• Volume 21,Issue 1,2012 Table of Contents
    Select All
    Display Type: |
    • Agriculture Geospatial Information Resources Sharing and Service Platform

      2012, 21(1):1-4.

      Abstract (2124) HTML (0) PDF 793.11 K (4121) Comment (0) Favorites

      Abstract:The problem of agriculture geospatial resource sharing and agriculture information service lies in cross-sector sharing, multi-source data and data heterogeneity. To tackle this problem, this paper proposes a service-oriented agriculture geospatial information sharing platform based on OGC WMS specification. The solution consists of service-oriented agricultural geospatial information sharing framework, platform functional module and system implementation strategy. The platform serves as reference to similar application.

    • Reality-Oriented Mobile SNS System

      2012, 21(1):5-12.

      Abstract (4476) HTML (0) PDF 1.36 M (5007) Comment (0) Favorites

      Abstract:With the development of the wireless technology, such as Bluetooth, GPS and gravitational acceleration sensing, there is a new opportunity for the development of the MSNS(Mobile Social Network Services). After discussing the application development of mobile social network services based on the background of reality world, this paper introduces the architecture and design of MSNS. In the system, the key function is developed based on android operation system. The MSNS system of reality oriented cuts the distance between people, making people go out from virtual social network into realistic social network.

    • Application of Storage Virtualization to Petroleum Exploration

      2012, 21(1):13-16,76.

      Abstract (1748) HTML (0) PDF 1.80 M (3054) Comment (0) Favorites

      Abstract:With the petroleum exploration development toward high-density, high accuracy, high resolution seismic technology, seismic data processing and interpretation are facing data storage challenges. Storage virtualization is used to satisfy the demand of storage resource centralized management, sharing of seismic data between heterogeneous platforms, enhanceing the utilization of storage systems, I/O dynamic load balancing. This paper gives a design of storage virtualization by combination of storage device level and storage network level. Storage virtualization of logical level volume and file system level are applied in seismic data processing and interpretation storage system. The advantage is analyzed and verified.

    • System Engineering Method in the Construction of CAS Websites Group

      2012, 21(1):17-20.

      Abstract (2266) HTML (0) PDF 820.89 K (3351) Comment (0) Favorites

      Abstract:As a special item of the “Eleventh Five-Year Plan” Informatization Project of the Chinese Academy of Sciences, the construction of the “CAS Networking Information Publishing Platform” (CAS Websites Group) is a huge system engineering project. The aim of the project is to establish a websites group among the Chinese Academy of Sciences, with the web portal of http://www.cas.cn/ (http://english.cas.cn/) as its main station and the websites of the secondary units of CAS as its sub-stations. This paper mainly introduces the design methodology and the implementation progress of the project, and discusses the sub-stations construction method and its implementation from the aspects of sub-stations construction method, project management and progress control. I do believe that the paper will be of reference value to the websites group construction of the governments and the public institutions.

    • Forestry Web Yellow Page Category System Based on Text Classification

      2012, 21(1):21-24.

      Abstract (1874) HTML (0) PDF 884.00 K (2872) Comment (0) Favorites

      Abstract:The paper employs text classification technology to forestry Web yellow page field, and realizes a high application and management in forestry Web yellow page information. The paper also Discusses a multi-level text classification system, which provides the design and the key technologies of category system as well as the feature selection of category discriminating. The system shows good precision and recall ratio.

    • Communication and Management of Intelligent Monitoring and Management System of Countryside Power Supply District Transformer Based on GPRS

      2012, 21(1):25-29.

      Abstract (1974) HTML (0) PDF 1.11 M (3659) Comment (0) Favorites

      Abstract:In order to resolve the problems of poor safety, lacking control and communication techniques and low management level in current countryside grid, an intelligent monitoring and management system of countryside power supply district transformer based on GPRS technology is proposed in this paper. On the basis of system overall design, wireless communication networking and communication protocol of this system are designed. Network communication project based on .NET technology and TCP/IP protocol is designed to realize network communication between terminal and front server. Function of management information of system primary station is also analysed in this text. This system will promote our countryside grid’s automaticlevel and make it more reliable, more secure and more economical.

