• Volume 23,Issue 11,2014 Table of Contents
    Select All
    Display Type: |
    • Scheduling on Homogeneous Multi-Core System

      2014, 23(11):1-9. CSTR:

      Abstract (2340) HTML (0) PDF 707.48 K (4683) Comment (0) Favorites

      Abstract:The frequency of CPU has boosted in recent years to meet the requirement of modern application on compute performance. However, the "Moore Law" can't be maintained only by increasing the frequency of single chip, the homogeneous multi-core system has appeared to compensate this insufficient. With the support of homogenous multi-core processors, the chip puts multiple processors with same status and structure together to minimize the cost of performance improving, load balancing and fault tolerance. The performance of parallel system is doubling when combining with appropriate software. In this paper, our research is focused on the multi-core task scheduling along with the changes in processor architecture from operating system level. The system uses hybrid scheduling which is composited of independent inter-cluster scheduling and unified inner-cluster scheduling. We do some deep analyzing on multi-core scheduling theory and implementation strategy from different aspects, including scheduling model, scheduling algorithm, dispatch algorithm and scheduling occasion. The experiment results prove the correctness and schedulability of the algorithms.

    • Parameterized Verifation of RCC Cache Coherence Protocol

      2014, 23(11):10-15. CSTR:

      Abstract (2042) HTML (0) PDF 501.76 K (3470) Comment (0) Favorites

      Abstract:RCC cache coherence protocol in Godson-T many-core processor is a characteristic parameterized concurrent system. It is a challenge to verify this protocol. Cubicle is a recently built parameterized model checking tool based on SMT solver. We used Cubicle to model and verify RCC protocol successfully. The experimental results show that RCC protocol satisfies all kinds of safety properties regardless of how many nodes it has.

    • Software Cost Estimation Method with Cross-Company Data

      2014, 23(11):16-21. CSTR:

      Abstract (1493) HTML (0) PDF 962.58 K (2813) Comment (0) Favorites

      Abstract:Software cost estimation has been an important part of the software project management. Afterover half a century of research and industrial practice, cost estimation methods and models have been greatly enriched. A variety of cost estimation tools are derived from these methods and models. However, cost estimation methods and models are based on historical project data. Companies and organizations without historical project data can only use data from other companies or organizations to do the cost estimates of their own projects. How to effectively do cost estimationwith cross-company data becomes more realistic. Aiming at this problem, we propose a new cost estimation method to use cross-company data effectively. The experiments show that the method could improve the accuracy.

    • Extracting Product Features and Determine Sentiment Orientation from Chinese Online Reviews

      2014, 23(11):22-27. CSTR:

      Abstract (1949) HTML (0) PDF 603.93 K (4074) Comment (0) Favorites

      Abstract:With the development of the Internet and e-commerce, users can write their opinions about the product on the website after they buy it or use it. There are a large number of product reviews contain abundant information which can help manufacturers and users to make important decisions. Based on semantic and linguistic analysis, this paper proposes a method which can extract product features from the online reviews and rank them based on customer attention strength. At the same time, the sentiment orientation users have on the feature is determined according to the polarity scores of opinion words. The online reviews about notebook Computers are used as experimental data. Experimental results show that the method achieved good precision and recall rate.

    • Load Importance-Based DVFS Scheme for Interactive Systems

      2014, 23(11):28-33. CSTR:

      Abstract (2122) HTML (0) PDF 735.59 K (3800) Comment (0) Favorites

      Abstract:Dynamic voltage and frequency scaling technique (DVFS) has been introduced to manage system power at software level. In this paper, we firstly discussed the disadvantages of commercial CPU frequency governors on interactive systems. Then, we proposed and implemented a new DVFS scheme aimed at Interactive Systems. The scheme is designed to save system power based on the premise that user experience must not be declined. Experimental results demonstrated that most application can save more than ten percent power compared with the original Ondemand DVFS governor, and even more than thirty percent for some other applications.

    • Business Intelligence System Based on Throughput Accounting

      2014, 23(11):34-40. CSTR:

      Abstract (1491) HTML (0) PDF 1.10 M (3171) Comment (0) Favorites

      Abstract:The conflict between stability and growth has existed in companies for long. In contrast to traditional compromising solutions, Throughput Accounting (TA) offers a win-win way that meets both requirements from a systemic view. This article introduces the concept of TA and proposes a throughput-viewed metric hierarchy for supply chain management, and a relevant decision-making system is designed and implemented with Business Intelligence Technologies. The feasibility and validity of the system has been verified practically.

