• Volume 20,Issue 8,2011 Table of Contents
    Select All
    Display Type: |
    • >系统建设
    • Design of the Architecture of Tax Information System Based on Semantic Grid

      2011, 20(8):1-4.

      Abstract (1809) HTML (0) PDF 528.47 K (3172) Comment (0) Favorites

      Abstract:By the research of tax information system based on semantic grid(T-S-Grid), this article proposed the design of T-S-Grid architecture, described T-S-Grid hierarchy and its functional characteristics, applied OWL XML/RDF technology for constructing "tax management organization ontology" and "tax management task ontology", and showed the meaning of further development of information technology application in Chinese tax management area.

    • Remote Command System of Tobacco Monopoly Single Soldier Law Enforcement Based on 3G

      2011, 20(8):5-9.

      Abstract (2375) HTML (0) PDF 1.01 M (3550) Comment (0) Favorites

      Abstract:Through application of 3G technology and video surveillance technology, this paper realizes such functions as remote monitoring of the tobacco Law Enforcement official and remote preserving of evidence for law enforcement and remote commanding of tobacco monopoly cases. It analyzes the system architecture and its realization in detail.

    • Task Management System for Power Safety Assessment

      2011, 20(8):10-13,4.

      Abstract (1659) HTML (0) PDF 1.19 M (2879) Comment (0) Favorites

      Abstract:The safety assessment of power industry was mainly operated manually in the past. That is laborious, time-consuming, less informationized, and tends to be inaccurate. To solve these problems, a task management system for Safety Assessment of Power enterprise is proposed. The main function requirements and the main framework of the system are introduced. The design of task packages and database accessing interface, user authority management and organization structure of the enterprise are addressed. The successful practical application of the system proves its importance and usability.

    • Wearable Panoramic Surveillance System Based on Body Area Network

      2011, 20(8):14-17,22.

      Abstract (1754) HTML (0) PDF 1.45 M (3611) Comment (0) Favorites

      Abstract:Based on UWB body area network (BAN) and multi-view video coding (MVC) techniques, this paper designs a panoramic surveillance system for wearable computing applications, which focuses on the acquisition, encoding and transmission techniques of the panoramic video. In the wearable panoramic surveillance system, the resources of BAN nodes (such as processing capacity, battery power and transmission bandwidth) are very limited, and high-quality reconstruction of panoramic video is required by the system. Therefore, for the acquisition, encoding and transmission of the panoramic video, this paper proposes a resource-quality control algorithm according to the H.264/MVC sub-frame coding structure, and thus the wearable panoramic surveillance system can achieve low-power, low-delay, high-quality performance.

    • Wireless Video Surveillance System Based on ARM11

      2011, 20(8):18-22.

      Abstract (1916) HTML (0) PDF 705.98 K (5397) Comment (0) Favorites

      Abstract:This paper designs a wireless video surveillance system based on ARM11 and Linux operating system. To improve processing speed, the system adopts ARM11 as the main processor, and the video capturing equipment is OV9650 camera, also uses hard-coding to compress the video data with H.264. Then it can transfer encoded data to remote server and display that. It realizes a wireless video surveillance platform, which has stable running, quick speed, lower expenditure and small volume. It has great practical value.

    • Quality Management Information System Based on Service-Oriented Architecture

      2011, 20(8):23-26,90.

      Abstract (1763) HTML (0) PDF 1.54 M (2977) Comment (0) Favorites

      Abstract:To highly effectively carry out and manage the quality management system with convenience, according to the features of quality management system and the system requirements, a Quality Management Information System based on service-oriented architecture is studied, which is robust, well extensible and can be easily maintained. The main functional module of system can help in the PDCA circle of tasks, and can effectively assist the running of quality management architecture, as well as provid data support in its improvement process. This paper expounds the design and implementation of this system, and main functional module is also discussed in detail.

    • Analysis Software Design of On-Line Monitoring and Fault Diagnosis System for Power Transmission Equipment

      2011, 20(8):27-32.

      Abstract (1917) HTML (0) PDF 1.21 M (5639) Comment (0) Favorites

      Abstract:The comprehensive analysis software of on-line monitoring and fault diagnosis system for power transmission equipment is a set of application system that embedded in the information integration platform. Analysis software implements those functions that real-time data monitoring, analysis, prediction, evaluation and fault diagnosis to on-site devices, at the same time it provides configuration management, data management, system configuration, user rights management and improve systems management capabilities, meeting the functional requirements for information integration platform.

    • Network-Based Platform for Interactive Video Psychological Counseling

      2011, 20(8):33-36.

      Abstract (1846) HTML (0) PDF 527.89 K (3136) Comment (0) Favorites

      Abstract:As more and more people suffered from psychological problems and the lack of psychotherapists, remote consultation has served as an effective resolution. We analyze the problems in this area and proposed a network-based platform for interactive video psychological counseling. Our platform supports abundances of gesture language to emulate face-to-face psychological counseling. We also discuss the development and the design of the platform.

