ZHU Xiao-Feng , LI Ji-Jun , YANG Yong-Bo
Abstract:With the UML modelling language, this paper uses object-oriented “branch-refinement”, the screw type functional design. It designs a clear layered function system for the module funtions in mechanical model multi-angle of view hypothesized design assembly system, like virtual model design from multi-angles, interactive assembly interference examination and mechanical movement simulation demonstration. At the same time, it has used the MFC dynamic link module storehouse and the bidirectional iterative chain table in system's essence design, guaranting the nimble extendibility of the software system, which has laid a solid foundation for this system's procedure.
LIU Yao-He , CHU Xiao-Rui , WANG Li
Abstract:In this paper, the design of the internet of things is discussed. Under the three-layer structure of the internet of things, a three-stage design method is proposed. According to the method, the design of the internet of things is implemented. Our study has shown that the three-stage design method of the internet of things is of great applicable significance.
Abstract:The internet of things has been paid more and more attention for its huge application prospect by the governmnet, academe and industry all over the world. “Intelligent Logistics” has attracted widespread concern. Based on the research on the concept, technology system, structure and basic principle, the paper proposes a highly intelligent design solution of warehouse management system applying the technology of the Internet of Things. It focuses on analyzing the working process, overall structure and functional module of the system, which follows by the further analysis of the realization of RFID system, wireless sensor monitoring network and operation system. The system solves the problems, like the low efficiency of logistics information process and inaccurate inventory check, which exist wide in the traditional warehouse management, and it is fast, convenient, accurate, efficient and highly automated, while further effort has to be made to lower cost and improve security.
ZHANG Sheng-Rong , GAN Hong-Cheng , SUN Xin , YANG Zhen-Zhen
Abstract:In order to provide an effective method for traffic operation and evaluating different traffic control strategies for urban freeway network, this paper provides a macroscopic traffic flow simulation system for urban freeway. Whole framework of the system includes input module, simulation module and output module. Then it describes the program process and gives the main technical details via the object-oriented language Microsoft Visual Basic. Finally, taking the example of an urban freeway network with two origins and two destinations, this paper describes the process of generation, spreading and dissipation of the recurrent congestion. Besides, it simulates the effects of the ALINEA ramp metering strategy. Research results show that the system does not only do well in describing the evolution of the network traffic flow, but also testing and evaluating traffic control strategy effectively.
XUE Hui , DENG Jun , YE Bai-Long , LU Lan
Abstract:In order to improve the current performance bottlenecks facing IPS, false positive, false negative and attack speed issue etc, this paper presents a distributed “analysis and testing+centralized control+upgrade services” Architecture for Network Intrusion Detection and Prevention System. Analysis and testing can be achieved mainly through protocol identification and analysis, protocol anomaly detection, traffic anomaly detection and response methods. Centralized control is primarily used for intrusion detection and prevention monitoring and control system operation and system configuration. Upgrade Service is responsible for regular upgrades attack signature updates to make sure that the system provides the most cutting-edge security. Compatible with other security products, this system forms the depth of defense, to protect businesses and organizations to maximize network security.
Abstract:To deal with the self-publication system’s huge text scale and speedy increasing, a right recommendation technology is helpful to realize the market value of “Long Tail” books. To deal with this issue, Directed Graph Clustering Algorithm is presented. Regarding clustering as the process of objects identifying, key words’ election depends on how much information they transfer in context. Moreover, to improve the efficiency of “Long Tail” texts’ clustering, a floating threshold and a sharing pool are set. Finally, experimental results comparing the K-Means algorithm prove that this clustering algorithm based on the directed graph is self-adaptive and effective.