    • User-Centric Portal System for Mobile Information Services

      2014, 23(11):41-48. CSTR:

      Abstract (2385) HTML (0) PDF 916.57 K (2964) Comment (0) Favorites

      Abstract:Users' individual requirement has been increased with the popularity of intelligent terminal. In many scenes, users need to collect and consider much information when they make a choice, then achieve this goal by accessing web services. However, the problem for collecting information is that there are amounts of information, and the information have hidden relations, these factors make users hard to make decisions. In addition, when users search services they have to face the fact that single service always can't satisfy their needs, they need to compose many services to achieve their target. The above two questions had bad effect on users' demands satisfaction, therefore the user-centric intelligent service composition become more important. To solve this problem, we propose a user-centric portal system for mobile information services, it focus on intelligent service composition, and it can help users to find specific target and compose services to achieve the target by using individual information and context data.

    • Vehicle Anti-theft Tracking System on Android Platform

      2014, 23(11):49-54. CSTR:

      Abstract (1621) HTML (0) PDF 715.13 K (2988) Comment (0) Favorites

      Abstract:There are mechanical, electronic or network vehicle anti-theft systems. But in reality its flexibility and the interaction between the drivers and vehicles are poor. In this paper we designed both the hardware structure and software on Android OS to achieve the theft proof function. The stolen car's owner can implement human-car interaction, receive the car image, locate his car automatically and plan the optimal chasing path. The experimental results show that the system has good flexibility, strong interactivity, small size and low cost, which meets the demands of vehicle anti-theft system.

    • E-textbook Full-text Retrieval

      2014, 23(11):55-59. CSTR:

      Abstract (1570) HTML (0) PDF 839.28 K (2675) Comment (0) Favorites

      Abstract:Based on web pages full-text search technology. Design a full-text retrieval system to meet the special demand of e-textbook. It contains teaching materials document processing module, the indexing service module and the retrieval service module. According to the special feature of e-textbooks, we define the data structure of the index file, data structure of the text file, data structures of index entries and the score model for ranking. The retrieval system provides a fast and accurate search results to the learner.

    • Virtualization Environment Fault Localization System Based Log Analyzing

      2014, 23(11):60-66. CSTR:

      Abstract (1464) HTML (0) PDF 1.04 M (3433) Comment (0) Favorites

      Abstract:Fault localization is extremely important for fault tolerance in Virtualization-based cloud platform. This paper proposes an inter-node dependency-based log analysis approach consider the time-varying spatial topological using decision tree. Dependencies between nodes can help compressing log, providing valid information for analysing, thereby completing the fault localization faster and more accurately. Experiment results show that our approach can help to achieve effective and efficient fault localization in the larger-scale virtual environment variable.

    • Greenhouse Illumination Control System

      2014, 23(11):67-70. CSTR:

      Abstract (2193) HTML (0) PDF 515.88 K (3720) Comment (0) Favorites

      Abstract:A microcontroller-based greenhouse illumination control system is designed in this paper. The system utilizes the digital light sensor (BH1750FVI) to detect the illumination inside and outside. According to appropriate light range of the different crops, the system can select to block the shading film or open a certain number of complementary lights. This system has automatic control and manual control modes. The automatic control mode can automatically maintain illumination in the desired range according to the selected type of crops in greenhouse. In manual control mode, shading film and light needs to adjust manually. Tests showed that the system can compensate for manual control error and low efficiency defects and has strong practicality.

    • Location Network Design Based on REST and BDS

      2014, 23(11):71-76. CSTR:

      Abstract (1489) HTML (0) PDF 742.24 K (3119) Comment (0) Favorites

      Abstract:With the rapid development of Internet technology, we have now entered a service-based Internet time. Location services is a widely welcomed and development service, but it has some problems—high complexity and weak Performance. To alleviate these drawbacks, this paper proposes a solution based on REST. After testing, it can use simple URL to get resource. And it can also pass 100 clients 10000 requests test.

    • Water Pollution Transport Complex Framework Based on the Digital Earth

      2014, 23(11):77-81. CSTR:

      Abstract (1436) HTML (0) PDF 913.36 K (2858) Comment (0) Favorites

      Abstract:According to the problem of insufficient performance ability for water pollution transport simulation, by adopting to the digital earth technology and complexity theory, the data resources of water pollution event was integrated. The trunk stream of watercourse was decomposed into multi-scale resolution. A water quality complex agent was established with characteristics and behavior patterns. And the efficiency of the migration of calculus was improved by introducing of high-performance computer technology. Then a water pollution transport simulation framework was constructed based-on the digital earth technology which merging together the water quality model and having high expressive force. Results show that this framework has enhanced the ability of spatial representation of pollutant transport process, and provided an integrated platform for pollutant transport simulation and scenario analysis.

