of things is of great applicable significance.

    • Design and Implementation of the Internet of Things in Intelligent Warehouse Management

      2011, 20(7):11-15. CSTR:

      Abstract (2433) HTML (0) PDF 694.94 K (7418) Comment (0) Favorites

      Abstract:The internet of things has been paid more and more attention for its huge application prospect by the governmnet, academe and industry all over the world. “Intelligent Logistics” has attracted widespread concern. Based on the research on the concept, technology system, structure and basic principle, the paper proposes a highly intelligent design solution of warehouse management system applying the technology of the Internet of Things. It focuses on analyzing the working process, overall structure and functional module of the system, which follows by the further analysis of the realization of RFID system, wireless sensor monitoring network and operation system. The system solves the problems, like the low efficiency of logistics information process and inaccurate inventory check, which exist wide in the traditional warehouse management, and it is fast, convenient, accurate, efficient and highly automated, while further effort has to be made to lower cost and improve security.

    • Development and Simulation of Macroscopic Traffic Flow Simulation System for Urban Freeway Networks

      2011, 20(7):16-21. CSTR:

      Abstract (1641) HTML (0) PDF 782.60 K (4354) Comment (0) Favorites

      Abstract:In order to provide an effective method for traffic operation and evaluating different traffic control strategies for urban freeway network, this paper provides a macroscopic traffic flow simulation system for urban freeway. Whole framework of the system includes input module, simulation module and output module. Then it describes the program process and gives the main technical details via the object-oriented language Microsoft Visual Basic. Finally, taking the example of an urban freeway network with two origins and two destinations, this paper describes the process of generation, spreading and dissipation of the recurrent congestion. Besides, it simulates the effects of the ALINEA ramp metering strategy. Research results show that the system does not only do well in describing the evolution of the network traffic flow, but also testing and evaluating traffic control strategy effectively.

    • A Distributed Network Intrusion Prevention System

      2011, 20(7):22-25. CSTR:

      Abstract (1892) HTML (0) PDF 586.80 K (3360) Comment (0) Favorites

      Abstract:In order to improve the current performance bottlenecks facing IPS, false positive, false negative and attack speed issue etc, this paper presents a distributed “analysis and testing+centralized control+upgrade services” Architecture for Network Intrusion Detection and Prevention System. Analysis and testing can be achieved mainly through protocol identification and analysis, protocol anomaly detection, traffic anomaly detection and response methods. Centralized control is primarily used for intrusion detection and prevention monitoring and control system operation and system configuration. Upgrade Service is responsible for regular upgrades attack signature updates to make sure that the system provides the most cutting-edge security. Compatible with other security products, this system forms the depth of defense, to protect businesses and organizations to maximize network security.

    • Recommendation System Based on DCA in Web Self-Publication

      2011, 20(7):26-30,105. CSTR:

      Abstract (1606) HTML (0) PDF 684.07 K (3390) Comment (0) Favorites

      Abstract:To deal with the self-publication system’s huge text scale and speedy increasing, a right recommendation technology is helpful to realize the market value of “Long Tail” books. To deal with this issue, Directed Graph Clustering Algorithm is presented. Regarding clustering as the process of objects identifying, key words’ election depends on how much information they transfer in context. Moreover, to improve the efficiency of “Long Tail” texts’ clustering, a floating threshold and a sharing pool are set. Finally, experimental results comparing the K-Means algorithm prove that this clustering algorithm based on the directed graph is self-adaptive and effective.

    • Policy-Based QoS Management Module in IMS

      2011, 20(7):31-34,164. CSTR:

      Abstract (2270) HTML (0) PDF 990.48 K (3202) Comment (0) Favorites

      Abstract:IMS(IP Multimedia Subsystem) gives customers a rich multimedia experience. At the same time, it proposes a heigher demond about QoS(Quality of Service) management. Network operators will need to formulate different policy through service differentiation. Although 3GPP have defined Policy-based QoS management architectures, these architectures are only logical architectures and not physical implementations. This paper analyzes Policy-based QoS management model, proposes a implementation scheme which refers to 3GPP standards, designs and realizes Policy Decision Function and Pocicy enforcement Function which are key servers in the model. Upon testing, this service model can correctly complete the subscriptions of policy information, policy decision, bandwidth requirement, QoS class consultations and provide reference to Network operators.

    • DoS Attack Testing and Auditing System Based on Linux

      2011, 20(7):35-38. CSTR:

      Abstract (2277) HTML (0) PDF 747.44 K (3959) Comment (0) Favorites

      Abstract:With analysing the weakness of traditional intrusion detection system, a Linux-based DoS attack testing and auditing system is proposed. The network security detection module is used to detect the DoS attack from intranet, the network behavior regulation module is used to filter the behavior when users access to the illegal websites and the network behavior audit module is used to record the illegal behaviors of intranet users. Experiments show that the system has good performance in detecting DoS attacks, and the system can also regulate and audit illegal behaviors of the network users by contrast with the traditional intrusion detection system.