LV Rong-Nan , MA Yue , YU Bo
Abstract:IMS(IP Multimedia Subsystem) gives customers a rich multimedia experience. At the same time, it proposes a heigher demond about QoS(Quality of Service) management. Network operators will need to formulate different policy through service differentiation. Although 3GPP have defined Policy-based QoS management architectures, these architectures are only logical architectures and not physical implementations. This paper analyzes Policy-based QoS management model, proposes a implementation scheme which refers to 3GPP standards, designs and realizes Policy Decision Function and Pocicy enforcement Function which are key servers in the model. Upon testing, this service model can correctly complete the subscriptions of policy information, policy decision, bandwidth requirement, QoS class consultations and provide reference to Network operators.
Abstract:With analysing the weakness of traditional intrusion detection system, a Linux-based DoS attack testing and auditing system is proposed. The network security detection module is used to detect the DoS attack from intranet, the network behavior regulation module is used to filter the behavior when users access to the illegal websites and the network behavior audit module is used to record the illegal behaviors of intranet users. Experiments show that the system has good performance in detecting DoS attacks, and the system can also regulate and audit illegal behaviors of the network users by contrast with the traditional intrusion detection system.
JIANG Wei , ZENG Ying , REN Hui , DING Li
Abstract:Network infrastructure occupies an important position in the national Performing Place monitoring system just like the skeleton to human body. Based on the design requirements of the regulatory Performing Places, we build a network architecture based on the public transmission network. Combined with the network design of monitoring systems and the supervision of particular delivery strategy, we make appropriate network communication protocols and network control systems. And we also propose suitable network access technology and network security technology and network security technology. In the end, the future development for construction of the national regulatory system network is discussed.
Abstract:In order to precisely determine the extent of the water deficit and thus to provide a scientific reference for precision irrigation, a particular design of farmland surface humidity monitoring system based on wireless sensor networks is introduced. According to the features of XinJiang agricultural environment,a two-layer deployment architecture is proposed to satisfy the need of low-cost,long lifetime and large scale in this paper at first. In architecture the bottom layer is deployed evenly to monitor the information of soil moisture precisely and the cluster head nodes is distributed unevenly based on the number of packet transmitted and the distance to sink to ensure the cluster heads energy consumed balancedly. By the simulation and comparing to the leach-c and leach, it shows that the aims of scarcely deployment,energy-saving, equilibrium of energy consume and prolonging the system lifecycle is achieved.
WANG Zhi-Bin , ZHOU Hao , ZHAO Bao-Hua
Abstract:A new formal method named path overlapped method is proposed for protocol conformance test generation based on UIO sequences. The main idea is to find a path without repeating transition in FSM as a POTS(path overlapped transition sequence), which is a sequence of distinct transitions such that if it is followed by a UIO sequence for the end state of the last transition in the sequence then all the transitions in the sequence are verified. According to the theoretical and experimental results, the test sequences generated by the path overlapped method are substantially shorter than those generated by other methods employing UIO sequences. Particularly, because of employing path overlapped transition sequence as a substitute for FOTS (fully overlapped transition sequence) in OUIO, generation time of overlapped sequence is greatly decreased.
XU Wei-Qin , XU Xue-Mei , HUANG Shuai
Abstract:In view of the existence of obvious over-segmentation problem in traditional watershed algorithm, an improved color image segmentation algorithm is proposed in this paper. This algorithm combines clustering and improved watershed algorithm methods. In HSV color space, the algorithm firstly utilizes clustering to classify pixels with similar features, then applies seed region growing algorithm for the regions generated by watershed segmentation algorithm. Furthermore, region merging approach is used to merge remaining small regions. Experimental results show that this algorithm reduces over-segmentation phenomenon significantly, and improves image accuracy while maintaining strong robustness and adaptability.
WANG Xian , SUN Kai-Lin , YANG Kun
Abstract:According to the problem of seamless steel pipe rolling mill production line, both sides of the hydraulic position servo system the inside different parameters and external interference caused by roller depressed position inconsistent synchronization, we designed the hydraulic position servo control system based on fuzzy output feedback synchronization, and prove the stability of the control system in theory. Simulation results show that hydraulic position servo control system based on fuzzy output feedback synchronization not only has short synchronization time but also has smaller error, when in the case of the differences both sides of the rolling mill inside the parameters and external disturbances.