    • Aviation Logistics Query Platform Based on the Internet of Things

      2014, 23(11):82-86. CSTR:

      Abstract (1798) HTML (0) PDF 1.15 M (2675) Comment (0) Favorites

      Abstract:According to the problem of informatization construction of domestic aviation logistics, a suit of aviation logistics query system based on the IoT is presented and designed. The data was collected by using the technology of RFID and transmitted to ZigBee terminal node by RS232 serial port. Then the data was transmitted over short distance to routing node by ZigBee wireless network, and transferred out through a ZigBee gateway at last. Experimental results show that the platform can manage air cargo intelligently, visually and informationalized. The design provides new idea and direction for aviation logistics management and has a good prospect.

    • Privacy-Preserving Scheme in Cloud Storage Environment

      2014, 23(11):87-91. CSTR:

      Abstract (1508) HTML (0) PDF 690.74 K (2817) Comment (0) Favorites

      Abstract:As the key problem in cloud storage, security is always drawing the users' attention. A safe and efficient cloud storage scheme is designed for users' identity and data privacy protection in cloud storage security. In the scheme, a storage structure based on time series is constructed and designs a key-deriving algorithm based on the structure. It can not only be good for the generation and management of the key but also can save the storage space. By analyzing the security of scheme, it indicates the scheme can insure the security of data and can protect the privacy of users' identity.

    • Multi-Representatives Learning Algorithm for RSKNN Classification

      2014, 23(11):92-98. CSTR:

      Abstract (2017) HTML (0) PDF 580.60 K (2526) Comment (0) Favorites

      Abstract:RSKNN is an improved kNN algorithm based on variable parameter rough set model. The algorithm guarantees under the premise of a certain classification accuracy, effectively reduces the computation burden of the classified samples, and improves the computation efficiency and precision of classification. But in this algorithm,the instances of each class are simply classified into core and boundary areas. It has the limitation that it isn't classified according the features of datasets. An efficient algorithm aiming at learning multi-representatives for RSKNN is proposed. Using the theory of structural risk minimization, a few factors that determine the expected risk of new classification model are analyzed. And an unsupervised algorithm for partial clustering is used to build an optimal set of representatives. Experimental results on UCI public datasets demonstrate that the proposed method significantly improves the accuracy of the classification.

    • Two-Phase Bug Localization Method Based on Defect Repair History

      2014, 23(11):99-104. CSTR:

      Abstract (1951) HTML (0) PDF 705.00 K (2882) Comment (0) Favorites

      Abstract:Bug location is the key step in the software defect repair. With the rapid development of complex computer software and network, how to fast and efficiently locate bugs related code has become a pressing problem. This paper studies the existing bug localization method based on information retrieval technologies and a two-phase bug localization method based on defect repair history was proposed. The method pays more attention to the defect repair's local phenomenon. This method does not only rely on text similarity, but also more concern about the defect fix behavior, change of information, code characteristics and other factors. Based on information retrieval and defect prediction this method is proposed to improve the accuracy of defect location. At the end of the paper, two open source projects are conducted to validate the feasibility and effectiveness of the method.

    • Motion Object Detection Combined ViBe with Three-Frame Differential

      2014, 23(11):105-110. CSTR:

      Abstract (2195) HTML (0) PDF 964.63 K (3396) Comment (0) Favorites

      Abstract:Based on ViBe, this paper explores a new moving object detection algorithm combining with the three frame difference method. Firstly, we build model on every pixels of the background with the advantage of ViBe; then, do the logic AND operation between two differential images which have been subtracted from the current image and the previous image; lastly, update the model in real time with the idea of ViBe. Meanwhile, in order to remove the high frequency component of the image, we add wavelet denoising to every frame of the image. This algorithm effectively overcomes the effect of illumination change on the system and eliminates the ghost as well as the blinking background pixels. Experiments confirm that this algorithm can accurately extract moving objects in multiple environments and has higher robustness.