    • Public Opinion Analysis System for WWW-Based Digital Media Content

      2011, 20(8):37-41.

      Abstract (1783) HTML (0) PDF 730.33 K (3641) Comment (0) Favorites

      Abstract:The rapid developing Internet has become an important reflection of public opinions. It has been an urgent problem to be solved how to analyze and monitor public opinions in digital media and on Internet, and how to timely and effectively spot all kinds false information harmful to social security, in order to promote the healthy development of information security and content supervision. This paper proposes a www-based digital media content public opinion analysis model. A digital media content public opinion analysis system based on the Internet is designed and realized, and the practical key technologies are discussed.

    • >研究开发
    • Parallel Algorithm Based on the Travel Time Computing of Pre-stack Time Migration Using GPU

      2011, 20(8):42-46.

      Abstract (1937) HTML (0) PDF 552.91 K (4159) Comment (0) Favorites

      Abstract:The computation of traveling time of Pre-Stack Time Migration (PSTM) is the most time-consuming part of whole procedure. In this paper, we present a novel parallel algorithm to low the time of traveling-time computation. By using static interpolation with step of 8 points instead of dynamic step length, the new designed algorithm performs more accuracy and performance. Experimental results show that the speed-up number reaches 22.76 times. The statistical relative error demonstrates the better accuracy comparing with the commercial codebases.

    • Method of Parallel Adaptive Quantum Particle Swarm Optimization

      2011, 20(8):47-51,71.

      Abstract (2327) HTML (0) PDF 1.25 M (3734) Comment (0) Favorites

      Abstract:A new parallel adaptive quantum particle swarm opitimzation algorithm is proposed in this paper to solve the problem that standard particle swarm optimization(PSO) algorithm may easily trap into local optimal points and may obtain exact solutions at the late of the iteration with difficultly. By sharing the two extreme values of the particles, the proposed method is able to adaptively search their optimum solutions in parallel by combination of an improved adaptive PSO with a quantum Particle Swarm Optimization of boundary variation. It is proved effectively to overcome the shortcomings of standard PSO. Test results show that the accuracy and the velocity of global search for optimal solutions have been greatly improved.

    • Opinion Object Extraction Based on the Syntax Analysis and Dependence Analysis

      2011, 20(8):52-57.

      Abstract (2001) HTML (0) PDF 670.58 K (5315) Comment (0) Favorites

      Abstract:As the Internet becomes more widespread, the comments according to various products are also growing, these comments which contain abundant information are extremely analysis value for the manufacturers and consumers. Based on the correct analysis of opinion object, the results of opinion mining can be accurate and reliable. Based on the summarization of predecessors' achievements, according to the customer comments on the network, this paper proposes a new evaluation object extraction method. This method is based on the ICTParser syntactic analysis and IR dependence analysis, adopts the likelihood testing methods to screen irrelative candidate opinion objects. The experimental results preliminarily verified the validity of this method.

    • Literature Relational Model-Based Personalized Literature Management System

      2011, 20(8):58-62.

      Abstract (1610) HTML (0) PDF 662.36 K (3229) Comment (0) Favorites

      Abstract:In this paper, we analyze the current situation of Literature Management. According to the attributes of literatures, a relational model of literatures is designed, and the interconnection between literatures is quantitatively analyzed. Based on the relational model, we design and implement a prototype of Personalized Literature Management System. Users of the system can manage their literatures in convenient and personalized way.

    • Improved Location Locking Scheme for H(e)NB

      2011, 20(8):63-66,133.

      Abstract (1836) HTML (0) PDF 1.17 M (3376) Comment (0) Favorites

      Abstract:We study the location locking mechanism for H(e)NB in 3GPP TR 33.820. By now 3GPP has only proposed a few solutions for H(e)NB’s location locking in certain specific situations. In this paper, we propose an improved scheme for H(e)NB, which can be used for locking H(e)NB’s location in general situations. The scheme can deal with the security threats brought by unreliable location locking for H(e)NB in practical use. It also increases the reliability of H(e)NB’s location locking and increases the probability of locking successfully.

    • Key Refresh During Cell Handover in LTE Featuring One-Hop Forward Security

      2011, 20(8):67-71.

      Abstract (2151) HTML (0) PDF 632.46 K (5466) Comment (0) Favorites

      Abstract:Long Term Evolution (LTE) is the next-generation mobile communication system beyond 3G, whose security is predominant for the successful deployment of such networks. In this paper, we address the cryptographic key management during local cell handovers known as X2 handovers in LTE, which currently only achieves two-hop forward security. An enhanced key refresh scheme is proposed, which features the desired one-hop forward security. Our proposal not only makes up for the deficiency in the standardized LTE technical specification, but also retains all existent key materials and parameters without incurring extra communication costs. Therefore, it is technically feasible for the standardized key refresh to be smoothly upgraded to the enhanced proposal.