Abstract:In view of the wireless sensor network used for emergency situations, this article presents a dynamic clustering based on event-driven dynamic clustering data fusion algorithm. On the basis of considering the severity of the incident and the residual energy, the algorithm chosen stimulus intensity and number of nodes remaining energy cluster-head play. Cluster-head node cluster by broadcasting a message of dynamic clusters, and dynamically adjust the delay time of each round of data fusion, data fusion to improve efficiency. Simulation results show that compared with the TEEN protocol, this algorithm has a lower average energy consumption of nodes and a better integration of network data latency.
Abstract:Because of the growing number of users and the rapid expansion of information, sparse problem of data matrix in traditional collaborative filtering becomes more seriously. We proposed a new hybrid recommendation system. Firstly, we consider tag information and rating information as constraints under maximum entropy model. Secondly, we define the features of tag information and rating information and calculate the corresponding weights. Finally, we use previously weights to predict probability distribution of target item for current user, then we choose the highest probability as predicted rating. Experiment results show that the proposed method can effectively improve the accuracy of recommendation systems.
JIN Xin , WANG Jing , SHEN Qi-Wei
Abstract:Clustering is one of the most important problems in data mining. Clustering algorithm can classify data without any knowledge about it, and find out the information that valuable. Recently, data mining is more and more widely used in the telecommunication area, but because of some problems, such as the size of the data, the type of the data and the complication of the computation, clustering is not used widely. This article gives a MST algorithm that suit for distribute computing. Combining with the method to represent the similarity that suitable for this algorithm, it designs a new clustering algorithm to solve the problem of sea size data analysis. Then, it shows how the algorithm is realized based on the distribute computing model called mapreduce.
Abstract:Traditional event evolution analysis method can’t find out the relationship between potential connected events in a topic. We proposed a new method based on FCA. This method uses the idea of topic three layer model to extract the properties in the event and filter the useless properties in the light of PFF(Property Frequency Factor ). It constructs the Formal Context with property relation between events and analyzes the event evolution relation with similarities algorithm based on concept lattice. Practical examples show our method is effective.
XU Hai-Bo , LIU Duan-Yang , HU Tong-Sen
Abstract:Classification obtains great concern in the field of data mining. Its main purpose is to predict the classification of data objects. Classification can be divided into two major categories of rule-based and non-rule-based, however because of the excellent performance that artificial neural network(ANN) can obtain from prediction, studying from experience and generalizing from the previous samples, making it an important method of classification. Although ANNs can achieve high classification accuracy, their explanation capability is very limited, as to restrict its application. This paper presents an improved ant colony algorithm based on ANNs classification rule extraction method, an improved ant colony algorithm is to help solve the ANN’s limited explanation capability to extract rules from the data. Experiments show that this approach could coordinate neural network to obtain rules of classified data well.
SHEN Yong-Zeng , SHEN Xu-Dong , LV Tian-Jian
Abstract:Road network topology information is the basis for GIS spatial analysis. Currently as the actual amount of road is increasingly growing, and embedded systems has been its own constraints, it is not suitable for reading all of the road network topology data into memory, against the problem of limited memory size. In this paper, by means of storing road network topology as “blocks” in the embedded electronic drives, and give the way to retrieve data block between different topological blocks when finding the optimal path.
Abstract:K-means algorithm is a frequently-used methods of partition clustering. However, it greatly depends on the initial values and converges to local minimum. In K-harmonic means clustering, harmonic means fuction which apply distance from the data point to all clustering centers is used to solves the problem that clustering result is sensitive to the initial valve instead of the minimum distance. Although the problem above is solved, the problem converged to local minimum is still existed. In order to obtain a glonal optimal solution, in this paper, a new algorithm called K-harmonic means clustering algorithm with simulated annealing was proposed. This alhorithm is introduced into simulated annealing to solve the the problems of local minimum. Then the algorithm was used to analyse IRIS dataset and get a conclution that the new algorithm get a glonal optimal solution and reached a desired effect.