    • Simulation System for Analyzing Guidance Benefit of Travel Time Displayed by VMS

      2012, 21(1):30-35.

      Abstract (1815) HTML (0) PDF 1.23 M (3608) Comment (0) Favorites

      Abstract:Travel time displayed by variable message signs (VMS) is an effective way to release freeway congestion. This paper presents a simulation system for analyzing guidance benefit of travel time displayed by VMS. Taking a network with two origins and two destinations as an example, simulation results show that travel time displayed by VMS can release incident significantly, and guidance benefits improve obviously along with information concerned rates. This simulation system is effective for designing and evaluating traffic control strategies, and providing a basis for decision-making and references to relevant departments to improve the operational efficiency of freeway networks.

    • Fusing 3σ Theory and Hypothesis Testing for Weight Double-check of Books

      2012, 21(1):36-39.

      Abstract (1935) HTML (0) PDF 1012.97 K (2986) Comment (0) Favorites

      Abstract:Due to the low efficiency of book double-check in current book logistics, we propose a method of weight double-check. Using weight as a quantitative representation, this method considers book double-check as a classification problem. First, 3s principle and hypothesis testing are adopted to build the initial classifiers, based on the mean and variance of the weight of different classes. Then we construct the final classifier from the initial classifiers through Adaboost algorithm. This method overcomes the deficiency of initial classifiers, and improve the efficiency of current double-check approach.

    • Answer Extraction Based on Weighted Latent Semantic Analysis

      2012, 21(1):40-44.

      Abstract (2310) HTML (0) PDF 910.46 K (3183) Comment (0) Favorites

      Abstract:Question answering system returns precise and concise answers for user questions in natural language, and its core technology is answer extraction. Based on weight importance of different keywords in user’ questions and returned documents, a method for computing keyword weight is proposed. In the meantime, the weighted Latent Semantic Analysis technique is also introduced in this process. Experimental results show that the MRR of the proposed method is better than that of Vector Space Model, and gets a more satisfactory performance.

    • Improvement Algorithm of Newton Interpolation for RFID Indoor Positioning

      2012, 21(1):45-48.

      Abstract (1923) HTML (0) PDF 940.09 K (4150) Comment (0) Favorites

      Abstract:This paper introduces the LANDMARC algorithm and VIRE algorithm that is based on RFID in indoor location. And after analyzing the drawbacks of VIRE, an improved algorithm is proposed on combining of the Newton interpolation and the positioning results correction which use historical results. The improved algorithm applies Newton interpolation to adapt to nonlinear characteristics in the solution model and uses the historical data of location label as a reference, constantly revising measurements to reduce the influence of interference on positioning precision. The experiment in complex environments proves that the location precision of improved algorithm is significantly higher than VIRE algorithm.

    • Application and Research of Three-Dimensional Visualization of Mine Geological Environment

      2012, 21(1):49-52,39.

      Abstract (1657) HTML (0) PDF 1009.25 K (3187) Comment (0) Favorites

      Abstract:In this paper, intelligent SQL Server 2005 database management system for the TIN system uses advanced digital elevation model, VC + + object-oriented modeling technology and multimedia development tool as a front. It automatically generates a standard terrain TIN Algorithm using Delaunay, Real-time, dynamic generation of various mining entities Through a powerful 3D OpenGL processing and display engine. To achieve three-dimensional visualization system of mine, reproduction under real three-dimensional scene, building visualization applications.

    • Simulation and Research of SVPWM Inversion Control System Based on MATLAB

      2012, 21(1):53-56.

      Abstract (1978) HTML (0) PDF 1.07 M (8085) Comment (0) Favorites

      Abstract:For the fast switch of EPS which is from the utility power output to the inverter output, the article suggests that SVPWM modulates invert carrier via the close-cycle Control of voltage and phase, so as to synchronize the invertor output with the utility power output. In the article, we make use of Simulink modules, one of the toolboxes of MATLAB, to model and simulate the system. This environment is easily modeling, clearing structure and convenient operation. The results demonstrate that we can flexibly control voltage of inverter via feedback element and lock phase to satisfy our needs.