    • Clustering Analysis of Sentiment Polarity for Chinese Blogs Based on Concept

      2011, 20(8):72-75,121.

      Abstract (2296) HTML (0) PDF 1.29 M (3867) Comment (0) Favorites

      Abstract:A clustering method based on concept was provided to analyse the sentiment polarity for Chinese Bloggers. The concept is introduced into Vector Space Model (VSM) on the basis of HowNet. Firstly, sentiment words are extracted from blog texts which would be expressed by VSM with the concept of sentiment words. Secondly, blog texts are clustered with k-means algorithm to finish the analysis of sentiment polarity for Chinese Blogs. The precision of sentiment polarity analysis of Chinese Blogs is improved with concept as feature in VSM. The experiment proves the concept based VSM to be of better performance than traditional term based VSM in clustering analysis of Chinese Blogs on sentiment polarity.

    • Geometry Property-Based Double 3D Digital Watermarking Scheme

      2011, 20(8):76-80.

      Abstract (1618) HTML (0) PDF 837.56 K (3046) Comment (0) Favorites

      Abstract:A novel method for the watermarking of 3D models is proposed, which is embed robust and fragile double watermark by once operation and the strength of the watermark signal is adaptive with respect to the local geometry of the model. We can detect the intact watermark vertex by fragile watermarking. Furthermore, this paper developed a weighting process of for watermark detection by let the intact watermark vertex have more weight. It can realize the double aims of the copyright protection and the integrity authentication of 3D mesh model. The watermarking schemes is designed for the sender to check the copyright ownership (robust watermarking) and for the receiver to verify the authentication of the received media

    • Hierarchical Routing Algorithm in Event-Driven Wireless Sensor Networks

      2011, 20(8):81-85.

      Abstract (1790) HTML (0) PDF 767.72 K (3481) Comment (0) Favorites

      Abstract:Based on researches on TEEN protocol and combined the characteristic of monitoring emergences system, an event-driven hierarchical routing algorithm (TEEN-PE) has been proposed to reduce the energy consumption in the monitoring system of emergences and prolong the lifetime of the wireless sensor networks (WSN). TEEN-PE has solved the problems of the difficulty in determining the initial number of the optimal clusters and the asymmetrical distribution of cluster in TEEN protocol. And to improve the communication balance of the networks on times and space, the algorithm is taken into accounts the factor of the residual energy of the nodes and the distance of the node to the base station during the phase of cluster formation and communicates among clusters. The algorithm can effectively reduce energy consumption and prolong the lifetime of the networks. It is proved by simulated in NS-2, and the simulation results show that TEEN-PE has an advantage over TEEN protocol on nodes survival and energy consumption.

    • 3D Visualization of Trunk and Branch Model of Pear Tree Based on Parametric L-System

      2011, 20(8):86-90.

      Abstract (1860) HTML (0) PDF 680.40 K (3663) Comment (0) Favorites

      Abstract:The visualization method of fruit tree branches that combines morphological information and parametric L-system is presented. Based on studying on the structures of pear tree, morphological characteristics, characteristics of ecological change and so on are extracted, then L-System model of pear tree including the thickness of the branches, bifurcation angle etc. are established, and geometric information of plant growth are transformed into intuitive graphical information and visual output through 3D modeling algorithm basing on OpenGL. Finally, we simulate basic forms of common pear tree (natural open center type, sparse layer of the main crown shape, small crown layer shape), which lays a foundation for developing the computer simulation system of pruning pear tree.

    • Collaborative Filtering Recommendation Model of Web Customer Demand Considering Time and Price Factors

      2011, 20(8):91-94.

      Abstract (1702) HTML (0) PDF 615.12 K (3092) Comment (0) Favorites

      Abstract:The collaborative filtering recommendation algorithm is the widely used technology in the personalized e-commerce recommendation system. However, the traditional recommendation algorithm neglected trading hours and product pricing when recommended products, which led to the lower quality recommended. To solve this problem, a collaborative filtering model considering time and price factors is proposed in this paper, and experiments show that the improvement of algorithm is most effective when time and price factors are taken into account in the calculation of Pearson correlation coefficient.

    • Migrating Workflow Instance's Selection of Security Workstation Based on Immune Algorithm

      2011, 20(8):95-99.