Abstract:Objective: To address how to digital design with the characteristics of ethnic minorities in Xinjiang is a challenging problem. A method is put forward to evolution and combination primitive genes to regenerate gene and the introduction of morphing technology to fast generate with similar national style design genes. Methods: first, definition the concept of primitive gene and regeneration gene, to propose a primitive genetic generating method. Then, by setting the formation parameters of the regenerative gene, combine primitive gene to arrange regeneration gene which inherit the national significance. Finally, using the image morphing technology expand the pattern genes. Experimental results: a variety of patterns are generated by primitive gene and regenerative gene. Conclusion: proposed method is closely keeping the national style of design, it has the nice generalization ability and a promising future in the digital design fields and it is simple and easy in operation and can be widely popularized. So it can lay the foundation for auto-genetic pattern genes to establish folk design.
Abstract:During the cased-based reasoning procedure of requirement mapping, the randomness and subjectiveness of weight setting always lead to the poor accuracy of results affected by irrelevant noise. A new method of CBR weight setting has been put forward to solve it based on ANN, which defined the relevant weight from the aspects of feature sensitivity, activity, saliency, relevance and the transforming mechanism of features input also been described. Based on it, a new requirement mapping procedure module has been put forward oriented to CBR and verified with the design of the hydraulic workbench, which gives a new method for product requirement mapping.
WANG Wei-Sheng , WANG Wei-Sheng
Abstract:It is necessary to evaluate the network behavior of users in grid computing in order to resolve the security problems due to the dynamics and uncertainty of the grid environment. Thus, evaluation of the user’s behavior can reflect his reliability. This paper discusses the security requirements in grid environment, offers the correlative definitions of trust, According to the former analysis, a new grid trust model is proposed. This model is used to discriminate the trust relationships between users in the grid environment. It provides a method to analyze the trust degree of users and the report in the grid environment. The two different trust relationships within and between domain are handled with different approaches. This dissertation studies how to build a trust model for grid computing in order to find out malicious users and improve security and reliability of system.
Abstract:Currently, the wireless Mesh network is a hot spot of wireless network research. In wireless Mesh network, QoS is an important issue, and QoS routing is the key technology to solve this problem. In this paper, we proposed a wireless Mesh network QoS routing algorithm on Improved ant colony algorithm , and our experimental results shows that it can provide better QoS support.
DOU Yi-Wen , LU Li , LIU Xu-Lin , ZHANG Dai-Ping
Abstract:At present, the management and service of non real-time meteorological data at Beijing Meteorological Bureau have two problems. One is that storage structure of meteorological data is not reasonable, the format of storage files is not uniform, and data management is not clear. The second is it’s difficult for researchers and weathermen to obtain the needed meteorological data. To solve the above problems, a Meteorological Data storage and management System has been developed with ASP language. The system structure is based on Microsoft Server 2003+Microsoft SQL Server 2005+Web. This system open a convenient channel for data acquisition. On the other hand, it integrates all kinds of meteorological data orderly. In conclusion, the meteorological data storage and management System makes the meteorological data integration on storage, management and service come true. This system is a good example of the management of the meteorological data.
Abstract:With the continuous development of the tourism industry, to enable tourists to visit the destination online in advance, so that the tourist information can be widespread and easily accessed by the tourists, developing virtual tourism roaming system is particularly important. Roaming system uses 3DS MAX scenes and visit the tourist area on the role of three-dimensional modeling, good texture, texture, and after the relevant action set, using Virtools for system design and development, and use of collision detection technology to ensure system Roaming the real effect. Focus on tourist areas in the three-dimensional modeling and design of Virtools interactive features, based on the development of key technology of the system to analyze and resolve, and Wudang Mountain Scenic Spot, for example, completed a three-dimensional interactive virtual tour area design, practice, virtual reality technology in the tourist area of roaming.
