• Volume 22,Issue 7,2013 Table of Contents
    Select All
    Display Type: |
    • Evolutionary Game and Dynamic Simulation of Trust in Mobile Commerce

      2013, 22(7):1-6. CSTR:

      Abstract (1758) HTML (0) PDF 1.08 M (3404) Comment (0) Favorites

      Abstract:Customer’s trust is one of the critical success factors of mobile commerce. Its formation and development is a dynamic evolutionary process. Using evolutionary game theory to study the evolution of customer trust equilibrium, and simulation application Netlogo. Studies have shown that to establish the confidence of potential users, m-merchants should take the initiative to issue a credible signal; For old users, should be committed to enhance customer satisfaction; regulatory mechanisms should adjust its policy with the development of m-commerce in the strict management create appropriate and comfortable environment for development, compensation to customers and punishment to dishonesty m-merchants should be larger at an early stage, with the regulatory authorities to improve the probability of its discovery merchants acts of dishonesty, the amount can be gradually reduced.

    • Internationalization of Medical Image Processing Platform 3D Slicer

      2013, 22(7):7-11. CSTR:

      Abstract (1827) HTML (0) PDF 1.03 M (6800) Comment (0) Favorites

      Abstract:3D Slicer, a useful Medical Image Processing Platform to research medical image, has obtained the attention of researchers worldwide. This platform has many advantages such as free and open source, high scalability, good portability etc. In this paper, 3D Slicer's GUI is analyzed and divided into three parts: the core, the command-line modules and the Python scripted modules. In order to achieve the goal of internationalization, QT's internationalization method is also researched in this paper according to different parts. Beside, the internationalization of input of 3D Slicer was also accomplished by analyzing the encoding of the input strings.

    • Airport Perimeter Security Based on Fuzzy Comprehensive Evaluation

      2013, 22(7):12-15. CSTR:

      Abstract (1975) HTML (0) PDF 797.24 K (2541) Comment (0) Favorites

      Abstract:Based on the fuzzy mathematics theory, the fuzzy comprehensive evaluation principle, the civil airport construction perimeter prevention system fuzzy comprehensive evaluation model. Perimeter prevention system of subsystems of fuzzy evaluation, in order to test the safety of each subsystem stability objective, comprehensive value will be divided into several respectively, and the corresponding to the organization of the airport four state, namely: crisis state [1,0.75], low state of crisis [0.75, 0.5], the basic normal [0.5, 25] and normal management state [0.25, 0]. When the calculated the comprehensive evaluation value in the above a certain range interval, can be directly shows the airport the perimeter security specific state.

    • Remanufacturing Reverse Logistics Network Design Based on the Third-Party Recovery Under Fuzzy Environment

      2013, 22(7):16-21,15. CSTR:

      Abstract (1584) HTML (0) PDF 1.48 M (3272) Comment (0) Favorites

      Abstract:To deal with the design of remanufacturing reverse logistics network, considering the uncertainty of the product recovery and consumer market demand, a multi-period remanufacturing reverse logistics network model based on third-party recovery was established in order to maximize the benefits of both the third-party logistics supplier and the manufacturer. The model can be determined for the best price of products that the manufacturer pays for the third-party logistics supplier each period. The numbers of recycling centers and inspection/disassembly centers, and the allocation of the corresponding goods flows in the network can be decided. The uncertainty parameters were denoted by the triangular fuzzy numbers. With fuzzy chance constrained programming methods, the network model in the uncertain environment can be transferred into a certainty equivalent model. The validity of the model was illustrated by a numerical example, and the relationship between the two goals was analyzed by goal programming method.

    • Data Service System of Exploration and Development

      2013, 22(7):22-26. CSTR:

      Abstract (2274) HTML (0) PDF 918.46 K (2972) Comment (0) Favorites

      Abstract:In order to meet the special requirements for data involved in exploration and development research, as well as schematic design in the oil industry upstream business, techniques such as Multi data sources integration, Data classification and search, System service function customize, Data using authorized and safety control have been employed to realize the access and download of exploration and development data (e.g. different types of sources, multiple data class, mass data) under single system environment. This research breaks the access limitation of single or certain types of data to similar system at home and abroad.

