• Volume 23,Issue 2,2014 Table of Contents
    Select All
    Display Type: |
    • Research on Online Product Review Mining

      2014, 23(2):1-6. CSTR:

      Abstract (2244) HTML (0) PDF 1.01 M (3656) Comment (0) Favorites

      Abstract:To analyze and mining online product review effectively and provide valuable information to both consumers and companies, this article gives the steps and methods of online product review mining. Besides the traditional review analysis, the attention degree and polarity of characteristic words are given further to achieve the more comprehensive product review mining. At last take iphone 4s mobile for example to do the experiment to verify the given method, the result is consistent with the reality.

    • Knowledge Maps of Complex Network Visualization Based on Citespace

      2014, 23(2):7-15,35. CSTR:

      Abstract (2548) HTML (0) PDF 2.52 M (4432) Comment (0) Favorites

      Abstract:With the rapid development of the scale of complex network, such as WWW network, social network, the traditional way of text and form to describe network can not meet the requirement of analyzing and managing the growing power of network data, but as an effective method to assist us in understanding the structure of networks and mining useful information, visible technology are widely applied. Choosing the literature of the theme on the complex network visualization in Web of Science database as the studying object, map out the knowledge maps of the reach field by using Citespace. The result showed the major countries、institutions and Core Journal; revealed the evolution paths of complex network visualization research from theory research to empirical research, exploring methods to the practical application; pointed out the reach hotspots were visualization tool, algorithm etc; the reach fronts were social network analysis, data mining etc. This paper can provide valuable reference for faster and better understanding the intellectual bases and research progress of the complex network visualization.

    • Implementation of the Synapse of Spiking Neural Network in the Hardware

      2014, 23(2):16-21. CSTR:

      Abstract (2388) HTML (0) PDF 942.20 K (5290) Comment (0) Favorites

      Abstract:Spiking neural network is considered as the third generation of neural networks, and it has attracted many researchers. Its advantages have been shown in pattern recognition and computer vision. The implementation of the spiking neural network in the hardware is an important method to show its powerful computation ability. This paper begins with the synapse response curve, and then in order to suit for the FPGA implementation the difference equation is used to approach the response curve. In addition, the genetic algorithm is used to optimize the parameters of the circuit. According to the difference equation, the circuit is designed in the Simulink platform. The simulation results are obtained for the outputs of circuit triggered by a square impulse wave. Finally the future work is discussed.

    • Backend Service Platform for Mobile Apps

      2014, 23(2):22-27. CSTR:

      Abstract (2466) HTML (0) PDF 1.32 M (3452) Comment (0) Favorites

      Abstract:Traditional development of mobile application contains server-side and client-side. Developers should spend a lot of resources and time on developing and maintaining the functionality of the server-side. To simplify mobile application development, we present a backend service platform for mobile app development, which offers customer data storage, user management, file upload and download, geographic location query, push notification and other services. Mobile app developers have access to these services using two different ways: RESTful web service or native SDK. Finally, we present a practical case to illustrate the convenient usage of our platform and the improvement this platform bring to mobile app development.

    • Java-Based MADlib Automation Test Framework

      2014, 23(2):28-35. CSTR:

      Abstract (1914) HTML (0) PDF 1.28 M (3295) Comment (0) Favorites

      Abstract:As a data analysis software based on Postgre SQL and Greenplum, MADlib provides different kinds of mathematical, statistical and data mining methods. This paper introduces the design and implementation of java-based MADlib automation test framework, which can process and load data, generate and execute test cases, analyze test result automatically. As a result, large amounts of work from manual test can be avoided. What’s more, this test framework is easy to develop and maintain because it is developed in Java.

    • Framework Design and Application of Distributed Monitoring Information System

      2014, 23(2):36-41. CSTR:

      Abstract (1731) HTML (0) PDF 1.31 M (3377) Comment (0) Favorites

      Abstract:The distributed monitoring system is widely applied in detecting scattered objects in large engineering projects, of which the information system is the important component. In this paper, the information system is divided into external and internal. Internal information system is responsible for data collection and management, which is the framework design of the database server system. External information system uses the original monitoring data to calculate the monitoring target and presents the results to the user. In the internal information system, field server and data server are effectively connected by coordination server. External information system is divided into 7 levels according to the general distributed monitoring system's function, the specific function modules and the relationship among them are built aiming at the different monitoring systems. Finally, distributed monitoring information system model of subway tunnel subsidence is put forward based on the above-mentioned framework system, and this information system can also be applied to other distributed monitoring systems.