    • Locating Method of DPM 2D Barcode Image

      2014, 23(11):111-115. CSTR:

      Abstract (1450) HTML (0) PDF 698.40 K (3448) Comment (0) Favorites

      Abstract:The locating method of DPM 2D barcode image is studies in this paper. Because of the issue of reflective light of metal surface and the uneven surface, the DPM 2D barcode image collected will be of uneven illumination, low contrast, high light and other issues. These problems will impact on locating of DPM barcode greatly. In this paper, the homomorphic filtering method is used to enhance the image and the gradient projection method is used to locate the barcode region in preliminary. Because of the similar gray level between background and barcode which will result in segmentation error in the traditional thresholding method, an adaptive binarization method composed of Otsu method and neighborhood threshold method is used in this paper. Then the mathematical morphology method is used to fitting the "L" shape of Data Matrix barcode. Finally the convex hull algorithm is used to locate barcode region precisely. Experiment result shows that this method can solve uneven illumination and low contrast effectively and locate the barcode region quickly.

    • Parsing Natural Scenes Based on Hierarchical Region Merge

      2014, 23(11):116-121. CSTR:

      Abstract (1504) HTML (0) PDF 722.78 K (2808) Comment (0) Favorites

      Abstract:The goal of scene understanding is to recognize what objects in the image and where the objects are located. Hierarchical structure is commonly found in the natural scene images. This structure not only can help us to identity the objects but also how the small units interact to form the whole objects. Our algorithm is based on the level structure. We merge the neighboring segments continuously until they combined into the whole object. The result is a forest which contains several trees, one tree commonly represents one object. We introduce a machine learning model to describe the merge process, greedy inference to compute the best merge trees, and the max margin to learn the parameters. We cluster the segments features to initialize the parameter. The experiment result could be accepted.

    • Social Network Style Classification Method Based on Multi-agent Theory

      2014, 23(11):122-126. CSTR:

      Abstract (1440) HTML (0) PDF 554.22 K (2641) Comment (0) Favorites

      Abstract:Recently, there are some problems like extracting hardly and lacking classification methods in stylistic classification of social networks. Combining network stylistic diversity, multi-attribution and dynamic characteristics.A attribute fusion and thesaurus associated method based multi-agent has been proposed from feature extraction. Firstly, it extracts the basic attributes of keywords and meaning of characteristics. Then, a multi-agent fusion classification model has been established with the interaction of multi-agent and it also gives the algorithm of the model. The experimental results show that this method which compares with the traditional single fusion classification classifier and other multi-classifier fusion classification not only achieves the high-precision network stylistic classification in semantic network through Semantic features extraction but also receives Social Network stylistic classification's automation. The method has a higher accuracy classification and stability.

    • AntNet-Based Multicast Routing Algorithm of Mobile Ad Hoc NetWorks

      2014, 23(11):127-131. CSTR:

      Abstract (1248) HTML (0) PDF 606.70 K (2376) Comment (0) Favorites

      Abstract:or some reasons such as dynamic network topology and limited energy of nodes, the multicast routing algorithm of Ad Hoc network must be aware of the energy status of network nodes and be very self-adaptive to alter the multicast route as soon as possible. In this paper, the ant-agent of AntNet algorithm can gather the energy status of paths and update the pheromone. As a result, the multicast route can evaluate the changes of energy in whole network. The results of simulation show that this algorithm can balance node energy and improve the performance.

    • Rapid Person Identification Method Based on Depth Information

      2014, 23(11):132-135. CSTR:

      Abstract (1261) HTML (0) PDF 587.67 K (2981) Comment (0) Favorites

      Abstract:Traditional person identification methods have a low tolerance for occluded situation and complicated background. We focus on an image from an overhead camera.we utilize depth information for the person identification. We apply three features to the identification method: (1)the height, (2)shoulder width, (3)depth histogram. Experimental result shows our method has higher accuracy, strong robust-ness and good real-time with the existing methods of person identification.

    • Sentence Similarity Computation and Application

      2014, 23(11):136-139. CSTR:

      Abstract (1429) HTML (0) PDF 461.38 K (2774) Comment (0) Favorites

      Abstract:With the development of Internet technology, the Intelligent Answering also has drown more attention, because it can solve user unsure questions timely. Intelligent Answering system typically includes comprehension questions, information retrieval and answer extraction and selection. Sentence Similarity Computation is a part of comprehension questions, which directly affects the accuracy of the final answers. This is based on the morphological pattern and improved edit-distance method, adding semantic information of words and taking weight into account to the new sentence similarity method in. And Intelligent Answering is implemented, to make the correct rate of the system greatly improved.