    • Cluster Deployment System Based on Qt and xCAT in Linux

      2013, 22(7):27-30. CSTR:

      Abstract (1991) HTML (0) PDF 960.77 K (3954) Comment (0) Favorites

      Abstract:As the use of cluster technology is becoming more and more widespread in fields of oil exploration, aerospace engineering, biological engineering, etc, the application requirements of different type nodes make cluster system harder and harder to manage in the cluster environment. In the paper, with the conception of cluster technology, applying xCAT+shell and Qt platform in Linux, the cluster deployment system has been designed and implemented to configure and distribute centrally different types of nodes in the cluster.

    • Analysis of PKC-Based Digital Signature System

      2013, 22(7):31-35,57. CSTR:

      Abstract (2250) HTML (0) PDF 1.44 M (3732) Comment (0) Favorites

      Abstract:Digital Signature System is an indispensible Information Safety Technology for E-commerce, E-government etc. The thesis probed main information safety hazard in the course of information transmission, emphatically explained PKC-based Digital Signature System's realization principle and selective analysised the Digital Signature System how to solve all kinds of potential safety hazard for network information. Finally, through combining Digital Signature with Digital Certificate, elaborated basic process of Internet Information secure transmission.

    • Topic-Focused Web Crawler System

      2013, 22(7):36-39,52. CSTR:

      Abstract (2011) HTML (0) PDF 1.34 M (3707) Comment (0) Favorites

      Abstract:This paper researched key techniques of topic-focused web crawler at first, then designed and implemented a crawler system by using improved slef-adapted vector space model. It analysised documents both in text and links. As the same time, this paper also comed up with a web search stategy based on gene factor combined with manully control. This strategy can solve the problem of searching path blocked. In the end, we provide some experiment results to prove the feasibility and advantages of our system from recall ratio and precision ratio.

    • Calculation of the Holography Based on SOPC Technology

      2013, 22(7):40-44. CSTR:

      Abstract (1705) HTML (0) PDF 1.04 M (3088) Comment (0) Favorites

      Abstract:More and more people pay attention to real-time three-dimensional dynamic display technology based on computer generated hologram. The major problem to restrict its development is computing speed. To solve the problem, we build PC-FPGA distributed computing holographic hardware acceleration system that multi-chip FPGA hardware block computing paralleled. Each chip FPGA unit must have the functions both of holographic algorithms computing and the data transmission to achieve this goal. Therefore, NIOS II soft core transplant uC/OS II operating system and LWIP Ethernet protocol stack based on already CGH algorithm acceleration module, NIOS II as the MCU to control CGH algorithm acceleration module and Ethernet data transmission. The article will introduce the NIOS II soft-core, uC/OS II and LWIP achieve to Ethernet data transmission process. To provide a new method to the realization of three-dimensional dynamic real-time display based on CGH.

    • Application of the Unified User Management System in the Meteorological Industry

      2013, 22(7):45-48,80. CSTR:

      Abstract (2157) HTML (0) PDF 1.29 M (2683) Comment (0) Favorites

      Abstract:Study on the ideas and methods of using the technology of LDAP and single sign-on technology to establish a unified user management system in the meteorological industry. According to the analysis of the status of the existing meteorological business applications, this paper proposed a solutions program based on the LDAP directory services and single sign-on technology. Focus on the establishment of an LDAP directory, authentication and single sign-on. At the same time, it briefly introduces the establishment of the system flow, so that the user authentication and access control is more efficient, and management more convenient.

    • Monitoring System Based on the Distributed Network

      2013, 22(7):49-52. CSTR:

      Abstract (2170) HTML (0) PDF 771.57 K (3043) Comment (0) Favorites

      Abstract:This paper designs a monitoring system based on distributed network. Web camera collection video data for the system and compression, then send the data to the remote PC host, the hose analysis image frame for face recognition and gait recognition to detect the abnormal body, then control camera haeundae for monitoring. The system makes use of real-time transmission protocol and real-time control protocol to complete the distributed video acquisition and centralized processing on network, which provide a highly efficient feasibility and low cost solutions, the system has very good real-time and interactive performance.