      Abstract (1552) HTML (0) PDF 723.60 K (2970) Comment (0) Favorites

      Abstract:In migrating workflow system, the security and route of migrating instance for the completion of the workflow plays a vital role. This paper presents a migration strategy based on immune algorithm. This method draws on the immune system's features, encodes migrating instance’s needs and security requirements as antigen and work location of service information and security as antibody, and simulates the matching process of the immune system in order to get the migration routes dynamically. The algorithm considers both the resource requirements of Agent’s task and the security of the workstation according to Agent’s risk in order to achieve safer route planning. The simulation results show that the algorithm effectively avoids the malicious host, significantly reduces the probability of migrating instance attacked and enhance the security of migrating instance.

    • Simulation on Predictive Control Algorithm Based on BP Neural Network Model

      2011, 20(8):100-103,180.

      Abstract (1602) HTML (0) PDF 1.23 M (3863) Comment (0) Favorites

      Abstract:To overcome the problem of lower control precision caused by parameters varying of the controlled object, the paper proposed a sort of predictive control algorithm based on BP neural network model. In the paper, it applies the predictive parameter of PID controller based on BP neural network on line to control the controlled object, and the system model parameter was on line predicted by means of least recursive squares algorithm. The algorithm would be based on model prediction. It first validats its control effect in the linear system, and then the non-linear problem would be treated as the linearity. The non-linear system would be controlled by use of predictive control algorithm based on BP neural network model. The simulation curves showes that it could achieve high control precision in the linear system to PID controller of BP neural network, and own the ability of adaptation and approaching arbitrary function. The simulation researches show that it is stronger in adaptation, better in stability, and higher in control precision compared with the traditional BP neural network PID controller.

    • Optimized Design for Memory Management Module in HPMR

      2011, 20(8):104-109.

      Abstract (1630) HTML (0) PDF 1.08 M (2948) Comment (0) Favorites

      Abstract:HPMR is a high performance computing platform based on MapReduce model. It has improved the MapReduce model to meet the need of high performance computing. Efficient memory management module ensures the efficiency of HPMR. There are two roles in HPMR, Master and worker. Master reads data blocks from the input data file and assign them to workers. Worker receives the data blocks from master, manages input and output module of the map and reduce function. The current memory management module in HPMR has some shortcomings: redundancy, inefficiency and lack of parallelism. This paper redesigned the underlying data management mechanism of HPMR based on mature memory optimization theory, proposed new memory management way based on memory pool. Experiments show that the new memory management module is necessary for efficient HPMR system.

    • Variable-Voltage Energy-Saving Technology of Ac Motors by Model Reference Adaptive Control Based on R8CL38

      2011, 20(8):110-114.

      Abstract (1470) HTML (0) PDF 856.69 K (3211) Comment (0) Favorites

      Abstract:Three-Phase asynchronous motor’s power factor and efficiency are usually very low when the loads are free or light. Regulating the input voltage of motors properly can raise the power factor and reduce the losses, which is a kind of Energy-saving technology. This paper introduces an adaptive control method of three-phase asynchronous motors which is a kind of energy-saving technology based on R8CL38. The reference model with optimum control method is adopted. It can control the voltage of three-phase asynchronous motors directly. Simulation results show the designed energy-saving power controller is effective, and the control system is stable and reliable.

    • Optimization of Online Judge Systems

      2011, 20(8):115-121.

      Abstract (1936) HTML (0) PDF 780.71 K (5608) Comment (0) Favorites

      Abstract:This paper describes the application and performance optimization of Online Judge Systems in terms of web page and database caching, server architecture, testing and processing rules in multi-core environment, front-end asynchronous response, data table design, cross-platform support, source code plagiarism detection, automatic generation of test cases, etc., which enhances the evaluation efficiency while reducing the number of servers, saving operating coses. And then, it discusses the general idea on the implementation of a unified test platform for intelligent optimization algorithms.

    • Designing and Simulation of Common Distribution Mode of Finished Vehicle Logistics

      2011, 20(8):122-125.

      Abstract (1601) HTML (0) PDF 675.06 K (3739) Comment (0) Favorites

      Abstract:Finished Vehicle Logistics (FVL) is an important component of the national automotive industry. There are problems in it especially the problem of waste of capacity, which makes the efficiency of logistics low and make the cost high. In this paper, the VRP pattern is built and solved by Genetic Algorithm(GA) through Matlab at first, resulting in a good distribution plan, and the plan is simulated and analyzed by Flexsim. Second, the pattern of FVL common distribution is designed to solve the backhaul problem. At last, the common distribution is simulated and analyzed by Flexsim to show that cooperation can get the rate of wasting capacity lower and reduce the cost.

    • >实用案例
    • Design and Implementation of Embedded Web Server in the Control System

      2011, 20(8):126-128.