    • The Algorithm of Objects Detection in Automatic Alert Circle

      2012, 21(1):57-60,80.

      Abstract (1716) HTML (0) PDF 1021.09 K (3393) Comment (0) Favorites

      Abstract:According to the feature of radar/ARPA simulator, this paper presents a novel algorithm of objects detection in automatic alert circle using modern image processing technology. The algorithm turns two echo images of consecutive scanning period into two binary images, and then uses logical operation and the method of region growing to detect objects in automatic alert circle. The algorithm doesn’t need complex operations, and filters out the detecting interference of the noise. Experiments show that the algorithm can be used in objects detecting of radar/ARPA simulator.

    • A Fingerprint Feature Extraction Algorithm Based on Wavelet Transform

      2012, 21(1):61-64.

      Abstract (1766) HTML (0) PDF 883.16 K (4094) Comment (0) Favorites

      Abstract:A fingerprint feature extraction algorithm based on wavelet transform was proposed. Firstly, the paper centered on the core-points, then divided the fingerprint image into an effective area. Next, the area was analyzed by two-dimension wavelet transform, and the energy of every passage was accurately extracted as the fingerprint features. The proposed algorithm required less computational effort than conventional algorithms which were based upon minutia features extraction. In addition, this algorithm did not need the high quality fingerprint image. Besides, the correct recognition rate also reached a high level.

    • RS-LS-SVR Model in Predication of the Coal and Gas Outburst

      2012, 21(1):65-68,35.

      Abstract (1817) HTML (0) PDF 1.03 M (3008) Comment (0) Favorites

      Abstract:Based on the comprehensive study of the various algorithms, with the rough set theory and the Least Squares Support Vector Regression, taking advantage of rough set method can remove redundant information, Least Squares Support Vector Regression can accurately accelerate the convergence speed advantages. Prominent use of a specific network prediction mechanism, and use this prediction of mine gas outburst mechanism to predict the situation. After based on the MATLAB neural network toolbox BP neural network method of experimental comparison shows that the LS-SVR can speed up the convergence rate. The experimental result reveals that Based on RS-LS-SVR neural network prediction model is reliable, fast convergence and high accuracy, good effect.

    • Improvement of Failure Detection Algorithm Based on Second Detection

      2012, 21(1):69-72.

      Abstract (1931) HTML (0) PDF 1.10 M (2768) Comment (0) Favorites

      Abstract:In order to satisfy requirements of distributed network environment, where network latency and message loss exists, an improved failure detection algorithm based on the concept of fresh point and second detection mode is proposed. This algorithm calculates the second detection time dynamically, and gives a good tradeoff between accuracy and efficiency. Both theoretical analysis and testing results show that the algorithm can adapt to changes of network environment and effectively reduce the impact of message loss.

    • Improved Location Algorithm for Wireless Sensor Networks

      2012, 21(1):73-76.

      Abstract (1801) HTML (0) PDF 879.51 K (2839) Comment (0) Favorites

      Abstract:The location information of the sensor node is one of the key technologies in Wireless sensor network(WSN). To improve the location accuracy, a geometric localization algorithmis proposed for wireless sensor networks. Nodes in the network area is divided into anchor nodes and unknown nodes, using the method of slope geometry, select the appropriate anchor node, to determine the location of unknown nodes more accurately. This paper proposed the least square error method based on the trilateration to improve the algorithm accuracy. A Matlab simulation model based on the new algorithm is established. The results show that the proposed algorithm improves node location accuracy a lot with same amount of anchor nodes under same radio range condition.

    • Hybrid Localization Algorithm Based on Zigbee

      2012, 21(1):77-80.

      Abstract (1826) HTML (0) PDF 937.40 K (3326) Comment (0) Favorites

      Abstract:Localization is an emerging subject in the filed of Wireless Sensors Networks(WSNs). This paper describes a hybrid localization approach combinning TOA(Time of Arrival) ranging with DV_distance localization algorithm based on Zigbee networks. The main principle of hybrid scheme is using DV_distance to get the culmulative distance with correction, after ranging the neighbor-nodes distance by TOA. The TOA ranging based on MAC-layer protocal of Zigbee can get a perfect result with no additional hardwares. This approach shows perfect precision, less affected by the proportion of anchor nodes, which is quite suitable for localization in large scale WSNs.