    • Architecture and Design of National Network in Nationwide Performing Places Monitoring System

      2011, 20(7):39-41,15. CSTR:

      Abstract (1646) HTML (0) PDF 605.54 K (3391) Comment (0) Favorites

      Abstract:Network infrastructure occupies an important position in the national Performing Place monitoring system just like the skeleton to human body. Based on the design requirements of the regulatory Performing Places, we build a network architecture based on the public transmission network. Combined with the network design of monitoring systems and the supervision of particular delivery strategy, we make appropriate network communication protocols and network control systems. And we also propose suitable network access technology and network security technology and network security technology. In the end, the future development for construction of the national regulatory system network is discussed.

    • Deployment of Wireless Sensor Networks for Farmland Surface Humidity Monitoring in Xinjiang

      2011, 20(7):42-46. CSTR:

      Abstract (1988) HTML (0) PDF 655.90 K (3445) Comment (0) Favorites

      Abstract:In order to precisely determine the extent of the water deficit and thus to provide a scientific reference for precision irrigation, a particular design of farmland surface humidity monitoring system based on wireless sensor networks is introduced. According to the features of XinJiang agricultural environment,a two-layer deployment architecture is proposed to satisfy the need of low-cost,long lifetime and large scale in this paper at first. In architecture the bottom layer is deployed evenly to monitor the information of soil moisture precisely and the cluster head nodes is distributed unevenly based on the number of packet transmitted and the distance to sink to ensure the cluster heads energy consumed balancedly. By the simulation and comparing to the leach-c and leach, it shows that the aims of scarcely deployment,energy-saving, equilibrium of energy consume and prolonging the system lifecycle is achieved.

    • Path Overlapped Method for Protocol Conformance Test Generation

      2011, 20(7):47-52. CSTR:

      Abstract (1770) HTML (0) PDF 957.74 K (3460) Comment (0) Favorites

      Abstract:A new formal method named path overlapped method is proposed for protocol conformance test generation based on UIO sequences. The main idea is to find a path without repeating transition in FSM as a POTS(path overlapped transition sequence), which is a sequence of distinct transitions such that if it is followed by a UIO sequence for the end state of the last transition in the sequence then all the transitions in the sequence are verified. According to the theoretical and experimental results, the test sequences generated by the path overlapped method are substantially shorter than those generated by other methods employing UIO sequences. Particularly, because of employing path overlapped transition sequence as a substitute for FOTS (fully overlapped transition sequence) in OUIO, generation time of overlapped sequence is greatly decreased.

    • Color Image Segmentation Based on Clustering and Improved Watershed Segmentation

      2011, 20(7):53-56,21. CSTR:

      Abstract (1945) HTML (0) PDF 915.24 K (4433) Comment (0) Favorites

      Abstract:In view of the existence of obvious over-segmentation problem in traditional watershed algorithm, an improved color image segmentation algorithm is proposed in this paper. This algorithm combines clustering and improved watershed algorithm methods. In HSV color space, the algorithm firstly utilizes clustering to classify pixels with similar features, then applies seed region growing algorithm for the regions generated by watershed segmentation algorithm. Furthermore, region merging approach is used to merge remaining small regions. Experimental results show that this algorithm reduces over-segmentation phenomenon significantly, and improves image accuracy while maintaining strong robustness and adaptability.

    • Synchrouous Control of Hydraulic Position Servo System

      2011, 20(7):57-60. CSTR:

      Abstract (1760) HTML (0) PDF 658.16 K (3692) Comment (0) Favorites

      Abstract:According to the problem of seamless steel pipe rolling mill production line, both sides of the hydraulic position servo system the inside different parameters and external interference caused by roller depressed position inconsistent synchronization, we designed the hydraulic position servo control system based on fuzzy output feedback synchronization, and prove the stability of the control system in theory. Simulation results show that hydraulic position servo control system based on fuzzy output feedback synchronization not only has short synchronization time but also has smaller error, when in the case of the differences both sides of the rolling mill inside the parameters and external disturbances.

    • Data Fusion Algorithm for Dynamic Clustering of Wireless Sensor Network

      2011, 20(7):61-64,25. CSTR:

      Abstract (1615) HTML (0) PDF 988.67 K (3004) Comment (0) Favorites

      Abstract:In view of the wireless sensor network used for emergency situations, this article presents a dynamic clustering based on event-driven dynamic clustering data fusion algorithm. On the basis of considering the severity of the incident and the residual energy, the algorithm chosen stimulus intensity and number of nodes remaining energy cluster-head play. Cluster-head node cluster by broadcasting a message of dynamic clusters, and dynamically adjust the delay time of each round of data fusion, data fusion to improve efficiency. Simulation results show that compared with the TEEN protocol, this algorithm has a lower average energy consumption of nodes and a better integration of network data latency.