      Abstract (1677) HTML (0) PDF 630.14 K (4240) Comment (0) Favorites

      Abstract:Embedded Web server has very good security and stability. The embedded web server in this paper is mainly applied in control system. It is based on the feature of control system, through to the small single task Boa server on improvement to realize. Its rich hardware interfaces can be used to adaptive data acquisition device and control equipment. This paper expounds the embedded web server hardware platform and software system development, and technical support and so on. All sorts of problems are encountered, complete the solutions to design and realize the embedded web server's basic functions.

    • Development and Application of Automotive Wind Tunnel Force Data Processing Software

      2011, 20(8):129-133.

      Abstract (2034) HTML (0) PDF 716.99 K (3641) Comment (0) Favorites

      Abstract:In view of the characteristics of experiment equipment for automotive aerodynamic force and the requirement of data processing and its result, a certain mathematic model was built. Also, software of automotive wind tunnel data processing was developed, by virtue of Visual Basic 6.0. The data was extracted, analyzed and displayed by reading data files in format TXT. The software integrated Excel software successfully. Users could observe and analyze the aerodynamic force and coefficient of automotive wind tunnel model intuitively. The paper discussed software structure, data processing method and display technology of the software. Finally, the software has already been used in the HD-2 wind tunnel test of Hunan University.

    • Template Matching Algorithm in the Study of CRH Train Parts Fault Detection System

      2011, 20(8):134-137.

      Abstract (1851) HTML (0) PDF 710.46 K (3325) Comment (0) Favorites

      Abstract:For the loss and loose of CRH train parts, this paper design a set of automatic video image recognition technology for fault detection system. In this important part of image processing, using a template matching algorithm based on contour to detect whether the CRH train parts is lost or loose. This paper elaborates the architecture, implementation of each part of the CRH train fault detection system and puts forward the template matching method based on contour, and gives a detail from the image pre-preprocessing, feature regions to determine the components to the process of setting the minimum score. Application process showed that the application of template matching algorithm to fault detection CRH train parts could achieve the desired results.

    • Design and Implementation of an Intelligent Circuit Breaker Communication Module Based on PROFIBUS Protocol

      2011, 20(8):138-141.

      Abstract (2191) HTML (0) PDF 1.00 M (3641) Comment (0) Favorites

      Abstract:The design of communication module for intelligent circuit breaker based on the PROFIBUS DPV1 protocol is introduced according to the demands of high-speed and real-time communication technology for network monitoring application. The system networking applications, the mechanism of communication protocol conversion based on data object map and the implementation of PROFIBUS DPV1 protocol was introduced. The main circuit diagram of hardware and software design was given. The actual operation shows that this module effectively implement the real-time monitoring and network control of circuit breaker.

    • Design and Implementation of an Intelligent Circuit BreakerDeviceNet Communication Module

      2011, 20(8):142-145.

      Abstract (1582) HTML (0) PDF 635.87 K (3881) Comment (0) Favorites

      Abstract:The design of communication module for intelligent circuit breaker based on the DeviceNet protocol is suggested according to the technical demands of intelligent low voltage circuit breaker with communication capability. The form of networking and mechanisms of DeviceNet communication, as well as DeviceNet protocol stack software implementation are expounded. The power circuit, DeviceNet interface circuit, the interoperability test interface and the result of inrush current test of conformance test are also presented. The module is effective to achieve the long-distance communications and the centralized monitoring.

    • >应用技术
    • Application of the Automobile Insurance Assess System Based on Case-Based Reasoning

      2011, 20(8):146-150.

      Abstract (2157) HTML (0) PDF 642.33 K (3302) Comment (0) Favorites

      Abstract:The paper studies the application of automobile insurance assess system based on case-based reasoning. It uses knowledge project technology to organize and construct cases based on automobile insurance assess cases express. Building a automobile insurance assess cases database. During looking for the cases, the multi-layered structure of the knowledge base of the system is formed. This method can improve the efficiency of insurance assess. The test to the software proves the reasonability of the design and the validity of the implementation.

    • Application of the Robot System Based on Multi-Agent in Book Classification

      2011, 20(8):151-155,163.

      Abstract (1788) HTML (0) PDF 1.02 M (3032) Comment (0) Favorites

      Abstract:The amount of books has been one of the important indexes for the level of library. While the daily management work of books such as how to classify and place books has aggravate the burden of the librarian. The rapid development of mobile-robot technology and multi-Agent give a new possible method to solve this problem. Therefore, this paper provides a move-robot model based on multi-Agent technology, which can recognize, classify and placed books automatically, and navigate the walk route by improved BUG algorithm which can complete the classified and arranged work quickly and correctly. This model can simplify the manual work and lighten heavy and repeated labor.

    • Access Control Framework Based on Mobile P2P System

      2011, 20(8):156-159.