    • Vehicle Detection and Tracking Algorithm of Rear feature Based on Particle Filter

      2014, 23(11):140-144. CSTR:

      Abstract (1695) HTML (0) PDF 706.98 K (2582) Comment (0) Favorites

      Abstract:In order to solve the case of vehicle video background changes in real time vehicle detection and tracking issues, this article raises a rear axle feature-based vehicle identification and tracking algorithm. Its characteristic is using innovative rear axle feature. Axial characteristics are specific for the two in the rear brake light for the endpoint, license plate at the end line of the axis of symmetry. Algorithm will calculate its histogram information after obtaining the target area and particle filter tracking. Finally, we test the feasibility of algorithms.

    • Time Series Shapelet Extraction Based on Principal Component Analysis

      2014, 23(11):145-149. CSTR:

      Abstract (1752) HTML (0) PDF 498.46 K (4498) Comment (0) Favorites

      Abstract:Shapelet provides a fast classification method in time series classification, but the extraction of time series Shapelet is so slow that it restricts the application of the Shapelet. In order to speed up the extraction of time series Shapelet, an improved method is proposed based on the principal component analysis. Firstly, it uses the principal component analysis (PCA) to reduce the dimension of time series data set and chooses the reduced data to represent the original data. Secondly, it can extract the most discriminatory Shapelet sequence from the reduced data. Lastly, the experimental results show that the improved method improves the speed of the extraction and ensures the accuracy of classification.

    • Application of Singular Spectrum Analysis in Processing of Chamber Earth Pressure Data Sequence

      2014, 23(11):150-154. CSTR:

      Abstract (1279) HTML (0) PDF 600.71 K (2349) Comment (0) Favorites

      Abstract:Based on the observed data of chamber earth pressure from on-site construction of earth pressure balance shield, a time series of chamber earth pressure is created and handled by singular spectrum analysis method, including singular spectrum decomposition and reconstruction, and a subsequent forecasting of the time series is performed based on the linear recurrence relations model. It is turned out that singular spectrum analysis can effectively separate principal components from time series of chamber earth pressure, especially in the extraction of weak periodic components. In addition, it is available for singular spectrum analysis method to reduce noise jamming by filtering out a part of the original time series that is supposed to be noise rather than signal. Consequently, it is reasonable to make the forecasting more accurate and smooth by applying singular spectrum analysis method to the analysis of chamber earth pressure values, which would be helpful to the future predictive control of chamber earth pressure in earth pressure balance shield.

    • Application of Fuzzy Pid Control Algorithm in Curtain System

      2014, 23(11):155-159. CSTR:

      Abstract (1313) HTML (0) PDF 975.33 K (2735) Comment (0) Favorites

      Abstract:In view of the present electric curtain control system for the lack of control accuracy, instability of the system error, a fuzzy self-tuning PID control algorithm was proposed and used in the system control. The system took CC2530 as the core of communications and control, which was embedded in the fuzzy PID control algorithm. The users' requirements could be responded quickly and accurately. Eventually it could control the curtain under the users' command and complete the manually smart control to the desired degree. After a system simulation test, the output of the system was not up to the overshoot and it acquired the setting time of 0.18s and steady-state error of about 0.15%, which were less than the conventional PID control. Thus it has certain practical and theoretical research reference value.

    • Algorithms of Frequent Item Sets Mining for Uncertain Data

      2014, 23(11):160-164. CSTR:

      Abstract (1200) HTML (0) PDF 460.50 K (2159) Comment (0) Favorites

      Abstract:Uncertain data exists in many situations, such as sensor networks, mobile computing, military, telecommunications and other applications, which makes it difficult to apply traditional algorithms to mining frequent item sets. To deal with these situations, we propose an efficient algorithm based on possible world model with single scan of database. The algorithm works well without any tree construction. Experimental results show that the efficiency of our algorithm is better than UF_Growth.

    • HAMA-Based Semi-Supervised Hashing Algorithm

      2014, 23(11):169-174. CSTR:

      Abstract (2221) HTML (0) PDF 624.74 K (2816) Comment (0) Favorites

      Abstract:In the massive data retrieval applications, hashing-based approximate nearest(ANN) search has become popular due to its computational and memory efficiency for online search. Semi-supervised hashing (SSH) framework that minimizes empirical error over the labeled set and an information theoretic regularizer over both labeled and unlabeled sets. But the training of hashing function of this framework is so slow due to the large-scale complex training process. HAMA is a Hadoop top-level parallel framework based on Bulk Synchronous Parallel mode (BSP). In this paper, we analyze calculation of adjusted covariance matrix in the training process of SSH, split it into two parts: unsupervised data variance part and supervised pairwise labeled data part, and explore its parallelization. And experiments show the performance and scalability over general commercial hardware and network environment.