    • Security Protection Architecture of Application-Level in Portal

      2012, 21(1):81-84,64.

      Abstract (2073) HTML (0) PDF 1.01 M (3543) Comment (0) Favorites

      Abstract:Concerning the problem of application-level security in portal, this paper researched on security protection architecture of application-level. It built a security protection architecture of application-level which included vulnerability scanning and testing of Web application-level before the event, active protecting from Web application-level attacking during the event, detecting and recovering the modified page after the event. Application result showed that the security protection architecture achieved application-level security in portal, and enhanced portal security effectively.

    • Intrusion Detection Based on Hybrid CatfishPSO-LSSVM Feature Selection

      2012, 21(1):85-89.

      Abstract (1716) HTML (0) PDF 1.13 M (2952) Comment (0) Favorites

      Abstract:The main issue of Intrusion detection systems is large computation, feature selection was introduced to solve the problem. According to the shortcomings of existing methods, this paper uses improved Particle Swarm Optimization to search optimal feature subset, proposes a feature selection method based on hybrid CatfishPSO and Least Square Support Vector Machine, uses combined CatfishBPSO and CatfishPSO to select feature subset and optimize the parameters of LSSVM simultaneously, and build a Intrusion detection model based on the feature selection method above. Experiments on KDD Cup 99 show that the model has a good detection performance.

    • Software Cost Model of Considering the Fault Detection Probability After Software’s Publishment

      2012, 21(1):90-93.

      Abstract (1689) HTML (0) PDF 909.00 K (2969) Comment (0) Favorites

      Abstract:Leading time as a variable of fault detection rate into the G-O Model of Software Reliability Growth Model(SRGM), we build a new Software Cost Model. This Software Cost Model considers the remaining fault detection probability of software system users after the software’s publishment. It is a model that considers error is not completely found, so the model is more practical. The article is based on the least costs of the software as the best condition and talks about the relationship of publishing time and costs. At the end of this article, examples are showed to explain the publishing time changing by parameters.

    • P2P Traffic Comprehensive Mechanism of Local Optimization

      2012, 21(1):94-97.

      Abstract (1606) HTML (0) PDF 891.45 K (3530) Comment (0) Favorites

      Abstract:The rapid growth of P2P traffic, to the autonomous network (such as the campus network, campus network) a great deal of traffic the network perimeter pressure. P2P traffic on the network to reduce the impact of critical applications, we must establish a local P2P traffic optimization mechanism, so that P2P traffic within the network as much as possible in self-government to ease the pressure on the network exit bandwidth. self-government began to use the network perimeter network of P2P traffic identification based on DPI technology, the identification of P2P traffic to be limited. However, this method simply restrict P2P applications, it will seriously affect the user experience for streaming media on demand. This paper presents a P2P caching network boundaries and local node index mechanism with the P2P traffic to local optimization strategy.

    • Tobacco Logistics System Based on GPS Electronic Lock

      2012, 21(1):98-101.

      Abstract (1825) HTML (0) PDF 999.66 K (3314) Comment (0) Favorites

      Abstract:Many enterprise focus on information acquisition, state surveillance and cargo security of goods in the transportational process. The most existing monitoring system can meet the real time monitoring, but does not do the same for cargo security. In this page, the tobacco logistics distribution integration system designs based on the tobacco industry cigarette distribution business process, using GPS electronic locks, GIS e-maps of some high-tech products. Meanwhile, the designing simplifies the process of tobacco distribution, which is based on the original process and combined GPS electronic locks. And the using of tobacco logistics system showed that the system can meet the functional requirements.

    • Electronic Control Engine ECU Calibration System

      2012, 21(1):102-106.