    • Enterprise Information System Data Migration Solution

      2013, 22(7):53-57. CSTR:

      Abstract (1675) HTML (0) PDF 877.20 K (3397) Comment (0) Favorites

      Abstract:With the advancement of informationization in our society, the key business of enterprise rely on information system more and more. The progress of technology and change of IT environment of enterprise which is required by business, often force enterprisesfacing with the problem of existing information system data migration. Data migration brings interruption to the service of users, which is a waste of time that means losing opportunities, so it requires system data migration must be quick and accurate. Electric power enterprise information technology is developing rapidly, and the information systems update frequently, therefore how to ensure the system data migration convenient, fast, safe, reliable performance, is an important research topic of the information department in an electric power enterprise. In this paper, we made a detailed analysis of the data migration process in all aspects from the management of an enterprise data standpoint, integrated the experience of power system data migration, and put forward a solution of data migration of electric power production system, which has some reference value for the implementation of enterprise information system data migration.

    • Marketing Decision Support System Based on Cloud Computing

      2013, 22(7):58-62,76. CSTR:

      Abstract (1988) HTML (0) PDF 1.64 M (3001) Comment (0) Favorites

      Abstract:This paper designed and developed a marketing decision support system based on cloud computing, which interacted with other sub-systems, and together made up the entire management decision support system. Designed the distributed database, and the system could both process local database independently and read remote databases. The model base contained various marketing decision models, and complex decision problems could be solved by model combining. The system flow fully considered the human-computer interaction, and user's judgment was included in the decision making process. Completed the system development, and used simulation data to test the system. The running results show that the system is stable, the sub-modules join well, and the MDSS achieves data sharing with other sub-systems.

    • Ruby on Rails Applied in TCM Data Sharing Platform

      2013, 22(7):63-67. CSTR:

      Abstract (1925) HTML (0) PDF 1.06 M (2737) Comment (0) Favorites

      Abstract:Ruby on Rails (ROR) is a Web application framework. It can rapidly develop and highly respected by Agile Development Practitioners, which contains important concepts MVC pattern, DSL, Convention over Configuration, Generator, Don’t Repeat Yourself et al. In this paper, a real issue, “Chinese medicine database sharing platform”, for example, to study how to apply ROR technology to meet the actual needs of the project, the technology involved in the MVC pattern, RESTful SOA, AJAX etc.

    • Kernel Intrusion Detection Method Based on Xen Hypervisor

      2013, 22(7):68-71. CSTR:

      Abstract (2488) HTML (0) PDF 838.50 K (3235) Comment (0) Favorites

      Abstract:As the foundation of cloud computing, virtualization technology’s security problems are gained more and more attention of the specialists with the development of cloud computing. This paper presents a virtual machine system kernel intrusion detection system, which use the introspection technology provided by Xen hypervisor to get internal states of kernel of the virtual machine. To achieve the goal of monitoring the kernel and preventing it from being compromised. This system can effectively defend the case of attack that dynamically modifies the kernel code and kernel unchanged data structure.

    • Design of Production and Scheduling System for Tobacco

      2013, 22(7):72-76. CSTR:

      Abstract (1867) HTML (0) PDF 1.05 M (4292) Comment (0) Favorites

      Abstract:To improve the real-time scheduling of the tobacco industry plans, a system that complies with the characteristics of cigarette production planning and scheduling system is proposed, and described the architecture, functional modules and rule scheduling algorithm of the production and scheduling system. The designed system could run continuously and stably, and corporate customers can use the system software to develop the scientific and reasonable production scheduling plan quickly and accurately according to the sales contract and scheduling plans, and realize the operation of the management and control integration.

    • Grouping of Dynamic Frame-Slotted Aloha Algorithm

      2013, 22(7):77-80. CSTR:

      Abstract (2549) HTML (0) PDF 860.54 K (5080) Comment (0) Favorites

      Abstract:This paper introduces the basic ALOH algorithm, slotted ALOHA algorithm, frame slotted ALOHA algorithm and dynamic frame slotted ALOHA algorithm in details, as well as their basic principle and system effectiveness, and analysis their characteristics. Based on the dynamic frame slotted ALOHA packet algorithm of this paper is presented, labels are grouped according to the number in the algorithm, and dynamic matching optimal frame length, the simulation results show that the improved system has the advantages of high throughput, unrestricted in the number of labels, saving time slots of a frame, and so on.