    • Hybrid Recommendation System Combining Maximum Entropy and Tag Features

      2011, 20(7):65-68. CSTR:

      Abstract (1735) HTML (0) PDF 646.34 K (3739) Comment (0) Favorites

      Abstract:Because of the growing number of users and the rapid expansion of information, sparse problem of data matrix in traditional collaborative filtering becomes more seriously. We proposed a new hybrid recommendation system. Firstly, we consider tag information and rating information as constraints under maximum entropy model. Secondly, we define the features of tag information and rating information and calculate the corresponding weights. Finally, we use previously weights to predict probability distribution of target item for current user, then we choose the highest probability as predicted rating. Experiment results show that the proposed method can effectively improve the accuracy of recommendation systems.

    • Design and Implementation of Distributed MST Clustering

      2011, 20(7):69-75. CSTR:

      Abstract (1923) HTML (0) PDF 921.88 K (4370) Comment (0) Favorites

      Abstract:Clustering is one of the most important problems in data mining. Clustering algorithm can classify data without any knowledge about it, and find out the information that valuable. Recently, data mining is more and more widely used in the telecommunication area, but because of some problems, such as the size of the data, the type of the data and the complication of the computation, clustering is not used widely. This article gives a MST algorithm that suit for distribute computing. Combining with the method to represent the similarity that suitable for this algorithm, it designs a new clustering algorithm to solve the problem of sea size data analysis. Then, it shows how the algorithm is realized based on the distribute computing model called mapreduce.

    • Event Evolution Algorithm Based on FCA

      2011, 20(7):76-80. CSTR:

      Abstract (1580) HTML (0) PDF 753.68 K (3403) Comment (0) Favorites

      Abstract:Traditional event evolution analysis method can’t find out the relationship between potential connected events in a topic. We proposed a new method based on FCA. This method uses the idea of topic three layer model to extract the properties in the event and filter the useless properties in the light of PFF(Property Frequency Factor ). It constructs the Formal Context with property relation between events and analyzes the event evolution relation with similarities algorithm based on concept lattice. Practical examples show our method is effective.

    • Rules Extraction from Artificial Neural Networks for Classification Based Improved Ant Colony Algorithm

      2011, 20(7):81-85. CSTR:

      Abstract (1674) HTML (0) PDF 685.73 K (3472) Comment (0) Favorites

      Abstract:Classification obtains great concern in the field of data mining. Its main purpose is to predict the classification of data objects. Classification can be divided into two major categories of rule-based and non-rule-based, however because of the excellent performance that artificial neural network(ANN) can obtain from prediction, studying from experience and generalizing from the previous samples, making it an important method of classification. Although ANNs can achieve high classification accuracy, their explanation capability is very limited, as to restrict its application. This paper presents an improved ant colony algorithm based on ANNs classification rule extraction method, an improved ant colony algorithm is to help solve the ANN’s limited explanation capability to extract rules from the data. Experiments show that this approach could coordinate neural network to obtain rules of classified data well.

    • Topological Retrieval Algorithm for Blocks Base on Mass E-Map

      2011, 20(7):86-89,46. CSTR:

      Abstract (1603) HTML (0) PDF 1015.27 K (3300) Comment (0) Favorites

      Abstract:Road network topology information is the basis for GIS spatial analysis. Currently as the actual amount of road is increasingly growing, and embedded systems has been its own constraints, it is not suitable for reading all of the road network topology data into memory, against the problem of limited memory size. In this paper, by means of storing road network topology as “blocks” in the embedded electronic drives, and give the way to retrieve data block between different topological blocks when finding the optimal path.

    • K-Harmonic Means Clustering with Simulated Annealing

      2011, 20(7):90-93. CSTR:

      Abstract (1866) HTML (0) PDF 709.93 K (4062) Comment (0) Favorites

      Abstract:K-means algorithm is a frequently-used methods of partition clustering. However, it greatly depends on the initial values and converges to local minimum. In K-harmonic means clustering, harmonic means fuction which apply distance from the data point to all clustering centers is used to solves the problem that clustering result is sensitive to the initial valve instead of the minimum distance. Although the problem above is solved, the problem converged to local minimum is still existed. In order to obtain a glonal optimal solution, in this paper, a new algorithm called K-harmonic means clustering algorithm with simulated annealing was proposed. This alhorithm is introduced into simulated annealing to solve the the problems of local minimum. Then the algorithm was used to analyse IRIS dataset and get a conclution that the new algorithm get a glonal optimal solution and reached a desired effect.

    • Design Method for Xinjiang Folk Art Pattern

      2011, 20(7):94-99. CSTR:

      Abstract (1531) HTML (0) PDF 757.00 K (4086) Comment (0) Favorites

      Abstract:Objective: To address how to digital design with the characteristics of ethnic minorities in Xinjiang is a challenging problem. A method is put forward to evolution and combination primitive genes to regenerate gene and the introduction of morphing technology to fast generate with similar national style design genes. Methods: first, definition the concept of primitive gene and regeneration gene, to propose a primitive genetic generating method. Then, by setting the formation parameters of the regenerative gene, combine primitive gene to arrange regeneration gene which inherit the national significance. Finally, using the image morphing technology expand the pattern genes. Experimental results: a variety of patterns are generated by primitive gene and regenerative gene. Conclusion: proposed method is closely keeping the national style of design, it has the nice generalization ability and a promising future in the digital design fields and it is simple and easy in operation and can be widely popularized. So it can lay the foundation for auto-genetic pattern genes to establish folk design.