      Abstract (2201) HTML (0) PDF 1.55 M (5681) Comment (0) Favorites

      Abstract:To provide testing support for independent research and development of the automotive electronic control unit, an engine ECU calibration system which based on the CAN bus communication was developed. The calibration system includes four parts. That’s a calibration system software, communication module, the engine ECU and the engine that to be calibrated and tested. It uses the CAN-bus as the communication which has the main structure of a higher rate. The main achievement is that design the host computer’s table, collect and process the data, design the conversion interface between the standard protocol and a custom protocol, send data, receive data, load data, upload data, programming, acquisition data, and hardware detection, control functions, etc. EFI products in the practical application of the system showed that the system agreed with good universal property, efficient data processing and it is suitable for various ECU products that use different protocol.

    • Improving Provincial Meteorological Telecommunication Network

      2012, 21(1):107-110.

      Abstract (1524) HTML (0) PDF 863.57 K (2818) Comment (0) Favorites

      Abstract:With the development of Internet, the security of network is more and more concerned. Guangxi weather bureau has lacked network system defence and management for years. Therefore, it is essential and urgent to reprogram network and upgrade the ability of defence system. This article analyzes the structure of the Guangxi weather bureau internet, in accordance with the current overall planning of the network design, which integrates with the General technology of the network security and way of design. It is available to build a more complete and Multi-level project to reform and upgrade the network security.

    • Game Theory Based Exit Selection Model for Evacuation

      2012, 21(1):111-114.

      Abstract (2189) HTML (0) PDF 1016.41 K (3656) Comment (0) Favorites

      Abstract:This paper presents a model based on game theory, for the characters of the evacuation behavior in emergency. In consideration of evacuees’ interact during the evacuation process, every evacuee makes a best decision due to others’ strategies, which is called Nash equilibrium strategy. This model presents a Method for solving the Nash equilibrium, and the rationality of the method is validated by sample simulation. The model simulates the process of the evacuation by adopting cellular automata technology to indicates the model can simulate effectively the personnel emergent characteristic under the multi-exits condition.

    • Combination of Bimodal Method and Otsu Method in Defects Detection in Solar Cells

      2012, 21(1):115-117,131.

      Abstract (1827) HTML (0) PDF 1.05 M (4301) Comment (0) Favorites

      Abstract:Segmentation defects in the solar cell module detection system plays a very important role. In this paper, two peaks and maximum between-class variance of solar near-infrared image segmentation and image binarization and binary image obtained defects. Experiments show that the proposed silicon solar cell image segmentation method can achieve fast and accurate image segmentation, get a good binary image. Defects in the solar image feature extraction, and further description and analysis of laying a good foundation.

    • Data Confusion Algorithm in Wireless Sensor Networks

      2012, 21(1):118-135.

      Abstract (1619) HTML (0) PDF 2.42 M (3754) Comment (0) Favorites

      Abstract:In the large-scale wireless sensor networks, which need to transfer large amounts of data, there must be some problems, such as, transmission reliability, congestion and energy consumption. High-efficiency data fusion technology can effectively solve these problems. In this paper, we combined the characteristics of clustering routing algorithm, and adopted two-layer data fusion technology. The first layer is about the data fusion between cluster node and cluster-head node. Cluster node determines whether to send data according to threshold. In terms of received data, cluster-head conducts consistency check to the data, excluding abnormal data. At second layer, BP neural network algorithm is adopted to fuse head-cluster node and base station. Experiment results show that data reliability is high after fusion, which greatly decreases transmission quantity and redundancy of data, reduce energy loss, and thereby improves the performance of entire network.

    • Application of Pso-Bp Coupled Algorithm to Mine Gas Outburst Predictive

      2012, 21(1):136-139.

      Abstract (1575) HTML (0) PDF 945.79 K (3149) Comment (0) Favorites

      Abstract:Mine gas content prediction model is a multivariable nonlinear function relation, the accurate prediction model is established in various influence factors depends on the interaction between the mutual coupling. The neural network and the particle swarm algorithm organically, based on neural network theory, using particle swarm optimization algorithm and the number of hidden neurons in the network connection weights, gas content prediction model is established. Solved the bp neural network, slow convergence speed, easy in local optimum. And according to the historical data, establishing genetic neural network training and testing samples, and use of matlab simulation, the results show that particle swarm neural network model reliability, high precision.