      Abstract (2182) HTML (0) PDF 532.46 K (3243) Comment (0) Favorites

      Abstract:In order to solve the problem which has existed in the mobile p2p network, for example, the excessive consumption of system resources and the attacks of denial service, a new access control is proposed in this paper. Based on RBAC access control framework, MT-RBAC access control framework adopts the techniques of spatial context, trust constraint and resource control to achieve the access control mechanism of the Mobile P2P System. The new access control framework can effectively and efficiently increase the usability of the system, and prevent the system from the irrational resource request from spite nodes.

    • A Local Path Planning Method for Mobile Robots Based on the Windows

      2011, 20(8):160-163.

      Abstract (1688) HTML (0) PDF 608.30 K (4720) Comment (0) Favorites

      Abstract:This approach makes robot path planning distinguished from the traditional raster method, then with the window rolling it can achieve global path planning, avoiding the traditional method of grid environment, low resolution of information thereserves big shortcoming, so it has certain research and application value. This method does not only adapt to the static obstacles, but also to the dynamic obstacles. Lastly, the path selected is optimized by Bezier curve. Simulation results prove the effectiveness of the proposed algorithm.

    • A Multipulse-Based Forward Error Correction Technique for Improving the Quality of AMR_WB in Lossy Network

      2011, 20(8):164-168.

      Abstract (1772) HTML (0) PDF 994.65 K (3151) Comment (0) Favorites

      Abstract:GSM AMR_WB speech codec being used for both Internet and mobile networks, robustness to both frame erasures and random bit errors assumes significance. This paper presents a high-performance concealment algorithm for AMR_WB speech. The proposed algorithm includes using Mutipulse-based Forward Error correction technique at encoder to address the error propagation cased by the Adaptive codebook. And at the decoded side, to alleviate audible artifacts at the boundary between the previous and the current frame by modificating the pitch contour of the current frame. The algorithm has been implemented in the AMR_WB 12.56kb/s standard. Subjective tests have demonstrated that this improves perceived quality in the presences of frame erasures.

    • Application of MDB Technology to Mobile Real-Time Accumulative System

      2011, 20(8):169-173.

      Abstract (1672) HTML (0) PDF 694.39 K (3481) Comment (0) Favorites

      Abstract:An MDB Service Model for Telecommunication is proposed to be used in a mobile real-time accumulative system to process mass data. The proposed model offers the ability of shielding the relationship between business and storage medium. The TTHA failure recovery mechanism makes it possible to make the memory database revert from malfunction and achieve high availability. A comparison experiment is also provided to prove the high performance of our model in a mobile real-time accumulative system.

    • A Distributed Conference System Based on WMN

      2011, 20(8):174-176,159.

      Abstract (1592) HTML (0) PDF 1.10 M (2839) Comment (0) Favorites

      Abstract:This paper has mainly researched on the conference system based on WMN which is a promising technique. Firstly, discussed the different ways of conference, and selected the distributed architecture for WMN. Then, proposed the extended end-system mixing method, applied it to the ditributed conference based WMN and detailed the implementation. The simulation data shows the scheme can reduce the network congestion.

    • >经验交流
    • Power Line Icing Identification Based on DSP

      2011, 20(8):177-180.

      Abstract (2313) HTML (0) PDF 977.40 K (3268) Comment (0) Favorites

      Abstract:Ice accretion on power line usually causes great damage to high voltage transmission system. A novel algorism is proposed for detecting thickness of ice covered on the power line. Based on image taken by the digital camera, the method for automatic analysis and identification of power line icing was studied by using algorithms of image matching and edge detecting.

    • Test Scheduling for IP Cores Optimization Based 0n the Genetic Algorithm

      2011, 20(8):181-183.

      Abstract (1564) HTML (0) PDF 669.77 K (2886) Comment (0) Favorites

      Abstract:Test scheduling will reduce testing time and decrease testing cost. As many IP cores as possible can be tested in parallel by scheduling. But too many parallel tests will lead to over power and do harm to the SOC. To solve the problem, an IP cores test scheduling optimization method based on genetic algorithm is proposed. Searching for the shortest test time under considering power constrain. The experiment results of an ISCAS circuit based SOC verify the good optimization effect of the method, achieves reliability and economic for IP cores test scheduling.

    • Optimization of 3DES Cryptography Algorithm Based on Python

      2011, 20(8):184-187,173.

      Abstract (2415) HTML (0) PDF 1.18 M (4492) Comment (0) Favorites

      Abstract:This paper discusses the theory of 3DES Cryptography algorithm, describes the optimization process of PyDES module, which is a pure python module that implements the DES and Triple-DES algorithms; and analyzes the problems and solutions encountered in the optimization process; Finally, the optimized algorithm was tested by profile which is a tool for python program testing, and the result shows that the optimized algorithm can Enhance the Security and speed of the original algorithm.

    • Structure Based on AVL Tree for Storing Aerial Pictures

      2011, 20(8):188-190.