    • Digital Audio Watermarking Adaptive Algorithm Based on Echo Hiding

      2013, 22(7):81-84,94. CSTR:

      Abstract (1702) HTML (0) PDF 1.53 M (3682) Comment (0) Favorites

      Abstract:Based on the method of dual backward and forward delay kernels, an improved algorithm of echo hiding in which watermark codes embedded the audio signal is proposed in this paper. The energy of each segment into which the original audio is first divided was computed. The energy threshold of audio segments is set by the given rate of embedding watermark codes. Then the audio segments whose energy value above the energy threshold are embedded with the watermark codes and the secret information is detected with a power cepstrum computing method. The simulation results show that the improved algorithm has a significant improvement in imperceptibility and can remarkably decrease the bit error rate of detected watermark codes.

    • Enterprise Alliance Vehicle Routing Problem Based on Fuzzy Demand and Its Genetic Algorithm

      2013, 22(7):85-89. CSTR:

      Abstract (1858) HTML (0) PDF 939.66 K (2513) Comment (0) Favorites

      Abstract:The mathematical model of Enterprise transfer alliance vehicle routing problem based on fuzzy demand is established, and the problem based on fuzzy demand is transformed into a clear demand through the structured element theory. In order to solve this model, a planar structure chromosome and its genetic algorithm is proposed, which is proved by an experiment.

    • Data Flow Test-Cases Adaptive Generation Algorithm Based on Genetic Algorithm

      2013, 22(7):90-94. CSTR:

      Abstract (2156) HTML (0) PDF 1.02 M (4052) Comment (0) Favorites

      Abstract:The design of test-cases is one of the most important parts of software testing, which play an important role in guiding the post-testing and also is the fundamental guarantee of quality software. For the shortcoming of method raised by Moheb R. Girgis, an improved genetic algorithm for the automatic generation of data flow test-cases was proposed by introducing the branch functions and adaptive genetic strategies. Experiments show that the improved algorithm has a more increase in the performance of convergence rate and coverage rate.

    • Dichotomy-Based Rapid Acquisition Algorithm for Weak GPS Signal

      2013, 22(7):95-99. CSTR:

      Abstract (1589) HTML (0) PDF 1.04 M (3619) Comment (0) Favorites

      Abstract:For the navigation satellite receiver technology, the weak signal acquisition is the key to improve the receivers' sensitivity. According to the characteristics of the weak signal, long duration correlation integral is the classic method. Unfortunately, the duration is always limited to 10ms for that navigation bit rate is 50bps. In this paper, a dichotomy-based acquisition algorithm is proposed to extend integration duration to 19ms. Meanwhile, to reduce its computation complexity, the convolution operation is replaced by summation for its potential linear relation in the special time. Theoretical analysis and simulated result proves that the proposed algorithm can improve receivers' sensitivity and reduce its computation.

    • Improved Algorithm of Harris Feature Point Matching

      2013, 22(7):100-103. CSTR:

      Abstract (1351) HTML (0) PDF 1.01 M (4083) Comment (0) Favorites

      Abstract:According to the problems of low-precision and less real-time in Harris feature point matching, proposes an improved algorithm of Harris feature point matching. Firstly, Harris feature point extracting algorithm is improved so that it can reduce false feature point extracting. The initial feature point pairs are extracted with the method of improved bidirectional greatest normalized correlative coefficient, and the false feature point pairs are rejected by the improved random sample consensus algorithm to realize precision matching. The results indicate that the improved algorithm not only improve the precision of feature point matching but also improve the efficiency of feature point matching greatly.

    • Vehicles Detection Based on Histograms of Oriented Gradients and Machine Learning

      2013, 22(7):104-107. CSTR:

      Abstract (1816) HTML (0) PDF 937.85 K (4941) Comment (0) Favorites

      Abstract:We propose a vehicle detection algorithm for Intelligent Surveillance used in open pit area . The algorithm detects vehicle in the image using Histograms of Oriented Gradients features (HOG) as the image description, combined with support vector machine (SVM) classifier training. In order to improve the detection efficiency and accuracy, Hough transform line detection method to extract the region that contains the target to reduce the search range. The experiments show that the algorithm can be able to recognition the target in complex images, with high degree of accuracy, robustness for the different environments of the experiment.