    • Product Requirement Mapping Method Based on ANN&CBR

      2011, 20(7):100-105. CSTR:

      Abstract (1524) HTML (0) PDF 2.28 M (2733) Comment (0) Favorites

      Abstract:During the cased-based reasoning procedure of requirement mapping, the randomness and subjectiveness of weight setting always lead to the poor accuracy of results affected by irrelevant noise. A new method of CBR weight setting has been put forward to solve it based on ANN, which defined the relevant weight from the aspects of feature sensitivity, activity, saliency, relevance and the transforming mechanism of features input also been described. Based on it, a new requirement mapping procedure module has been put forward oriented to CBR and verified with the design of the hydraulic workbench, which gives a new method for product requirement mapping.

    • Grid Trust Model

      2011, 20(7):106-110,85. CSTR:

      Abstract (1626) HTML (0) PDF 742.02 K (3554) Comment (0) Favorites

      Abstract:It is necessary to evaluate the network behavior of users in grid computing in order to resolve the security problems due to the dynamics and uncertainty of the grid environment. Thus, evaluation of the user’s behavior can reflect his reliability. This paper discusses the security requirements in grid environment, offers the correlative definitions of trust, According to the former analysis, a new grid trust model is proposed. This model is used to discriminate the trust relationships between users in the grid environment. It provides a method to analyze the trust degree of users and the report in the grid environment. The two different trust relationships within and between domain are handled with different approaches. This dissertation studies how to build a trust model for grid computing in order to find out malicious users and improve security and reliability of system.

    • Research of QoS Routing Algorithm of Wireless Mesh Network Based on Improved Antcolony Algorithm

      2011, 20(7):111-115. CSTR:

      Abstract (1747) HTML (0) PDF 814.93 K (4058) Comment (0) Favorites

      Abstract:Currently, the wireless Mesh network is a hot spot of wireless network research. In wireless Mesh network, QoS is an important issue, and QoS routing is the key technology to solve this problem. In this paper, we proposed a wireless Mesh network QoS routing algorithm on Improved ant colony algorithm , and our experimental results shows that it can provide better QoS support.

    • Meteorological Data Storage and Management System

      2011, 20(7):116-120. CSTR:

      Abstract (2037) HTML (0) PDF 577.03 K (4289) Comment (0) Favorites

      Abstract:At present, the management and service of non real-time meteorological data at Beijing Meteorological Bureau have two problems. One is that storage structure of meteorological data is not reasonable, the format of storage files is not uniform, and data management is not clear. The second is it’s difficult for researchers and weathermen to obtain the needed meteorological data. To solve the above problems, a Meteorological Data storage and management System has been developed with ASP language. The system structure is based on Microsoft Server 2003+Microsoft SQL Server 2005+Web. This system open a convenient channel for data acquisition. On the other hand, it integrates all kinds of meteorological data orderly. In conclusion, the meteorological data storage and management System makes the meteorological data integration on storage, management and service come true. This system is a good example of the management of the meteorological data.

    • Virtools Virtual Tourist Areas in the Development of Roaming System

      2011, 20(7):121-124. CSTR:

      Abstract (1568) HTML (0) PDF 687.32 K (3572) Comment (0) Favorites

      Abstract:With the continuous development of the tourism industry, to enable tourists to visit the destination online in advance, so that the tourist information can be widespread and easily accessed by the tourists, developing virtual tourism roaming system is particularly important. Roaming system uses 3DS MAX scenes and visit the tourist area on the role of three-dimensional modeling, good texture, texture, and after the relevant action set, using Virtools for system design and development, and use of collision detection technology to ensure system Roaming the real effect. Focus on tourist areas in the three-dimensional modeling and design of Virtools interactive features, based on the development of key technology of the system to analyze and resolve, and Wudang Mountain Scenic Spot, for example, completed a three-dimensional interactive virtual tour area design, practice, virtual reality technology in the tourist area of roaming.

    • Application of JMF and RMI to the Telemedicine System

      2011, 20(7):125-128,159. CSTR:

      Abstract (1361) HTML (0) PDF 762.01 K (3276) Comment (0) Favorites

      Abstract:Modern telemedicine is an emerging subject involving computer networking, multimedia and medical diagnosis. Since the current systems are platform-dependent and weak at remote controlling, combining JMF (Java Media Framework) framework and RMI (Remote Method Invocation) technique, this paper discusses the multimedia communication across different platforms, remote PTZ camera controlling and so forth to improve the weakness of platform-dependent and remote controlling. Tested in real world, the telemedicine system proposed in this paper is proved to be portable and good at remote controlling.