ZHANG Tai-Zhong , XU Cheng , ZHANG Xiao-Ming
2011, 20(7):125-128,159. CSTR:
Abstract:Modern telemedicine is an emerging subject involving computer networking, multimedia and medical diagnosis. Since the current systems are platform-dependent and weak at remote controlling, combining JMF (Java Media Framework) framework and RMI (Remote Method Invocation) technique, this paper discusses the multimedia communication across different platforms, remote PTZ camera controlling and so forth to improve the weakness of platform-dependent and remote controlling. Tested in real world, the telemedicine system proposed in this paper is proved to be portable and good at remote controlling.
Abstract:Based on the development and application of Shenzhen Urban Housing Safeguard Information System, this paper expatiates the information system structure, construction contents, technical features and application effect. It mainly discusses using the workflow design, modeling design, modularization design, labeled design, build a high cohesion and low coupling system framework that can be expanded and maintainable, and helps to continue supporting the housing safeguard business development and policy adjustment.
Abstract:The functionality and implementation of the Guarding Task Management System are introduced based on GIS (Geographic Information System. Furthermore, the key technologies such as data security, GeoDatabase storage etc. are explored. The development and application information of the system, indicates that the implementation of the system improved efficiency of the implementation of guarding task.
ZHANG Hai-Lun , ZHU Zhi-Jie , ZHU Sang-Zhi , LIU Zhao
Abstract:This paper introduces a steering wheel control system based on the Bluetooth. Taking advantage of the Bluetooth, we can realize the optimal design of electronic switchings on the steering wheel panel, so the problem that we have to look down to find the switch in the past can be overcome, and we could achieve most of the operation on the steering wheel. At the same time, the driving is more convenient. The control system uses the Bluetooth module based on the BC219159 Bluetooth chip. The master control device uses the STC89LE516 as the controller, which collect the instructions from the button fixed into the steering wheel, and then, it sends the instructions to the Bluetooth chip which sends the signal by the way of wireless; when the slave device receive the signal, the slave chip STC89C516 send corresponding instructions which are based on the different signal, making use of the CAN bus to control the four systems that the air conditioning, the sound, the cruise, the lights, and because the LCD is used, the drivers can use the system more easily. The system utilizes the PWM to control the strength of each control function. Hence, the cost of the hardware is less. The trial proves the system has the advantages of low cost, reliability, safety and interchangeability.
Abstract:Test script is an important component of test automation. In this paper, different kinds of test script are researched and summarized, then a multi-layer test scrip is proposed and evaluated. The result indicates that the technology is feasible and can meet the requirement.
Abstract:The technology “server virtualization” has been in gradual mature and been put in wider use. The kernel firewall based on the operating system “linux” is powerful. With the integration of netfilter firewall for linux and server virtualization of vmware server, it can work as the enterprise firewall as well as the server virtualization which provides all kinds of services. The server virtualization, together with free open-source software is applied in small and medium sized network for the benefit of low cost, effective management and direct maintenance.
WEI Xian-Bo , XIE Wen-Ge , WANG Chang-Bin , ZHANG Shu-Qi
2011, 20(7):150-152,213. CSTR:
Abstract:This paper proposed the definition of “ScoreChangeRate” and “DepartmenWeight” and have improved the C4.5 algorithm. The data warehouse, based on the performance management system and applied to all kinds of aspect, is constructed according to the snowflake model. Using the improved of C4.5 algorithm abstract useful information in data warehouse to determine performance indicators and the weight can make the evaluation results more scientific and the results of analysis more accurate.
Abstract:Latest research of the Gartner Analysis Company shows currently more than 80% of the enterprises implemented a virtualization project or plan. With diskless Linux based on PXE remote boot technology, Citrix Corporation's server virtualization product XenServer and application virtualization product XenApp cannot only reduce the complexity of the LAN foundation construction, improve the operating efficiency of the LAN, simultaneously reduce the cost of LAN hardware and software, it also manage and maintain client software system more easily.