    • Hadoop-Based Collaborative Filtering Recommendation Algorithm

      2013, 22(7):108-112. CSTR:

      Abstract (2151) HTML (0) PDF 1.18 M (4049) Comment (0) Favorites

      Abstract:In order to solve data sparsity and scalability of the Collaborative Filtering (CF) recommendation algorithm when the volume of the dataset is very large. After deeply analyzing the Hadoop distributed computing platform and the characteristic of Collaborative Filtering recommendation algorithm, the paper propose a optimization scheme on Hadoop platform. The experimental results show that it can effectively improve the execution efficiency of Collaborative Filtering recommendation algorithm in large data size, when it is realized by MapReduce with Hbase database on the Hadoop platform.And then, it contribute to build one recommendation system which is low cost, high-performance and dynamic scalability.

    • Localization of New Binocular Vision System

      2013, 22(7):113-116,112. CSTR:

      Abstract (1629) HTML (0) PDF 1.48 M (3453) Comment (0) Favorites

      Abstract:A new type of binocular vision system was designed used common CCD cameras. Because of positioning accuracy is not high, the experiment used the modified projection algorithm to get the position messages. This algorithm joined the explicit-implicit distortion correction method in the projection algorithm. After correction, the positioning accuracy of the whole system was improved. The experimental results showed that: In the range of 2600 mm, three direction errors in the world coordinate axis Xw, Yw, Zw are 0.200 mm, 2.300 mm and 35.432 mm. Comparing projection algorithm, the errors of the improved positioning algorithm are smaller. The new method can satisfy the system accuracy requirements.

    • Fuzzy Logic Used in Cluster-Head Election for Wireless Sensor Networks

      2013, 22(7):117-121. CSTR:

      Abstract (1568) HTML (0) PDF 1.06 M (3041) Comment (0) Favorites

      Abstract:The energy consumption is a primary consideration factor in the Wireless Sensor Networks(WSN).To balance the energy consumption of each node and enhance the lifetime of the network, in this paper, a fuzzy logic approach to cluster-head election which is called FLCHE is proposed. This algorithm fully consider the residual energy of the node, the energy consumption rate, and the distribution density of the node.Simulation with Matlab shows, compared to the LEACH, FLCHE balance the energy consumption of the nodes more and prolong the network lifetime. The overall performance is better than LEACH.

    • Publicly Verifiable Delegation of Multi-Boolean-Function

      2013, 22(7):122-126. CSTR:

      Abstract (1791) HTML (0) PDF 974.69 K (2709) Comment (0) Favorites

      Abstract:This paper proposes a publicly verifiable delegation model for multi-boolean-function, and gives a construction based on key-policy attribute based encryption (KP-ABE) supporting non-monotonic access structure. In our scheme, any third party could verify the result of the delegation for the boolean-function. Compared to the construction proposed by Parno, our scheme is more efficient, since it can delegate multi-boolean-function after the setup of the system, by binding the inputs to the specific boolean-function .

    • Green Logistics Capacitated VRPSDP Based on Ant Colony Algorithm

      2013, 22(7):127-132,160. CSTR:

      Abstract (1435) HTML (0) PDF 1.64 M (3177) Comment (0) Favorites

      Abstract:After the eighteenth central economic working conference of the CPC, the government and enterprises are giving priority to Green industry, which applies for Towns construction, traditional manufacturing industries, especially for the logistics and transport. Different from the traditional VRP, we set minimizing fuel consumption as the objective rather than the transport distances, and establish a VRP model that take 4 factors that are essential to fuel consumption: running distance, cargo weight, road pavement, and road grade, under the VRP with simultaneous Pick-up and Delivery(VRPSDP). A new heuristic factor is adopted , the pheromone update is also a new version in order to better mimic the ants’ parallel strategy in natural environment. Then we explore the parameters setting which affect ACS’s performances a lot. The empirical results show that the optimization program has achieved satisfactory results, thus validating the scientific and effectiveness of the proposed methodology.