      Abstract (1581) HTML (0) PDF 724.06 K (3146) Comment (0) Favorites

      Abstract:This paper presents a new structure for storing numerous aerial pictures. Storing aerial pictures in some files at local machine by using AVL tree, it can provide required aerial-picture data to application of desktop quickly.

    • Robot Map Building Based on Laser Sensor

      2011, 20(8):191-194.

      Abstract (1565) HTML (0) PDF 681.49 K (3016) Comment (0) Favorites

      Abstract:Map building in unknown environment maps is the key to mobile robot navigation. This paper studied the method of building indoor map, discussed the way of extracting the feature of indoor environment, as well as described the main problems of map building and solutions to them. To get the indoor map, we used LMS100 laser sensor of SICK to get the envrionment information, extracted environmental characteristics and matched local map and global map. By getting envrionment information, it is solve the problem of uncertainty error from odometry to robot. Then experiments are given to show reliability and practicality of the method.

    • Design of Secondary Buffer Pool Based on Flash Memory SSD

      2011, 20(8):195-198,215.

      Abstract (1813) HTML (0) PDF 1.33 M (3199) Comment (0) Favorites

      Abstract:Disk based on database performance mainly depends on the disk IO speed. Generally, database system has a large buffer pool, where the db operations take place. Hence, the database performance depends on the size of buffer pool. In this paper, we propose a secondary buffer pool solution based on the flash memory SSD(solid state drive), which uses the high random access speed and high IOPS feature of the SSD. We implemented our solution within MySQL InnoDB. Our real machine experiments running online transaction processing workloads (TPCC) show that after enabling secondary buffer pool, the database performance will achieves up to 100% ~ 320% improvements.

    • Approach to Analyzing Subjective Text Based on Feature Selection Algorithm

      2011, 20(8):199-203.

      Abstract (2066) HTML (0) PDF 611.83 K (4461) Comment (0) Favorites

      Abstract:This paper proposed a method to analyzing subjective text. The method uses various strategies to stand for text with feature vectors, and uses SVM to classify text according to the property of subjectivity and objectivity after eliminating the rundant and irrelevant features using feature selection algorithm. The feature selection algorithm in the paper bases on SIMBA. We improve the original SIMBA on the way of iteration and the measure of similarity through experiment, and overcome the instability when putting into application. In the experiment done on English and Chinese corpus respectively, the accuracy overperforms that by SVM algorithm alone and the F-MEASURE is better than that by the baseline method on same corpus.

    • New Security Solution of ZigBee Sensor Network

      2011, 20(8):204-207.

      Abstract (1615) HTML (0) PDF 617.47 K (2933) Comment (0) Favorites

      Abstract:For the ZigBee sensor network is still not safe enough, this article proposes a simple feasible security solution. It contains two parts. First, with the frame series number as the initial vector, using the AES algorithm encrypts /decrypts the cor responding PANID. Second, judge the validity of the frame received according to the series number. Actually,this solution has a significant effect on ensuring PANID security and preventing disguised attack.

    • Implementation of Multiple Video Play in 3D Video

      2011, 20(8):208-211.

      Abstract (2329) HTML (0) PDF 688.10 K (3832) Comment (0) Favorites

      Abstract:This paper studies and implements a 3D video player, which can play multiple video at the same time. To expand the application space of multimedia technology, making it closer the engineering applications. Combined with Multimedia Technology and OpenGL technology, designed a 3D video player. It can play a different video in different surface of three-dimensional graphics, and play several different video in multiple 2D planes at the same time. 2D graphics and 3D graphics can be flexible and comfortable in the deformation, moving, rotating, etc. Experimental results show that play picture is smooth and natural. We can freely choose the number of the video. There is no disturbed between various video, reach a more ideal and satisfactory playback effect.

    • Service Request-Driven Semantic Web Service Composition

      2011, 20(8):212-215.

      Abstract (1564) HTML (0) PDF 618.07 K (2809) Comment (0) Favorites

      Abstract:Using the semantic matching algorithm, this paper proposes a service request-driven service composition method based on Web services ontology and domain ontology. By recursive calls this method to find the combination tree which should satisfy the service request function and performance constraints. To explain how to get the combination tree, a concrete example is used in this combination method. Example applications which support automatically and dynamic Web service composition can satisfy QOS constraints.

    • Control Strategy of Intelligent Vehicle Based on MC9S12XS

      2011, 20(8):216-218,236.

      Abstract (1730) HTML (0) PDF 1.20 M (3573) Comment (0) Favorites

      Abstract:In this paper, we integrate Freescale Cup National Smart Car competition, using MC9S12XE128 as the core unit for the design and implementation of smart car tracing system based on a CCD sensor, to adopt the method of nonlinear sampling to find out the location and direction of the path. Based on the path information and direction of deviation from nonlinear sampling, to determine the speed control and direction control of smart vehicle.