    • Shenzhen Urban Housing Safeguard Information System

      2011, 20(7):129-132. CSTR:

      Abstract (1677) HTML (0) PDF 783.85 K (4343) Comment (0) Favorites

      Abstract:Based on the development and application of Shenzhen Urban Housing Safeguard Information System, this paper expatiates the information system structure, construction contents, technical features and application effect. It mainly discusses using the workflow design, modeling design, modularization design, labeled design, build a high cohesion and low coupling system framework that can be expanded and maintainable, and helps to continue supporting the housing safeguard business development and policy adjustment.

    • Implementation and Application of Guarding Task Management System Based on Geographic Information System

      2011, 20(7):133-136. CSTR:

      Abstract (1508) HTML (0) PDF 626.87 K (3453) Comment (0) Favorites

      Abstract:The functionality and implementation of the Guarding Task Management System are introduced based on GIS (Geographic Information System. Furthermore, the key technologies such as data security, GeoDatabase storage etc. are explored. The development and application information of the system, indicates that the implementation of the system improved efficiency of the implementation of guarding task.

    • Steering Wheel Control System Based on Bluetooth

      2011, 20(7):137-140. CSTR:

      Abstract (2166) HTML (0) PDF 542.54 K (3554) Comment (0) Favorites

      Abstract:This paper introduces a steering wheel control system based on the Bluetooth. Taking advantage of the Bluetooth, we can realize the optimal design of electronic switchings on the steering wheel panel, so the problem that we have to look down to find the switch in the past can be overcome, and we could achieve most of the operation on the steering wheel. At the same time, the driving is more convenient. The control system uses the Bluetooth module based on the BC219159 Bluetooth chip. The master control device uses the STC89LE516 as the controller, which collect the instructions from the button fixed into the steering wheel, and then, it sends the instructions to the Bluetooth chip which sends the signal by the way of wireless; when the slave device receive the signal, the slave chip STC89C516 send corresponding instructions which are based on the different signal, making use of the CAN bus to control the four systems that the air conditioning, the sound, the cruise, the lights, and because the LCD is used, the drivers can use the system more easily. The system utilizes the PWM to control the strength of each control function. Hence, the cost of the hardware is less. The trial proves the system has the advantages of low cost, reliability, safety and interchangeability.

    • A Multi-Layer Test Scrip

      2011, 20(7):141-145. CSTR:

      Abstract (1875) HTML (0) PDF 856.95 K (3431) Comment (0) Favorites

      Abstract:Test script is an important component of test automation. In this paper, different kinds of test script are researched and summarized, then a multi-layer test scrip is proposed and evaluated. The result indicates that the technology is feasible and can meet the requirement.

    • Server Virtualization Used on the Proxy Server

      2011, 20(7):146-149. CSTR:

      Abstract (1817) HTML (0) PDF 591.20 K (3169) Comment (0) Favorites

      Abstract:The technology “server virtualization” has been in gradual mature and been put in wider use. The kernel firewall based on the operating system “linux” is powerful. With the integration of netfilter firewall for linux and server virtualization of vmware server, it can work as the enterprise firewall as well as the server virtualization which provides all kinds of services. The server virtualization, together with free open-source software is applied in small and medium sized network for the benefit of low cost, effective management and direct maintenance.

    • Application of Improved C4.5 Algorithm in Performance Management

      2011, 20(7):150-152,213. CSTR:

      Abstract (2145) HTML (0) PDF 604.66 K (3539) Comment (0) Favorites

      Abstract:This paper proposed the definition of “ScoreChangeRate” and “DepartmenWeight” and have improved the C4.5 algorithm. The data warehouse, based on the performance management system and applied to all kinds of aspect, is constructed according to the snowflake model. Using the improved of C4.5 algorithm abstract useful information in data warehouse to determine performance indicators and the weight can make the evaluation results more scientific and the results of analysis more accurate.

    • LAN Application Platform Based on Citrix Virtualization Technology and PXE Diskless Linux

      2011, 20(7):153-155. CSTR:

      Abstract (1915) HTML (0) PDF 607.09 K (5436) Comment (0) Favorites

      Abstract:Latest research of the Gartner Analysis Company shows currently more than 80% of the enterprises implemented a virtualization project or plan. With diskless Linux based on PXE remote boot technology, Citrix Corporation's server virtualization product XenServer and application virtualization product XenApp cannot only reduce the complexity of the LAN foundation construction, improve the operating efficiency of the LAN, simultaneously reduce the cost of LAN hardware and software, it also manage and maintain client software system more easily.

    • Regression Test Technology

      2011, 20(7):156-159. CSTR:

      Abstract (2034) HTML (0) PDF 560.68 K (4312) Comment (0) Favorites

      Abstract:The paper introduces the concept of regression testing and the situation of regression testing using software automation testing tools. Then, it introduces on the limitations of selenium, a popularly used automation testing tool. To address these limitations, it gives the solution.