    • Constant Power Control of Shearer Cutting Motor Based on ES

      2012, 21(1):140-143.

      Abstract (1640) HTML (0) PDF 887.98 K (3142) Comment (0) Favorites

      Abstract:In order to better adapt to coal and rock characteristics change, exert the ability of shearer cutting motor effectively and solve the problem of power fluctuation in the shearer cutting motor runtime, a constant power control system of shearer cutting motor based on expert system(ES)is established with the theory and method of expert system. In the system, the haulage speed is adjusted in real-time, to make the cutting motor of shearer run in constant power. The model of control system is constructed by the SIMULINK of MATLAB. The simulation results show that haulage speed can be anticipated in the system, adjustment time is decreased by 0.62s and the power of cutting motor overshoot is decreased by 3.8% than conventional system. The system has sensitive response, small fluctuations and Steady working.

    • Multi-Channel CRC Checking System Based on FPGA Technology

      2012, 21(1):144-147.

      Abstract (1724) HTML (0) PDF 1.04 M (3888) Comment (0) Favorites

      Abstract:CRC codes are widely used in networking and storage, and many other occasions due to its simple encoding rules. With the development of modern storage and transmission technologies, the check of software code has been difficult to meet the needs of high level transmission of Gbit. This paper has been achieved highly parallel cyclic redundancy check (CRC) system which based on FPGA technology to design a multi-channel high-speed technology. The design uses five parallel channels of 2Gbps check in order to achieve data throughput rate of 10Gbps. Each CRC channel compatible with 32-bit Ethernet standard. This design uses VerilogHDL for hardware description language, QuartusII8.0 for Integrated wiring, and packaging the processing unit into an independent IP core, then uses the Altera Corporation’s EP2C20F484C6 chips as download target for verification. The results show that the design can meet the rate’s requirements of high-speed data integrity checks.

    • Application of an Improved Risk Matrix Method to Network System Risk Assessment

      2012, 21(1):148-151,167.

      Abstract (1569) HTML (0) PDF 1.36 M (3774) Comment (0) Favorites

      Abstract:Based on the analysis of the campus network system risk and its impact factors of a university, we evaluated seven major risk factors of campus network systems with the improved risk matrix method, and built the risk matrix used in the risk assessment of campus network system, designed the basic procedure of the risk assessment with the risk matrix, in order to provide a scientific, reasonable and effective evaluation method to the risk assessment of this campus network systems. An example application shows the result of this method is more reasonable and the evaluation is more objective compared to traditional methods.

    • Method for SOAP Message Analysis Based on SOAP Extension

      2012, 21(1):152-155.

      Abstract (1692) HTML (0) PDF 1.15 M (3284) Comment (0) Favorites

      Abstract:This paper presented a method for SOAP message analysis based on SOAP extension. The paper discussed the method of SOAP message analysis using MSSoapT. Firstly, it introduced realization mechanism of SOAP message analysis using SOAP extension, then mainly analyzed key technologies how to realize SOAP message analysis using SOAP extension, gave a instance of SOAP message analysis in .NET. The results show that Implementation of the method for the design and verification of Web services security strategy provides an important adjunct.

    • Data Between Different Source Data System Synchronization and Integration

      2012, 21(1):156-159.

      Abstract (2490) HTML (0) PDF 840.70 K (4376) Comment (0) Favorites

      Abstract:During info system implementation process, because of the need to support the basic data from other systems, according to the actual situation, we need the data of synchronization. Based on a data integration project as an example, we provide a different database of import and automatic data synchronization solution.

    • Improved Embedded Zerotree Wavelet Coding Based on the Vector Quantization

      2012, 21(1):160-163.

      Abstract (1570) HTML (0) PDF 974.95 K (2976) Comment (0) Favorites

      Abstract:Vector quantization approach high compression ratio, but usually have a domino effect. EZW algorithm in high compression ratio cases recovers images of poor quality. This paper proposes a Improved embedded zerotree wavelet coding method based on the vector quantization. The basic principle is the introduction of the concept of value for the difference image, the difference value image after wavelet decomposition can have a large number of 0 of wavelet coefficients. Using EZW coding will be conducive to improving the quality of reconstructed image.