    • Car Position Locating Method Based on Image Processing

      2011, 20(8):219-221.

      Abstract (2301) HTML (0) PDF 615.11 K (3117) Comment (0) Favorites

      Abstract:According to the situation of coal samples, in order to achieve the full automation of coal samples, this paper proposes a locating method based on image processing for car positioning. First, this method uses of background-subtraction, image projection method, the improved Canny-edge-detection algorithm and other means to get auto maps, then combined with the size of cars to get the actual regional map. After years of sampling show that the high accuracy of the algorithm, the sampling process to resolve the issue of human factors. The method is important for the sampling the field of automated production.

    • USB Host System Based on μCOS-II

      2011, 20(8):222-224,249.

      Abstract (2187) HTML (0) PDF 1.16 M (2964) Comment (0) Favorites

      Abstract:USB (Universal Serial Bus) is a far widely used bus. It has many advantages, such as plug and play, hot plug and small volume of the interface, which have hugely changed the development of the technology of connecting computers to external equipments.μCOS-II is an open-source, complete, portable, ROMable, well custom real-time embedded operating system, which can be easily ported to a variety of microprocessor. The paper uses the LPC2378 reader card which I had used in the SUNTEK as an example to introduce the design of USB host system in μCOS-II.

    • >产品应用
    • Image Acquisition and Display System Based on S3C2440

      2011, 20(8):225-228.

      Abstract (2360) HTML (0) PDF 808.37 K (3849) Comment (0) Favorites

      Abstract:An image acquisition and display system based on S3C2440 and embedded Linux is designed. The image data is captured through USB camera, while the programming interfaces provided by the Video4Linux module are used to implement the image collection. Based on Qt/Embedded, the collected image is real-time displayed on LCD. Further, the images are compressed according to JPEG compression algorithm for subsequent process or transmission. The proposed system which is based on the embedded framework performs image data collection, real-time display and image compression. It can be widely used in the fields of intelligent transportation, computer vision and so on.

    • Design of Mobile 13.56MHZ RFID Reader

      2011, 20(8):229-232.

      Abstract (1871) HTML (0) PDF 928.49 K (5379) Comment (0) Favorites

      Abstract:A mobile RFID reader based on Zigbee wireless technology is designed in this paper. This paper shows the block diagram of the mobile reader, and detail the external circuit of the RF chip CC2420, and card reader integrated chip MF RC522, and main control chip MSP430F1611, as well as the reader's software architecture. The reader collects tag data, and sends the data to the server automatically through the ZigBee network. Mobile RFID reader reduces the RFID system network cabling, saves the cost, and is used more convenientiy and flexibleiy.

    • Intelligent Switching Opertation Based on S3c2440 Embedded System

      2011, 20(8):233-236.

      Abstract (1909) HTML (0) PDF 825.17 K (3013) Comment (0) Favorites

      Abstract:In the coal mine, switching operation is an important part of relating to production safety. This article based on Samsung s3c2440 chip and Linux embedded system. Switching controller is develop d based on Qt/Embedded control systems, the use of co-windowed Fourier transform calculation gate time, and porting to embedded devices.

    • Design of Ultracentrifuge Temperature Control Module Using Semiconductor Cooling Plate

      2011, 20(8):237-239.

      Abstract (1895) HTML (0) PDF 720.57 K (4190) Comment (0) Favorites

      Abstract:This article presents an ultracentrifuge temperature control module, which uses fuzzy PID control algorithm. Through auto-tuning PID parameters using fuzzy logic, the controller adjust input voltage to the semiconductor cooling piece to control centrifugal room temperature accurately and rapidly. Simulink is used to simulate the proposed fuzzy PID controller. The simulation results show that the proposed controller has both the advantage of PID controller and fuzzy controller and it is very efficient in controlling the centrifuge temperature.

    • >专论?综述
    • Content-Based Image Retrieval

      2011, 20(8):240-244.

      Abstract (1843) HTML (0) PDF 559.12 K (3856) Comment (0) Favorites

      Abstract:With the rapid development of multimedia technology, image database are swelling up, how to obtain useful images from the image resources on the Internet efficiently and quickly has become a hot research. In this paper, several feature extraction technologies of content-based image retrieval are discussed comprehensively and point out the future research directions.

    • Comparison of VPN Application to Multiple Platforms

      2011, 20(8):245-249.

      Abstract (2710) HTML (0) PDF 600.43 K (7552) Comment (0) Favorites

      Abstract:VPN technology provides better network security. There are more technology architectures. It can be realized by configuration on multiple platforms. This paper analyzes the differences of tunneling technologies of VPN, and explain the VPN configuration steps in detail on the Cisco IOS, Linux, Windows etc. It displays configuration features and differences on the platforms.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063