Abstract:The paper introduces the concept of regression testing and the situation of regression testing using software automation testing tools. Then, it introduces on the limitations of selenium, a popularly used automation testing tool. To address these limitations, it gives the solution.
WANG Juan , WANG Juan , JIA Qiao Li
Abstract:The color features, as an important visual information of image, have been widely used in the Content-Based Image Retrieval(CBIR) because of the simple calculation and better robustness. According to the color features of the image, this paper makes systematic discussion and research on color space(color space transformation), color quantification(HSV color space), color features extraction and color characteristic similarity measurement. Then, through classic color segment histogram algorithm, the entire process of Color-based Image Retrieval is proposed. Finally, the existent problems and further research direction of the color-based image retrieval is summarized.
ZHANG Ai-Min , MA Zhi-Qiang , YI Xiao-Rong
Abstract:The current Ad Hoc network researches are mainly based on simulated experiments. This paper is centered upon realization of AODV routing Protocol. A method on AODV routing Protocol of design and implementation based on Netfilter function framework is proposed. The hardware platform is founded based on PXA310 processor and IEEE802.11b wireless IEEE802.11b network card, a design of software based on the Netfilter function framework was accomplished, has achieved the major Processes such as the routing request, routing updating and maintenance, this design will be important worthiness for implementation of AODV routing protocol.
Abstract:In speech signals processing, speech signals are collected by microphones, and then use algorithms to extract and separate, ICA (Independent component Analysis, ICA) algorithm is in common use.When the number of microphone is less than speakers number, that is called underdetermined, then speech signals’ extraction needs overcomplete ICA algorithm . A two-step approach is introduced:geometric algorithm to estimate a mixing matrix and shortest path to estimate sources. The algorithm of speech signal extraction is very good, the simulation results verify the results.
Abstract:In this paper, the traditional FCM algorithm membership function was improved. The improved algorithm can reduce the isolation point of the image data clustering results. In this paper, Gray-gradient co-occurrence matrix of the image texture feature extraction using principal component analysis on the extracted high-dimensional feature image to reduce the dimensions, combined with this improved FCM clustering algorithm to the image after the image data preprocessing clustering. Experiments show that the method has better clustering results, with fewer iterations and can reach the global optimum.
Abstract:The designing of test case costs a lot of time and manpower in military software functional testing. Effective reuse existing test case can shorten the time and reduce the workload of test case designing, leading to high testing efficiency. This paper researches on the technology of the reuse of functional test case for large scale military software. A reuse method in military software functiona testing is proposed, and it has been practiced in project.
2011, 20(7):180-183,198. CSTR:
Abstract:MATLAB graphical user interfaces development environment (GUIDE) has been unable to achieve the function of scroll bar based on the VC form. This paper introduces a method of displaying large amounts of content that using a WebBrowser ActiveX in MATLAB GUIDE, and utilizes the characteristics of scroll bar's automatic generation in web page to achieve an abundant displaying result. This essay mainly focuses on the creation of WebBrowser controls, adding and displaying the buttons, texts, images in WebBrowser ActiveX, and data transfers between MATLAB and web controls. This method is validated through image classification system, since the results demonstrate its simplicity and expansibility.
ZHANG Wei-Cong , YU Xin-Wu , LI Zhong-Cheng
2011, 20(7):184-187,120. CSTR:
Abstract:According to the actual needs of intelligent household, environmental monitoring etc, this paper designed a wireless sensor node of long-distance communication system. This system used the second SoC CC2530 set in RF and controller chips as the core module and externally connected with CC2591 RF front-end power amplifier module. Based on ZigBee2006 in software agreement stack, it realized each application layer function based on ZStack. It also introduced wireless data acquisition networks based on the ZigBee agreement construction, and has given the hardware design schematic diagram and the software flow chart of sensor node, synchronizer node. The experiment proved that the node is good in performance and the communication is reliable. The communication distance has increased obviously compared with the first generation TI product.