    • Color-Based Image Retrieval

      2011, 20(7):160-164. CSTR:

      Abstract (2453) HTML (0) PDF 604.91 K (6013) Comment (0) Favorites

      Abstract:The color features, as an important visual information of image, have been widely used in the Content-Based Image Retrieval(CBIR) because of the simple calculation and better robustness. According to the color features of the image, this paper makes systematic discussion and research on color space(color space transformation), color quantification(HSV color space), color features extraction and color characteristic similarity measurement. Then, through classic color segment histogram algorithm, the entire process of Color-based Image Retrieval is proposed. Finally, the existent problems and further research direction of the color-based image retrieval is summarized.

    • Implementation of Ad Hoc Routing Protocol

      2011, 20(7):165-168. CSTR:

      Abstract (1925) HTML (0) PDF 626.23 K (4205) Comment (0) Favorites

      Abstract:The current Ad Hoc network researches are mainly based on simulated experiments. This paper is centered upon realization of AODV routing Protocol. A method on AODV routing Protocol of design and implementation based on Netfilter function framework is proposed. The hardware platform is founded based on PXA310 processor and IEEE802.11b wireless IEEE802.11b network card, a design of software based on the Netfilter function framework was accomplished, has achieved the major Processes such as the routing request, routing updating and maintenance, this design will be important worthiness for implementation of AODV routing protocol.

    • Application of Overcomplete ICA to Speech Signal Extraction

      2011, 20(7):169-171. CSTR:

      Abstract (2151) HTML (0) PDF 540.89 K (4137) Comment (0) Favorites

      Abstract:In speech signals processing, speech signals are collected by microphones, and then use algorithms to extract and separate, ICA (Independent component Analysis, ICA) algorithm is in common use.When the number of microphone is less than speakers number, that is called underdetermined, then speech signals’ extraction needs overcomplete ICA algorithm . A two-step approach is introduced:geometric algorithm to estimate a mixing matrix and shortest path to estimate sources. The algorithm of speech signal extraction is very good, the simulation results verify the results.

    • Image Clustering Based on Improved FCM Algorithm

      2011, 20(7):172-175. CSTR:

      Abstract (1963) HTML (0) PDF 580.75 K (3482) Comment (0) Favorites

      Abstract:In this paper, the traditional FCM algorithm membership function was improved. The improved algorithm can reduce the isolation point of the image data clustering results. In this paper, Gray-gradient co-occurrence matrix of the image texture feature extraction using principal component analysis on the extracted high-dimensional feature image to reduce the dimensions, combined with this improved FCM clustering algorithm to the image after the image data preprocessing clustering. Experiments show that the method has better clustering results, with fewer iterations and can reach the global optimum.

    • Research and Practice on Test Case Reuse

      2011, 20(7):176-179. CSTR:

      Abstract (1846) HTML (0) PDF 609.33 K (3420) Comment (0) Favorites

      Abstract:The designing of test case costs a lot of time and manpower in military software functional testing. Effective reuse existing test case can shorten the time and reduce the workload of test case designing, leading to high testing efficiency. This paper researches on the technology of the reuse of functional test case for large scale military software. A reuse method in military software functiona testing is proposed, and it has been practiced in project.

    • Design and Realization of MATLAB Graphical User Interfaces Based on the WebBrowser Controls

      2011, 20(7):180-183,198. CSTR:

      Abstract (2317) HTML (0) PDF 696.17 K (6576) Comment (0) Favorites

      Abstract:MATLAB graphical user interfaces development environment (GUIDE) has been unable to achieve the function of scroll bar based on the VC form. This paper introduces a method of displaying large amounts of content that using a WebBrowser ActiveX in MATLAB GUIDE, and utilizes the characteristics of scroll bar's automatic generation in web page to achieve an abundant displaying result. This essay mainly focuses on the creation of WebBrowser controls, adding and displaying the buttons, texts, images in WebBrowser ActiveX, and data transfers between MATLAB and web controls. This method is validated through image classification system, since the results demonstrate its simplicity and expansibility.

    • Wireless Network Sensor Node Design Based on CC2530 and ZigBee Protocol Stack

      2011, 20(7):184-187,120. CSTR:

      Abstract (6391) HTML (0) PDF 714.75 K (33540) Comment (0) Favorites

      Abstract:According to the actual needs of intelligent household, environmental monitoring etc, this paper designed a wireless sensor node of long-distance communication system. This system used the second SoC CC2530 set in RF and controller chips as the core module and externally connected with CC2591 RF front-end power amplifier module. Based on ZigBee2006 in software agreement stack, it realized each application layer function based on ZStack. It also introduced wireless data acquisition networks based on the ZigBee agreement construction, and has given the hardware design schematic diagram and the software flow chart of sensor node, synchronizer node. The experiment proved that the node is good in performance and the communication is reliable. The communication distance has increased obviously compared with the first generation TI product.

    • Collaborative Recommendation Algorithm of Web Customer Demand Based on Item Factor Analysis

      2011, 20(7):188-191,210. CSTR:

      Abstract (1937) HTML (0) PDF 572.95 K (3686) Comment (0) Favorites

      Abstract:In order to solve the problem that data overload and data sparsity in collaborative filtering recommendation algorithm, the collaborative recommendation algorithm based on item factor analysis is proposed in this paper. The algorithm reduces the dimensions of item vector by use of factor analysis and gets some representative item factors, which are used to regression analysis of target items to forecast the evaluated items. Finally, experiments show that the algorithm is effective, which provides a new way for future recommendation algorithm research.