    • Towards Eliminating Random I/O in Hybrid Hash Joins

      2013, 22(7):133-136. CSTR:

      Abstract (1736) HTML (0) PDF 860.83 K (3071) Comment (0) Favorites

      Abstract:HHJ is one of the mostly used core join algorithms for query processing in a database management system. This paper proposes a buffer-optimized hybrid hash join algorithm(OHHJ) by optimizing the bucket buffer to reduce the random I/O in hash join, i.e., to minimize the random I/O by optimizing the bucket buffer size in partition phase. By quantitatively analyzing the relationship between the bucket size, bucket buffer size, available memory size, relation size and random I/O access characteristics of hard disk, we have derived the heuristics for allocating the optimal bucket and bucket buffer sizes. The experimental results demonstrate that OHHJ can effectively reduce random I/O in HHJ during partition phase, and thus enhance the performance of the algorithm.

    • Quantum-Behaved Particle Swarm Algorithm on Weapon Target Assignment

      2013, 22(7):137-140,121. CSTR:

      Abstract (2241) HTML (0) PDF 1.39 M (2808) Comment (0) Favorites

      Abstract:In order to improve the solving efficiency and performance of Weapon Target Assignment (WTA), this paper puts forward a kind of improved quantum-behaved particle swarm optimization algorithm for solving WTA. First, by defining particle evolution speed and particle aggregation degree, the inertia weight is expressed as the function of particle evolution speed and particle aggregation degree, making the inertia weight have self-adaptivity. Secondly, the slowly varying function is introduced into the traditional location updating formula, effectively overcoming the problem of the partial optimization. Finally, a multiple weapons target assignment is built to meet the target of the minimum failure probability in allocating weapons and shooting all targets. Simulation results indicate that the new algorithm can get the optimal or suboptimal solution to WTA problems, that is, effectively solve WTA problems.

    • Case Study of Software Development Based on UML

      2013, 22(7):141-143,182. CSTR:

      Abstract (1673) HTML (0) PDF 1.26 M (3769) Comment (0) Favorites

      Abstract:UML is a powerful visual modeling language. This paper, based on Customer complaint management system for Han zhong tea, combining the advantage of UML system modeling, states modeling process about software development, detailing the functional analysis, system design, to system implement and constructs requirement model, static model and dynamic model by modeling tools Power Designer 15.

    • Digital Energy Meter Software System Based on the uC / OS-II

      2013, 22(7):144-147. CSTR:

      Abstract (1483) HTML (0) PDF 1.10 M (3616) Comment (0) Favorites

      Abstract:This paper introduces firstly the analog signal energy meter and a pure digital power meter integrated into the architecture of a Measurement system, and analysis of the realization of the measurement system in embedded real-time operating system uCOS-II environment and include: the division of tasks communication and data sharing issues between tasks, which focus on the problem of communication data sharing between tasks. Concluded the overall inter-task communication situation, and laid a solid foundation for the design of a high-precision digital power meter measurement software.

    • Static Detection Method for Malicious Behavior in Android Apps

      2013, 22(7):148-151. CSTR:

      Abstract (1622) HTML (0) PDF 850.75 K (4035) Comment (0) Favorites

      Abstract:Currently, the issues on Android application’s security have attracted more and more attentions. This paper presents a static analysis method to detect malicious behavior in Android applications. The method uses static data flow analysis technology, and implements a const analysis algorithm that tracing how the const value is used by the application to detect different kinds of malicious behavior, such as ordering services and consuming payments maliciously. The result of experiments shows that the method is practical, and can detect the malicious behavior in Android applications effectively.

    • Optical See-Through HMD Calibration

      2013, 22(7):152-155. CSTR:

      Abstract (1871) HTML (0) PDF 933.87 K (4650) Comment (0) Favorites

      Abstract:Calibration of optical see-through head-mounted displays(OSTHMD)is a key issue in augmented reality domain. In the paper, several common technologies about calibration of OSTHMD are researched; their advantages and disadvantages, discussed in detail the current most commonly used OSTHMD calibration method: SPAAM, and raise a fast method about calibration of OSTHMD based on image, compared the two calibration method from algorithm complexity, with user self-assessment method, the fast method about calibration of OSTHMD based on image is considered more rapid and precise.

    • MRAS with Resistance Estimation in PMSM

      2013, 22(7):156-160. CSTR:

      Abstract (1562) HTML (0) PDF 1012.62 K (3778) Comment (0) Favorites

      Abstract:For the inaccurate speed estimation in speed sensorless servo system which is caused by the uncertainty of the stator resistance, an improved model reference adaptive system (MRAS) method is proposed in this paper. In this method, the current model of PMSM is regarded as adjustable model. Moreover MRAS’ adaptive laws which add resistance estimation are designed. And then a simplified model is achieved according to the control strategy. Finally the simulation model is built under the Matlab/Simulink. The result shows that the speed estimation with resistance estimation has strong robustness in the effect of the uncertainty of the stator resistance in a wide range of speeds.