    • Vegetables Supplied to Hong Kong Safety Supervision Traceability System Based on RFID

      2014, 23(2):42-47. CSTR:

      Abstract (2459) HTML (0) PDF 1.30 M (3417) Comment (0) Favorites

      Abstract:In order to ensure the safety of vegetables supplied to Hong Kong, improve safety supervision capacity of vegetables supplied to Hong Kong, the inspection and quarantine departments supervision work reality, proposes the vegetables supplied to Hong Kong Safety Traceability System Based on radio frequency identification technology. First introduced the RFID technology and its main function, the inspection and quarantine point of vegetables supplied to Hong Kong business framework, technology framework and security system structure, functional requirements on the basis of the design of traceability system of planting base, processing factory, port and the supermarket four points, and the provisions of the standard interface, traceability system and RFID practice has proved, this system can realize each management node vegetables supplied to Hong Kong in the circulation of the upstream and downstream tracing, realize the management of the vegetables from the raw materials, production, transportation to the sale of the entire process of understanding and grasp, make enterprise's production, warehousing, customs clearance, delivery process more convenient, fully guarantee the container in the transportation of vegetables process integrity, and meets the requirements of safety traceability supervision system of vegetables supplied to Hong Kong, It has important implications for the food safety supervision and inferior screening of the product.

    • Report Editing System Based on Struts Framework

      2014, 23(2):48-51. CSTR:

      Abstract (1836) HTML (0) PDF 866.81 K (2778) Comment (0) Favorites

      Abstract:After studying the basic principle of the Struts framework and the process of using the MVC design model for Web application development, and combining with the actual demands of report editing system, we decided to adopt the Struts framework to solve the problem of the Web applications based MVC design model in report editing system. Firstly, this paper introduces the basic function of the Struts framework and the overall architecture features and the function analysis of the report editing system, then describes the design of report editor in edit system and the implementation of main functions in detail.

    • Tickets Distribution System in Tourism Based on J2EE

      2014, 23(2):52-59. CSTR:

      Abstract (1934) HTML (0) PDF 4.33 M (3175) Comment (0) Favorites

      Abstract:For the problems in domestic tourism e-business websites like ticketing information management is in disorder and information sharing is poor, through doing deep analysis and a lot of research work for the business of tickets distribution in tourism, a kind of management information system for the business of tickets distribution in tourism which is based on B2B mode is put forward. The system uses J2EE lightweight framework, the combination of Struts2, Spring and Hibernate, and utilizes Apache CXF to implement Web Service. A new kind of two-dimension code which stored in text form is used as the electronics proof for consuming. And the system is deployed on Cloud Server. Since the system is deployed on the server and comes into use, it effectively improves the efficiency of working staff and establishes communication channel among purchasing agents, distributors and resource suppliers, then high information of tourist ticket sharing comes true. The market resources are integrated appropriately. The cost of ticket purchasing is reduced and the sales profit of distributors is increased.

    • Application of VPN Gateway Based on SSL Technology in Wireless Network

      2014, 23(2):60-64. CSTR:

      Abstract (1729) HTML (0) PDF 1.06 M (2889) Comment (0) Favorites

      Abstract:Security is a key issue in design and deployment of wireless network. Security technologies mainly used in existing equipment include SSID, MAC address filtering, WEP, 802.11X etc, which are of certain security flaws in the design and can not well protect wireless network. This paper presents a deployment solution that applying VPN technology in wireless network, which designs a VPN gateway in a Linux system environment by SSL technology, so as to solve the current security issues in accessing resources within the network through wireless network.

    • Classification Document System Based on Unicode Text Watermarking

      2014, 23(2):65-69. CSTR:

      Abstract (2110) HTML (0) PDF 976.33 K (3109) Comment (0) Favorites

      Abstract:The method of document system security management is introduced and traditional text fragile watermark technology is analyzed firstly, and then proposes a new text fragile watermarking algorithm based on Unicode. And using security classification code, parity check code and error correction code to build the watermark text coding for achieving document security classification and the entire process of safety management. At last the qualitative analysis shows the algorithm has the good applicability and safety.

    • Diabetes Management System Based on .NET

      2014, 23(2):70-76,6. CSTR:

      Abstract (1900) HTML (0) PDF 1.71 M (3414) Comment (0) Favorites

      Abstract:The diabetes management system mainly realizes the information management of the diabetes data, it greatly improves the working efficiency of the medical staff; using the .NET environment, SQL SERVER database and B/S mode, this system could realizes the standardized information management of the diabetic patients, condition assessment, regular follow-up and other functions, it could educates patients with newly diagnosed type diabetes, it also has the important practical significance for pharmaceutical care for patients with treatment compliance and clinical pharmacists specification.

    • Novel Design of Remote Real-time Monitor System for Community Medical Healthcare Based on Wireless Sensor Network

      2014, 23(2):77-85. CSTR:

      Abstract (1905) HTML (0) PDF 1.56 M (4267) Comment (0) Favorites

      Abstract:This paper presents a novel design of remote real-time monitor system for community medical healthcare via wireless sensor network(WSN). In order to send the physiological data from acquisition node in WSN to the Community medical data processing center via the Internet in real time for analysis and/or storage, a system architecture with six logic function layers including system interface, Business logic layer, Data exchange layer, data base, System access service, WSN is designed for physiological data processing, and the proposed system can be developed and implemented using C/C++, Qt and QWT technology, which can effectively offer the change of physiological data for clinicians who can check data in a short time.