ZHAO Hong-Xia , WANG Xin-Hai , YANG Jiao-Ping
2011, 20(7):188-191,210. CSTR:
Abstract:In order to solve the problem that data overload and data sparsity in collaborative filtering recommendation algorithm, the collaborative recommendation algorithm based on item factor analysis is proposed in this paper. The algorithm reduces the dimensions of item vector by use of factor analysis and gets some representative item factors, which are used to regression analysis of target items to forecast the evaluated items. Finally, experiments show that the algorithm is effective, which provides a new way for future recommendation algorithm research.
ZHANG Peng , CHEN Zhi-Rong , AN Feng
2011, 20(7):192-194,243. CSTR:
Abstract:“Sword's Trail” means the “lighting effects” when weapons like swords are waving in 3D games. This article analyzes the rules of the image’s changes for “Sword’s Trail’ effect, and hands out an practical algorithm of the effect mentioned above. With this algorithm, the application can automatically produce the “Sword’s Trail” effect of weapons. In combination with real application experience, this article also proposes an ameliorative method of the algorithm. The algorithm can combine with a variety of game engine, and has been applied successfully in a lot of 3D games.
Abstract:The quantity of the test suite affects the cost and efficiency of software testing, so it is important to generate an algorithm of minimum test case set. According to studying syntactic tree of Boolean expressions on recursive blocks matrix, an algorithm for minimum test case set on MC/DC is proposed. Its correctness is proved in theory and its premise is considered.
2011, 20(7):199-202,132. CSTR:
Abstract:This paper proposes a new model for vehicle detection. The main principles of this paper are to describe the distribution of vehicle appearance by using compact vehicle appearance prototypes to match the individual appearance prototype, and applying a simple distance standard, to collect and classify all the obtained regional information into feature library, to obtain the probability of similar appearance depending on the number of matched vehicle appearances and the density of coverage in target detection, and eventually to distinguish and recognize different parts of the vehicle appearances by setting the threshold. Experimental results show that the use of this detection model can facilitate and effective monitoring vehicle in varieties of weather conditions.
Abstract:Bitmap fonts are used to display in VxWorks5.5, which is simple and widely used. But it will not meet the demand when we don't make sure which font size is ok as each bitmap font file has only one font and one size. We can achieve a variety of fonts and sizes by using the TrueType fonts and FreeType font engine. This paper describes the basic principle of TrueType and FreeType technology, and how to realize outline font display by using WindML, FreeType and TrueType fonts .
LIU Ye-Hui , WANG Jia-Yang , WANG An-Li
Abstract:MVC pattern is usually used for large-scale B/S application development. It supplies a structured module, and realizes software development’s job-share as well as application’s modularization. This paper in depth studies a WIKI system’s design and realization in client’s browser, in the process of realization. It fully uses JavaScript and combines with MVC pattern. So it makes all the application program higher systematic. At the same time, it reduces the maintenance cost because of using divided template and increasing code reusability.
YANG Zhen-Dong , ZHENG Ji , DING Yong , XIAO Shu-Cheng
Abstract:In order to meet the needs of users, the authors developped a general combination query module. The article introduces its ideas of design and implementation which is simple and easy to achieve. It provides a good solution to the development of management information system based on web while designing the general query module.
Abstract:In H.264 video coding standard, in order to get higher compression ratio, HEXBS algorithm is employed to motion estimation, but the calculation work is very large. Compared with Full Search algorithm, it reduces the searching time obviously, but it takes fixed module and fixed searching step, which doesn’t take full advantage of center-bias characteristic of video sequence. Based on this observation, this paper proposes a new search algorithm named Rectangle search Algorithm, and the search algorithm is adaptive. At the end of the paper, the proposed algorithm has been experimented.The results show that the searching speed has largely increased while maintaining the same quality of image.