    • Adaptive Mechanism of TFRC for Streaming Media Service's Transmission in Wireless Network

      2013, 22(7):161-167. CSTR:

      Abstract (1551) HTML (0) PDF 1.23 M (3143) Comment (0) Favorites

      Abstract:In the high error rate wireless network environment, packet loss caused by wireless error will be misunderstood as congestion packet loss by the classic mechanism of TFRC, leading to lower throughput. To solve the transmission control problem of the wireless network for real-time streaming media service, the paper proposed a mechanism called Adaptive-TFRC which was an improved mechanism of TFRC, which can reflect the true state of the network by using loss differentiation parameter of the receiving end, then the value of parameter would be sent back to the sending end, also we have improved the throughput model formula of the classic mechanism of TFRC in this paper, finally it can realize the dynamic adaptation of transmission rate. The simulation result shows that Adaptive-TFRC can greatly improve the throughput, reduce the delay jitter of real-time traffic, and it posses TCP friendly characteristic very well, thus guaranteeing service quality of the wireless network real-time streaming media.

    • Improvement on Route-over Forwarding for IP Fragmented Packets in 6LoWPAN

      2013, 22(7):168-172. CSTR:

      Abstract (2408) HTML (0) PDF 1.03 M (3282) Comment (0) Favorites

      Abstract:6LoWPAN enables the IPv6 communication over Wireless Sensor Networks, which defines two routing strategies: mesh-under if the layer concerned is adaptation layer and route-over if the network layer. To address problems in route-over forwarding for IP fragmented packets in 6LoWPAN, this paper proposes an improved route-over strategy based on virtual circuit which enables fragments forwarding in pipelined manner, and presents the design of the improved strategy which create a forwarding mapping for subsequent fragments based on IP compression header of the first fragment. The experiments show that the improved strategy proposed in this paper perform better than original one in transmission and time delay in dealing with IP fragmented packets.

    • Lattice Attack Based on Linear Indeterminate Equation Knapsack Cryptosystems

      2013, 22(7):173-176. CSTR:

      Abstract (1593) HTML (0) PDF 822.00 K (2764) Comment (0) Favorites

      Abstract:It is very important to research and analyze one of Knapsack Cryptosystems in which the density of knapsack is greater than 0.9408. For the new knapsack public-key algorithm which is based on linear indeterminate equation in two variables, public key and ciphertext are used to construct a lattice to attack the scheme and the NTL library to verify the efficiency of the lattice attack algorithm, which finally illustrates the effectiveness of the attack method. It then proves the new knapsack public-key cryptosystem is insecure.

    • Block Level Locality Aware LRU Cache Management Strategy for Flash Memory Storage

      2013, 22(7):177-182. CSTR:

      Abstract (1579) HTML (0) PDF 1.40 M (3190) Comment (0) Favorites

      Abstract:Flash memory is widely used as storage media in electronic devices recently, and the researches of flash memory also receives more and more attention. This paper proposes a cache management algorithm called LRU-BLL, which is based on block level locality and replacement cost difference of clean page and dirty page, and combines with character of flash memory. By using simulation to evaluate the scheme, we find hit ratio and number of write/erase operations have a satisfactory improvement in proposed algorithm.

    • Optimization Strategy Based on Delegation Mechanism for Distributed File System in Massive Small File Access Patterns

      2013, 22(7):183-186,176. CSTR:

      Abstract (2010) HTML (0) PDF 1.33 M (3267) Comment (0) Favorites

      Abstract:Aiming at the system performance degradation problems of distributed file system in massive small file access patterns, designed and implemented a delegation mechanism for meta data cache in client .The client apply some kinds of delegations when getting meta data from the server. The meta data server checked and decided ecide whether to grant the delegation or not. Once the client getting the delegation which is stored in the local memory, the meta data getting operation can be unnecessary to sent RPC request. The simulation result shows that our method in this paper can reduce the number of the RPC request effectively, and aving valuable network bandwidth resources, reducing the metadata server load.