    • Sensitive Individuals and Multi-Producer Based Dynamic GSO

      2014, 23(11):175-180. CSTR:

      Abstract (1210) HTML (0) PDF 615.57 K (2797) Comment (0) Favorites

      Abstract:Failing to adapt to dynamic changes and depart fromlocal optima are two disadvantages of basic group search optimizer (GSO) in the dynamic environment. A sensitive individuals and multi-producer based dynamic GSO named SMGSO is proposed in this paper for dynamic optimization problems. Firstly, sensitive individuals are introduced in GSO in addition to producer, scroungers and rangers, which are responsible for detecting the environmental change. If environmental changes are detected, some individuals are initialized to respond to them. Secondly, a new update model of scroungers is proposed based on the center of multi-producer to improve local search ability. At last, arole assignment strategy based on population diversitywhichis beneficial for keep stable diversity is adopted to determine the ratio of scroungers to rangers. Experimental results demonstrate that SMGSO is superior to other heuristic algorithms in dynamic environment, which may not only find the optima as possibleas closely but also trackthe changed optimatimely.

    • Spread Point Function Estimation and Variational Function Based Image Restoration Algorithm for Blurring and Noisy Image

      2014, 23(11):181-185. CSTR:

      Abstract (1359) HTML (0) PDF 3.11 M (2360) Comment (0) Favorites

      Abstract:An image restoration based on Radon transform and minimizing variational function was proposed, inorder to restore the blurring and noisy images by photography. The proposed algorithm firstly de-noised the blurring and noisy image by directional filter, then estimated the spread point function based on Radon transform which can eliminate error of the estimation due to the directional filter. Since then, the original image was de-burred by de-convolution with the spread point function. Finally, the de-blurred image was further de-noised by the variational function with L0-norm regularization. By experiments, the proposed algorithm can restore blurring and noisy images.

    • Simulation of Radar Detection Effectiveness Under Airborne Active Self-Defence Jamming

      2014, 23(11):186-191. CSTR:

      Abstract (1468) HTML (0) PDF 652.02 K (3174) Comment (0) Favorites

      Abstract:The airborne active self-protect jamming becomes one of the most effective defense measures with the rapid development of EW (Electronic Warfare). The detection effectiveness and survivability of radars in the battle is seriously threatened. According to the demands for assessing the detection effectiveness of radar, detection probability is selected as a quantitative evaluation index. Firstly, via the organic combination of different modules resolved from the detection process of radar, the detection model is established and the mathematical models are recommended in detail. Then functional simulation of the radar detection process is devised, and the system based on HLA is realized. Lastly, detection probability with its target distance is obtained online through the simulation, and it is used for assessing the detection effectiveness of radar quantitatively. The result indicates that this model and method is feasible and effective, and it could provide some reference material for the research to radar counter-counter measures.

    • Improved Mutitaper MFCC and its Application in Speaker Verification

      2014, 23(11):192-195. CSTR:

      Abstract (1377) HTML (0) PDF 525.13 K (2694) Comment (0) Favorites

      Abstract:Speech exists additive noise which is the main reason for reduced MFCC robustness. Then reduced MFCC robustness makes the speaker verification system identification rate decreased. To solve the problem, multitaper technology is introduced, which is a little effective in improving the noise robustness of MFCC. To get a better result, we propose a improved multitaper MFCC extraction algorithm which combines multitaper and spectral subtraction methods. Multitaper technology improve the robustness of MFCC, then spectral subtraction method enhance the speech and reduce the effect of noise. Simulation results show that when the test speech contains the additive noise, new algorithm could achieve better result in EER and minDCF which are the evaluation index of speaker verification system.

    • Formal Verification on Oauth2.0: Using AVISPA

      2014, 23(11):196-202. CSTR:

      Abstract (1698) HTML (0) PDF 666.74 K (3384) Comment (0) Favorites

      Abstract:OAuth is an protocol used to identify the client, and control resource access. Because it concerns about the privacy of the private resource owner, the security of OAuth protocol is fairly important. This paper mainly research on the OAuth2.0 protocol text, and make an abstraction on it, build an model in AVISPA, an formal verification tool for security protocols, and then verify the model in AVISPA. Finally, we find there is an attack mode that may result in leaking the private resource to attackers. We suggest a way to model the message to be authenticated as a symmetric key, which is innovative. This modelling and verification method we used on analyzing OAuth2.0 can be used in the verification of other security protocols, like the online payment protocol.