Abstract:The computation quantity in artificial neural network training will get more and more with the increase of neurons quantity, it is time-consuming for training a neural network with too many neurons. A method that accelerates artificial neural network training is to optimize the training algorithm, so as to reduce the computation quantity. Since there is too much matrix and vector computation in artificial neural network training algorithm, the optimized training algorithm implemented by OpenCL C language on GPU, compared to the conventional CPU-based implementation, the training speed will be increased a lot. Based on parallel computing ability of hardware, accelerating of artificial neural network training by GPU with OpenCL Support is researched in this paper.
SHEN Yan , DAI Yu-Xing , TANG Rui
Abstract:For the shortage of current serial device server which almost lacks security and functionality, based on arm9 and Linux, we have designed a secure serial device server using SSL protocol and multi-user management. The overall design of hardware and software were introduced. Including U-boot, kernel, root file system and a variety of tools, embedded Linux system has been emigrated, we discussed the framework of the software system, focusing on data process framework, user management and the implementation of SSL. The application shows that this device runs stably and meets the needs of secure communication.
LI Guang-Min , CHEN Nian-Sheng , XU Xin-Shan
2011, 20(7):225-227,232. CSTR:
Abstract:As the Web continues to grow, it has become increasingly obvious that information overload and is terribly noisy. In this paper, to address such issues as low precision, much time-consumption, we present an improved Hopfield algorithm orienting web page structure feature. The experimental results show that the proposed approach is practical.
Abstract:This paper makes a detailed classification and illustrates the concept of variables and method, analyzes the variables and methods of memory allocation problem in Java programming design application process, the covering problems in the inheritance and the application problems of static variables and static methods. It also sets partial typical examples. This research can provide Java program developers appropriate use of variables and methods as reference in programming design process, and ensure the developed program is concise and high efficiency.
2011, 20(7):233-235,220. CSTR:
Abstract:From the practical perspective, the paper introduces several common analyzing techniques about software codes with some cases, and utilizes the protecting techniques: strong name, name obfuscation, IL code obfuscation and packing etc. The code is protected layer by layer to enhance the difficulty cracked by decompile, and to achieve the purpose of protecting the software codes.
Abstract:Openbravo is one of the most successful open-source ERP software, this paper analyzes the Openbravo international programming ideas and technical features, and then discusses localized implementation technology, finally gives specific methods to achieve localization of Openbravo on ubuntu 9.04 Linux enviroment.
LIU Jin-Hua , ZHANG You-Hua , LI Shao-Wen , GU Li-Chuan , ZHU Cheng , ZHU Lin
Abstract:The knowledge is constantly changing, so it needs a timely correction in order to absorb and integrate new knowledge, which involves the evolution of the ontology. The paper summarized from definition, cause, procedure, technology and evolution tools, and summed up the research of ontology evolution. The procedure of ontology evolution, the important technology at present and main evolution tools are mainly introduced and lay theory and technology foundation for further research on ontology evolution.
Abstract:Harmony search algorithm is a new intelligent optimization algorithm. By repeatedly adjusting the solution variables in harmony memory, the function converges to its optimal solution with increased iterations and completes the optimization. The algorithm is simple in concept, less adjustable parameters, easy to implement. In this paper, the origin of harmony search algorithm and the basic idea are given. We give the basic steps and processes of harmony search algorithm, and analyze harmony memory considering rate and pitch adjusting rate that effects on the algorithm. The difference between harmony search algorithm and genetic algorithm is compared. Furthermore, the applications and research trend of harmony search algorithm are pointed out.
ZHANG Ru-Min , ZHANG Yun-Chu , ZHENG Xue-Han
Abstract:In reviewing the development and drawbacks of surveillance camera technology at home and abroad, this paper first introduces the intelligent camera's functional structure and hardware needs. Then, key technologies and solutions such as embedded processor, video analysis, video compression and network communication are analyzed. Finally, the development trend and the application perspective of intelligent camera are prospected.