    • Algorithm of "Sword’s Trail" Effect in 3D Games

      2011, 20(7):192-194,243. CSTR:

      Abstract (2074) HTML (0) PDF 651.17 K (3984) Comment (0) Favorites

      Abstract:“Sword's Trail” means the “lighting effects” when weapons like swords are waving in 3D games. This article analyzes the rules of the image’s changes for “Sword’s Trail’ effect, and hands out an practical algorithm of the effect mentioned above. With this algorithm, the application can automatically produce the “Sword’s Trail” effect of weapons. In combination with real application experience, this article also proposes an ameliorative method of the algorithm. The algorithm can combine with a variety of game engine, and has been applied successfully in a lot of 3D games.

    • Generating Algorithm of Recursive Blocks Matrix for Minimum Test Case Set on MC/DC

      2011, 20(7):195-198. CSTR:

      Abstract (2348) HTML (0) PDF 525.95 K (4354) Comment (0) Favorites

      Abstract:The quantity of the test suite affects the cost and efficiency of software testing, so it is important to generate an algorithm of minimum test case set. According to studying syntactic tree of Boolean expressions on recursive blocks matrix, an algorithm for minimum test case set on MC/DC is proposed. Its correctness is proved in theory and its premise is considered.

    • A Vehicle Detection Model of Regional Fingerprint Database

      2011, 20(7):199-202,132. CSTR:

      Abstract (1790) HTML (0) PDF 797.30 K (3396) Comment (0) Favorites

      Abstract:This paper proposes a new model for vehicle detection. The main principles of this paper are to describe the distribution of vehicle appearance by using compact vehicle appearance prototypes to match the individual appearance prototype, and applying a simple distance standard, to collect and classify all the obtained regional information into feature library, to obtain the probability of similar appearance depending on the number of matched vehicle appearances and the density of coverage in target detection, and eventually to distinguish and recognize different parts of the vehicle appearances by setting the threshold. Experimental results show that the use of this detection model can facilitate and effective monitoring vehicle in varieties of weather conditions.

    • Implementation of Outline Font in VxWorks5.5

      2011, 20(7):203-206. CSTR:

      Abstract (2070) HTML (0) PDF 602.49 K (4324) Comment (0) Favorites

      Abstract:Bitmap fonts are used to display in VxWorks5.5, which is simple and widely used. But it will not meet the demand when we don't make sure which font size is ok as each bitmap font file has only one font and one size. We can achieve a variety of fonts and sizes by using the TrueType fonts and FreeType font engine. This paper describes the basic principle of TrueType and FreeType technology, and how to realize outline font display by using WindML, FreeType and TrueType fonts .

    • Wiki Design and Realization Based on JavaScript Pattern

      2011, 20(7):207-210. CSTR:

      Abstract (1779) HTML (0) PDF 547.66 K (3528) Comment (0) Favorites

      Abstract:MVC pattern is usually used for large-scale B/S application development. It supplies a structured module, and realizes software development’s job-share as well as application’s modularization. This paper in depth studies a WIKI system’s design and realization in client’s browser, in the process of realization. It fully uses JavaScript and combines with MVC pattern. So it makes all the application program higher systematic. At the same time, it reduces the maintenance cost because of using divided template and increasing code reusability.

    • Design of General Combination Query Module Based on WEB

      2011, 20(7):211-213. CSTR:

      Abstract (1655) HTML (0) PDF 529.28 K (4066) Comment (0) Favorites

      Abstract:In order to meet the needs of users, the authors developped a general combination query module. The article introduces its ideas of design and implementation which is simple and easy to achieve. It provides a good solution to the development of management information system based on web while designing the general query module.

    • An Adaptive Rectangle Search Algorithm Based on Center-Bias

      2011, 20(7):214-216. CSTR:

      Abstract (1792) HTML (0) PDF 513.93 K (3616) Comment (0) Favorites

      Abstract:In H.264 video coding standard, in order to get higher compression ratio, HEXBS algorithm is employed to motion estimation, but the calculation work is very large. Compared with Full Search algorithm, it reduces the searching time obviously, but it takes fixed module and fixed searching step, which doesn’t take full advantage of center-bias characteristic of video sequence. Based on this observation, this paper proposes a new search algorithm named Rectangle search Algorithm, and the search algorithm is adaptive. At the end of the paper, the proposed algorithm has been experimented.The results show that the searching speed has largely increased while maintaining the same quality of image.