    • Analysis and Exploitation of Software Vulnerability Based on Cve-2012-0158

      2014, 23(11):203-207. CSTR:

      Abstract (1372) HTML (0) PDF 650.12 K (3293) Comment (0) Favorites

      Abstract:Software vulnerability is one of the important causes of computer security. Taking the CVE-2012-0158 as an example, the form prince and exploitation way of vulnerability is explored. Which codes and functions are called by the procedure when the vulnerability is triggered are briefly described through the dynamic analysis method and the causes and hazards of vulnerability are explained to arouse people's attention of taking safe development and avoiding vulnerability. Then safe development methods based on security are mentioned to reduce computer security problems caused by software vulnerabilities fundamentally, so as to improve the safety performance of the system and software.

    • HDFS Storage Solutions Based on Erasure Codes

      2014, 23(11):208-213. CSTR:

      Abstract (1646) HTML (0) PDF 681.31 K (3670) Comment (0) Favorites

      Abstract:Through the multiple-backup strategy HDFS can restore data easily when data is damaged or missed. However, the data stored in system increases all the time. When the data scale has become very big, the strategy will need several times of storage space to store the backup data. This article proposes to use erasure codes to replace the multiple-backup strategy, which can greatly improve the storage efficiency and reduce extra storage expend.

    • Application of Filenet Enterprise Content Management Solutions to Petroleum Enterprises

      2014, 23(11):214-217. CSTR:

      Abstract (1345) HTML (0) PDF 488.73 K (2848) Comment (0) Favorites

      Abstract:As a fundamental industry, petroleum industry plays a very important role in the development of the national economy. Several major oil companies, the large and medium-sized state-owned enterprises, generate millions of daily business documents,and millions of workflow to initiate and approve. How to manage of these large enterprise content efficiently and safety has become an urgent issue. Introduction of the concept of enterprise content management is no doubt one of the most effective ways to solve this problem.FileNet is an important part of IBM enterprise content management solutions. It provides enterprise-class scalability and flexibility, and can be seamlessly integrated with content management and work flow management. It provides a leading global integrated environment for business documents and work flow management for customers. With analysis on the content management and work flow management, the characteristics and powerful functions of FileNet in this article, we elaborate how to achieve efficient management among massive business documents and work flow of petroleum enterprise through the FileNet enterprise content management solutions.

    • Analysis and Discussion about Fire Alarm System Output Protocol

      2014, 23(11):218-223. CSTR:

      Abstract (1250) HTML (0) PDF 590.65 K (3062) Comment (0) Favorites

      Abstract:Understanding and implementation of automatic-fire-alarm-system's output communication protocol can impact on two sides' communication compatibility. This paper introduces the protocol's environment and functional requirements, analyzes it using formal analysis method, gives its Petri net model, states the requirements implied in the protocol and affecting compatibility. It makes some suggestions on using the protocol for networked applications.

    • Uygur Language of Machine Readable Cataloging in Library

      2014, 23(11):224-227. CSTR:

      Abstract (1328) HTML (0) PDF 612.65 K (3409) Comment (0) Favorites

      Abstract:Uygur is analyzed from the angles of the library, computer, database, solve the uygur language in a large database of ORACLE storage. This paper solves the displaying and the retrieval problems of the Internet, with national language retrieval machine readable catalog, from the aspects of interface, tips, system information such as national language localization.

    • Biodiesel - Diesel Fuel Atomization Measurement Based on Digital Image Processing

      2014, 23(11):228-231. CSTR:

      Abstract (1316) HTML (0) PDF 686.69 K (2429) Comment (0) Favorites

      Abstract:Biodiesel and regular diesel in any proportion miscrible mixtures can be used instead of petrochemical diesel fuel for internal combustion engine. In order to make the mixture in internal combustion engine applications to achieve good effect on performance and emissions, we need to research different proportions of biodiesel-diesel mixture atomization effect. In this paper, digital image processing methods is used for biodiesel-diesel mixture atomization image processing, to obtain the number per unit area and the average diameter of atomization particle, fast processing speed, accuracy, reducing the traditional manual method of analysis of subjectivity and a higher failure rate.

    • Application of Improved Lbp Feature Operator and Transformed Template

      2014, 23(11):232-234. CSTR:

      Abstract (1259) HTML (0) PDF 570.67 K (2669) Comment (0) Favorites

      Abstract:License plate recognition is an important branch of the intelligent transportation system. In the character recognition module, there is a misrecognition problem. The reasons are the methods of the recognition and the singled template. To solve these problems, a improved LBP feature operator is proposed, extracting features from the segmented characters, thus improving recognition rate. On the other hand, inclining or deflecting templates, to adapt to different angles of inclination of the plate image. The experimental results show that the recognition rate has been improved by our methods.