    • Application of PSO with Compression Factor in the Drum Pressure Control System

      2012, 21(1):164-167.

      Abstract (1825) HTML (0) PDF 895.36 K (3035) Comment (0) Favorites

      Abstract:In this paper, the principle of particle swarm algorithm, describes an improved algorithm which with compression factor of PSO, outlines the working principle of PID controllers, particle swarm optimization method implementation, and examples of the improved algorithm A drum pressure control system, optimize the use of matlab simulation show that the improved optimization algorithm outperforms the basic PSO, there are certain engineering applications in future.

    • Traffic Motion Object Extrication Algorithm Based on Active Contour Model

      2012, 21(1):168-171,89.

      Abstract (1739) HTML (0) PDF 1.11 M (4098) Comment (0) Favorites

      Abstract:In intelligent transport system, it is very important to precisely segment motion object from complex scene. Background difference and frame difference are two classic motion object extraction algorithms. If there are shadows associated to moving objects, both of the methods can’t extract moving object precisely. With this problem, this paper proposes a motion object extraction algorithm based on active contour model. The following steps are performed in the proposed algorithm. Firstly, moving areas involving shadows are segmented with classical background difference algorithm. Secondly, perform shadow detection and coarsely removal, then using grid method to extract initial contours. Finally, use active contour model approach to the contour of the real object by iteratively tuning the parameter of the model. Experiments show the algorithm can remove the shadow and keep the integrity of moving object.

    • Rapid and Non-Intrusive Eye-Tracking Method

      2012, 21(1):172-175.

      Abstract (2403) HTML (0) PDF 884.31 K (4691) Comment (0) Favorites

      Abstract:To meet the real-time requirement of eye-controlled human-computer interaction systems, a fast and non-intrusive eye-tracking method was proposed. Firstly, CamShift algorithm and AdaBoost algorithm were combined to extract eye regions. Secondly, iris was located from the eye region in the first video frame. And the iris region was used as a template. Finally, the iris template was scaled according to new size of eye region in the subsequent video frames. Then the scaled template was used for matching in the eye region. The relative displacement between iris center and canthus or nostril can be used to control the movement of mouse pointer on computer screen. The experiments on a video of resolution at 640*480 result a tracking speed of 32 frames per second, and the correct rate is 95.5%. Results prove the effectiveness and efficiency of this method. So, this method can be directly applied to eye-controlled human-computer interaction systems.

    • IFS and Genetic Algorithm Studying in Simulation of Plant

      2012, 21(1):176-178.

      Abstract (1700) HTML (0) PDF 835.37 K (3393) Comment (0) Favorites

      Abstract:Traditional iterated function system (abbreviated as IFS) of the plant simulation and the natural evolutionary process of plants vary widely. This article combines both IFS and genetic algorithm to simulate the morphology of plant. We make the “IFSP code” to be the set of genes in the genetic algorithm; the genes to do this selection, crossover and other genetic operations; set up a reasonable fitness function for evaluation of individual plants, reflecting the nature of species genetic and evolution. Finally, we simulate the fractal characteristics and more in line with the laws of nature plants.

    • Implementation of Processor Isolation Under the KVM Virtual Technology

      2012, 21(1):179-182.

      Abstract (3087) HTML (0) PDF 1.07 M (7064) Comment (0) Favorites

      Abstract:KVM (Kernel-based Virtual Machine) is a virtual machine based on Intel VT technology and works with QEMU, which provides device virtualization. From the process point of view, this paper focuses on the analysis of the initiative and the running mechanism of KVM virtual machine, based on the analysis, a method of isolating KVM virtual machine is implemented, which makes the KVM virtual machine run on the specified core whenever it’s created or running, and achieves the maximized utilization of processor resources.

    • SQLite's SQL Statement Cache Technology

      2012, 21(1):183-186.