    • Accelerating of Artificial Neural Network Training by GPU with OpenCL Support

      2011, 20(7):217-220. CSTR:

      Abstract (2161) HTML (0) PDF 615.99 K (4404) Comment (0) Favorites

      Abstract:The computation quantity in artificial neural network training will get more and more with the increase of neurons quantity, it is time-consuming for training a neural network with too many neurons. A method that accelerates artificial neural network training is to optimize the training algorithm, so as to reduce the computation quantity. Since there is too much matrix and vector computation in artificial neural network training algorithm, the optimized training algorithm implemented by OpenCL C language on GPU, compared to the conventional CPU-based implementation, the training speed will be increased a lot. Based on parallel computing ability of hardware, accelerating of artificial neural network training by GPU with OpenCL Support is researched in this paper.

    • Design of Multi-User and Secure Serial Device Server Based on Embedded System and SSL

      2011, 20(7):221-224. CSTR:

      Abstract (1739) HTML (0) PDF 619.13 K (3737) Comment (0) Favorites

      Abstract:For the shortage of current serial device server which almost lacks security and functionality, based on arm9 and Linux, we have designed a secure serial device server using SSL protocol and multi-user management. The overall design of hardware and software were introduced. Including U-boot, kernel, root file system and a variety of tools, embedded Linux system has been emigrated, we discussed the framework of the software system, focusing on data process framework, user management and the implementation of SSL. The application shows that this device runs stably and meets the needs of secure communication.

    • Hopfield Algorithm Orienting for Web Page Structure-Feature

      2011, 20(7):225-227,232. CSTR:

      Abstract (1537) HTML (0) PDF 579.12 K (3192) Comment (0) Favorites

      Abstract:As the Web continues to grow, it has become increasingly obvious that information overload and is terribly noisy. In this paper, to address such issues as low precision, much time-consumption, we present an improved Hopfield algorithm orienting web page structure feature. The experimental results show that the proposed approach is practical.

    • Analysis and Application of Variables and Methods in Java Language

      2011, 20(7):228-232. CSTR:

      Abstract (1673) HTML (0) PDF 508.29 K (4181) Comment (0) Favorites

      Abstract:This paper makes a detailed classification and illustrates the concept of variables and method, analyzes the variables and methods of memory allocation problem in Java programming design application process, the covering problems in the inheritance and the application problems of static variables and static methods. It also sets partial typical examples. This research can provide Java program developers appropriate use of variables and methods as reference in programming design process, and ensure the developed program is concise and high efficiency.

    • .NET Software Code Analysis and Protection

      2011, 20(7):233-235,220. CSTR:

      Abstract (1507) HTML (0) PDF 573.29 K (3396) Comment (0) Favorites

      Abstract:From the practical perspective, the paper introduces several common analyzing techniques about software codes with some cases, and utilizes the protecting techniques: strong name, name obfuscation, IL code obfuscation and packing etc. The code is protected layer by layer to enhance the difficulty cracked by decompile, and to achieve the purpose of protecting the software codes.

    • Internationalizton Features and Implementation of Localization for Openbravo ERP

      2011, 20(7):236-238. CSTR:

      Abstract (1562) HTML (0) PDF 636.93 K (4128) Comment (0) Favorites

      Abstract:Openbravo is one of the most successful open-source ERP software, this paper analyzes the Openbravo international programming ideas and technical features, and then discusses localized implementation technology, finally gives specific methods to achieve localization of Openbravo on ubuntu 9.04 Linux enviroment.

    • >Survey
    • Research Progress of Ontology Evolution

      2011, 20(7):239-243. CSTR:

      Abstract (1913) HTML (0) PDF 555.14 K (5685) Comment (0) Favorites

      Abstract:The knowledge is constantly changing, so it needs a timely correction in order to absorb and integrate new knowledge, which involves the evolution of the ontology. The paper summarized from definition, cause, procedure, technology and evolution tools, and summed up the research of ontology evolution. The procedure of ontology evolution, the important technology at present and main evolution tools are mainly introduced and lay theory and technology foundation for further research on ontology evolution.

    • Advances in Harmony Search Algorithm

      2011, 20(7):244-249. CSTR:

      Abstract (3116) HTML (0) PDF 628.84 K (7298) Comment (0) Favorites

      Abstract:Harmony search algorithm is a new intelligent optimization algorithm. By repeatedly adjusting the solution variables in harmony memory, the function converges to its optimal solution with increased iterations and completes the optimization. The algorithm is simple in concept, less adjustable parameters, easy to implement. In this paper, the origin of harmony search algorithm and the basic idea are given. We give the basic steps and processes of harmony search algorithm, and analyze harmony memory considering rate and pitch adjusting rate that effects on the algorithm. The difference between harmony search algorithm and genetic algorithm is compared. Furthermore, the applications and research trend of harmony search algorithm are pointed out.

    • Review of Intelligent Camera Technology

      2011, 20(7):250-253. CSTR:

      Abstract (2326) HTML (0) PDF 583.64 K (3301) Comment (0) Favorites

      Abstract:In reviewing the development and drawbacks of surveillance camera technology at home and abroad, this paper first introduces the intelligent camera's functional structure and hardware needs. Then, key technologies and solutions such as embedded processor, video analysis, video compression and network communication are analyzed. Finally, the development trend and the application perspective of intelligent camera are prospected.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063