    • Satellite Application Information Chain's Point Resource Disposing Based on Queuing Network

      2014, 23(11):235-240. CSTR:

      Abstract (1209) HTML (0) PDF 850.45 K (2466) Comment (0) Favorites

      Abstract:This paper gives a model about satellite application information chain based on queuing network, and ensure its basic parameters. It analyses the question about satellite application information chain's point resource disposing based on queuing network, and optimal algorithms based on queuing time are presented, to dispose the point resource.

    • Network Connection Model for Online Judge System Based on Ontology Reasoning

      2014, 23(11):241-245. CSTR:

      Abstract (1785) HTML (0) PDF 522.47 K (2800) Comment (0) Favorites

      Abstract:In order to solve the problem of the communication between different systems on the network, we put forward the model of the network connection. Aiming at the default value in network connection model that cannot be directly obtained by the HTML parser from the web page, this paper presents a solution based on ontology reasoning, which includes analyzing the web page with ontology, building ontology model for the page, defining rules in KAON2 ontology reasoning machine, and reasoning out the default value of network connection model. Experiments take an online judge system as an example. The results show that the method has high recognition rate and greatly improves the automation degree of the network connection model.

    • Important Data File Restoring Technology

      2014, 23(11):246-250. CSTR:

      Abstract (1324) HTML (0) PDF 635.05 K (2675) Comment (0) Favorites

      Abstract:During data recovery, it would cost a lot of time to scan from begin to end, and most of the recovered data would be not required. Restoring the particular data files can be useful to save time and improve efficiency. Paper begins with presenting the principle of file reading and writing, and analyzes the OS' actions when the file is modified or deleted, as well as the changes of the File Associate Table (FAT) and File Directory Table (FDT). Aiming at the problem that the current data recovery method is not in effect for the lost files without continuous clusters, we can do the job for the particular file according to its clusters' distribution characteristics, and paper tests it in some experiment.

    • Real-time Positioning System of Locomotives Based on Acceleration Sensor Underground Mine

      2014, 23(11):251-255. CSTR:

      Abstract (1304) HTML (0) PDF 652.86 K (2738) Comment (0) Favorites

      Abstract:Aimed at the problem that the present precise positioning technology of coal mine is not mature, a real-time positioning system of locomotives based on acceleration sensor is presented. On the foundation of locomotives of its information and scheduling information combined, the system introduced the positioning principle and concrete implementation scheme. It also analyzed the three key techniques for realizing this system: the acceleration sensor calculating the shift accurately, judging the driving direction accurately, the low bit error rate of wireless transmission. And it solved the key technique problems through designing and improving the correlation algorithms. In addition, the feasibility of the system is proved through simulation and testing experiments.

    • Eye Detection Method for Fatigue Detection System under Complex Environment

      2014, 23(11):256-263. CSTR:

      Abstract (1285) HTML (0) PDF 1016.26 K (2330) Comment (0) Favorites

      Abstract:This paper focuses on the effects of light condition, glass-wearing on driver's eye, and proposes a way of human eye detection by Hough transform and neural network classifier. Firstly, two eye candidate regions were selected based on the geometry and symmetry of the iris. Then, coarse human eye positioning is conducted by edge detection and MAE operator. At last, the B-P neural network was utilized to pinpoint the human eye. For six groups of video images captured in three different situations, that is, different light, different backgrounds and different skin color, three groups were performed simulation experiment using matlab7.0. Results show that the algorithm for complex situations human eye detection has a strong robustness, improve the accuracy of eye detection greatly.

    • Test Case Generation Based on Genetic Algorithm

      2014, 23(11):264-267. CSTR:

      Abstract (1585) HTML (0) PDF 546.72 K (2676) Comment (0) Favorites

      Abstract:In the actual life cycle of software, due to various reasons, the time that spending on software testing is often not enough to perform the comprehensive test. Coverage ratio and the number of test cases as the main quality factors, have been payed more attention to. However, the execution order of test case as one of the important factors that affect test efficiency, has not caused enough attention. This paper presents a test case generation technology based on genetic algorithm, which considering Coverage ratio, the number of test cases and the execution order. Testing personnel can execute test case in the established order and accomplish the most important software function test in the time as shorter as possible according to the method referred in this paper.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063