      Abstract (3591) HTML (0) PDF 1.06 M (5881) Comment (0) Favorites

      Abstract:With the development of embedded applications, and the growing complexity of system functions, use of embedded database is increasingly becoming a trend in embedded devices applications. SQLite for its performance and functionality advantages will be widely used in embedded applications. But embedded devices is relatively low CPU processing power, memory capacity is limited, which restricts the performance of SQLite. For these problems, this paper according to the high-speed cache principle to simplify the process of SQL statement execution lexical analysis and syntax analysis, to reduce the time consumption during operation. Experiments show that this method can effectively improve the efficiency of SQL statements implementation, maintaining the availability and reliability of system, to enhance the overall performance of SQLite.

    • Improvement of the Routing Protocol for Coal Mine Safety in WSN

      2012, 21(1):187-190,139.

      Abstract (1650) HTML (0) PDF 938.16 K (2977) Comment (0) Favorites

      Abstract:Considering that many issues such as the limited energy in mine safety monitoring system, the accidents take place frequently. We select a new kind of wireless monitoring system and protocol, and improve it constantly. We propose a reliable and energy efficient routing protocol——SPIN-RE(SPIN-Reliable and Energy efficient) based on SPIN, so as to improve the single node energy efficiency and extend the network lifetime. It does not only increase the energy threshold but also the memory in the REQ message list to balance the energy consumption on data transmission across the single node and the network to extend the network lifetime. Simulating and comparing to the SPIN-RE and SPIN routing protocol, the results present that the SPIN-RE routing protocol improves greatly on the saving energy.

    • Method for Designing Analysis Model Based on Use Case Model

      2012, 21(1):191-193,182.

      Abstract (1903) HTML (0) PDF 938.19 K (3752) Comment (0) Favorites

      Abstract:Software designers usually overlook Analysis Model Because of its complexity, and make Design Model directly from Use Case Model. But this method cannot verify the accuracy of the use cases. This paper presents a modeling method of firstly from Use Case Model to Analysis Model, then mapping Analysis Model to Design Model, and describes the principle of this method, explains specifically how to distinguish Analysis Class from Use Case Model, and discusses deeply how to obtain the attributes of Entity Class and how to design the operations of Analysis Class.

    • Application of String Vibration Sensor to Monitoring System of mine Slope Stress

      2012, 21(1):194-197,186.

      Abstract (1891) HTML (0) PDF 1.16 M (3296) Comment (0) Favorites

      Abstract:To realize the monitoring of the slope stress, ensure the safety of strip mine production, based on the theory of vibration string sensor research and analysis, this paper developed a model for its the core of the slope wireless remote monitoring system. First, it describes the vibration string sensor principle, then to points node stress acquisition and data transmission part of the hardware, the key technology of frequency measurement and software design, and finally put forward part Measurement cycle method frequency experiment measured. The practical application showed that in the slope sensor vibration string application of wireless remote monitoring system with induction sensitive, hardware circuit reliable, excitation efficient, price cheap, fast detection feature, and the mining related product development is of important value, have broad application prospects.

    • Interoperability of Linux and Windows in Desktop Domain

      2012, 21(1):198-203.

      Abstract (2529) HTML (0) PDF 923.75 K (3370) Comment (0) Favorites

      Abstract:Linux and Windows are both hot points in the academic field of computer technology. The interoperability of them two further expands their respective development area. On the other hand, some new technology problems are also produced. Focusing on the interoperability of Linux and Windows in desktop domain, this paper goes into a little more detail about these problems and their solutions. In desktop domain, the two operating systems can mutually run programs by adopting virtualization technologies such as API emulation or by altering source codes of operating systems, can mutually deal with data files by adopting open, common and unified data file format standards, and can mutually access file systems by adopting the mechanism of file system in kernel space or in user space.

    • Object-Based Video Synopsis Technology

      2012, 21(1):204-207.

      Abstract (2166) HTML (0) PDF 824.00 K (4940) Comment (0) Favorites

      Abstract:The video summarization technology is one of the hot spots in the field of multimedia research. This paper presents the generation method of video summarization and it can be divided into two classes: video summarization based on video key frame and video synopsis based on video object. Video summarization is briefly introduced and the method of the video synopsis is principally described. At last, the development trend and the application perspective of video summarization and synopsis are presented.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063