    • Java Dynamic Class Loading Mechanism Analysis and Its Application

      2013, 22(7):187-191. CSTR:

      Abstract (1680) HTML (0) PDF 931.19 K (4548) Comment (0) Favorites

      Abstract:In order to load Java class file during the Java application runtime and without affecting the normal operation of other functional modules, the realization of Java dynamic class loading method is given based on the java virtual machine (JVM) mechanism. Java Class Loader architecture, theory of dynamic class loading mechanism, the implementation process are analyzed, and which are applied to the file release module of web site management platform system. The file release module is designed to make static web pages and website management system linked. Through the custom loader to loading encryption of Java class files. In a hot swap way to implement the deployment of secondary website, enhance the site management platform's flexibility and expansibility.

    • GBS Service Modeling Based on Hidden Markov Model

      2013, 22(7):192-195. CSTR:

      Abstract (2042) HTML (0) PDF 1005.08 K (3305) Comment (0) Favorites

      Abstract:This paper briefly analyses the type of service of the GBS(Global Broadcast Service),put forward an approach of the service modeling based on Hidden Markov Model(HMM). By simulating the GBS in Qualnet, the service traffic trace is captured. The proposed modeling approach is realized in Matlab. The HMM based modeling approach only used two variables: packet size and inter packet time, which are hardly influenced by encryption techniques. The experiment results show that by the use of discrete variables, the proposed modeling approach can decrease the calculating complexity and model constructing time, improve the time cost.

    • Method for Outline Identification of Bundled Logs Based Upon Color and Spatial Features

      2013, 22(7):196-199,191. CSTR:

      Abstract (1723) HTML (0) PDF 1.64 M (3508) Comment (0) Favorites

      Abstract:Scaling automation for bundled logs not only improves production efficiency, but also is a requirement for forest resource management. After image processing, diameter of each log and the number of logs is obtained, and this process is key point of scaling automation for bundled logs. Because the imaging environment of bundled logs is complex, much man-machine interaction is needed while using the existing methods for outline identification of bundled logs. In this paper, the color feature of logs in the image of cross section of bundled logs has been discussed, which is used to remove the irrelevant pixels in the image and obtain the pixels of logs. In the next step, Laplace filter is used to work out the edge in the image, implementing the separation of log outlines. Finally, we achieve outline identification of bundled logs.

    • Fragmentation Warhead Damage Simulation Based on Monte Carlo Method

      2013, 22(7):200-202. CSTR:

      Abstract (2041) HTML (0) PDF 880.57 K (4566) Comment (0) Favorites

      Abstract:The damage calculation model of the target key components by the warhead fragmentation was set up with Monte-Carlo method. The damage ability index of the fragmentation was estimated. Taking the air-defense missile attack on the target as an example, the effectiveness of this method was shown. It was of help to the decision making in calculating the target damage effect.

    • Flow Analysis Algorithm Based on the Decision-Making on Transport Junctions

      2013, 22(7):203-206. CSTR:

      Abstract (1487) HTML (0) PDF 822.67 K (2894) Comment (0) Favorites

      Abstract:Intersection traffic flow analysis and analysis of algorithms, design of algorithms, this paper, the vehicles unified identification as a standard car equivalent steps of the algorithm based on the decision-making on the flow of traffic junctions, the algorithm is applicable not only to single-coil detector or single magnetic detector such as a single detector, but also applies to dual-loop detectors. The detection process is simple and can achieve very high accuracy rate, and through case studies, to verify the effectiveness and accuracy of change algorithm.

    • Visual Simulation of Missile Attacking F16 Based on Vega

      2013, 22(7):207-211,172. CSTR:

      Abstract (1294) HTML (0) PDF 1.55 M (3305) Comment (0) Favorites

      Abstract:A visual simulation system of fragment warhead missile attacking F16 “Falcon” fighter plane based on simulation and virtual reality technology is proposed. Firstly, the design of visual simulation of missile attacking F16 is finished, and function of each model is demonstrated detailed. Then 3D models in virtual battle field are optimized through LOD, Texture, and the model of fragment and power field of F16 are built. Finally, Vega scene driver program is developed, and special effect, view transform, preview and collision detect are emphasized. The simulation result provides reference for damage assessment of missile attacking F16.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063