    • High Speed Data Transfer and Storage System Based on FPGA

      2014, 23(2):86-90. CSTR:

      Abstract (2249) HTML (0) PDF 1.01 M (3306) Comment (0) Favorites

      Abstract:With the increasing capacity of the storage system and the speed of the SAR radar front-end data acquisition, the higher request of the performance of data transfer and storage system is put forward. A solution of high speed data transfer and storage system based on the PCI-E and the Aurora protocol using the hardware platform of Xilinx’s Virtex-5 series FPGA is proposed. Customizing a reliable frame format on the basis of Aurora protocol. Using the dual-port RAM for data cache and operating in ping-pang mode ensures the stability and reliability of the data transfer in the case of transfer speed mismatch of the input and output data. The transfer and storage system and PC via the PCI-E bus for communicating, command interaction using the PIO mode and image and list data transfer using the DMA mode. Actual test shows this solution can meet the request of a type of SAR radar system for high speed data transfer and storage.

    • Monitoring System for Seismic Exploration Integrated Environment

      2014, 23(2):91-95. CSTR:

      Abstract (1910) HTML (0) PDF 1.02 M (2596) Comment (0) Favorites

      Abstract:In the construction of high-performance computing grid infrastructure for seismic exploration integrated environment, the monitoring system should not only provide a global view for distributed and heterogeneous high-performance resources in different administrative domains, but also provide guiding information for resources selection and task scheduling. A high-performance grid monitoring architecture for seismic exploration integrated environment is proposed. Then the key techniques, including monitoring information data model, information provider, information query interface and Portal, are discussed. MDS information service component of Globus Toolkit is extended and Portal system based on Websphere is developed. System testing shows that the monitor system is stable, good scalability.

    • System of Collecting GPS Information Based on UHF RFID

      2014, 23(2):96-100,112. CSTR:

      Abstract (1805) HTML (0) PDF 1.54 M (3035) Comment (0) Favorites

      Abstract:In order to alleviate the urban traffic congestion effectively and realize the intelligent traffic guidance, it needs to obtain vehicle’s dynamic GPS information real-time. The traditional vehicle GPS information collection system is based on wireless sensor network. Because of the interference in urban’s complex electronmagnetic environment, its system performance is not stable and it’s difficult to guarantee the real-time and reliablility. This paper puts forward a kind of design which based on UHF RFID technology, it can collect the vehicle GPS information under the environment of urban. This system uses the UHF RFID technology to replace the traditional wireless sensor network, it can collect and process the mobile vehicle’s GPS information fastly with non-contact. Fistly, this paper introduces the system’s hardware and software design, and then build a simulation environment for the system. At last we do some simulation experiments, the simulation results show that the system performance is good and can satisfy the practical requirements.

    • Sales Managemrent System Based on SAP in Yunnan Copper Co.

      2014, 23(2):101-107. CSTR:

      Abstract (1602) HTML (0) PDF 1.47 M (3668) Comment (0) Favorites

      Abstract:Application of SAP business solutions to enterprise is the one of most important method of enterprise informatization.It makes use of SAP built-in optimum industry solutions as main functions of ERP, and provide custom function with the configuring parameters or a small quantity of secondary development in SAP, so as to realize ERP of highly integrated and full functions. Based on putting SAP SD into use in large copper smelter, the paper presents sales process, SD description and terminology, system design, implementation and underlying technology, supporting MES and so on. The summary about online-use is also given in the end of the paper.

    • Generation Method of Random Pattern Based on Symmetry

      2014, 23(2):108-112. CSTR:

      Abstract (2033) HTML (0) PDF 1.18 M (2831) Comment (0) Favorites

      Abstract:To address how to use computer-digital patterns with the Characteristics design is a challenging problem. Taking the feature of Xinjiang Folk textile patterns as an example, a method is proposed in the paper to research generation a random pattern Triangle-based seamless to tile hexagonal. First, embedded pattern is transformed into a triangle as the first primitive using bilinear interpolation. Then, by positive and negative direction rotation of 120 angles, it is expanded into two equilateral primitives. A new design pattern is generated by tiling these equilateral primitives into the specified window which are randomly selected and transformed of geometric symmetry and rotation. There are the characteristics of random, symmetrical, and seamless tile in the proposed algorithm. The designing process validation was carried through experimental. The proposed method is closely keeping the national style of design, it has the nice generalization ability and a promising future in the digital design fields of Xinjiang Ethnic fabric pattern, advertisement and costume design.

    • Ant Colony Optimization Based on Self-Adaption Threshold for Path Planning

      2014, 23(2):113-118,59. CSTR:

      Abstract (4355) HTML (0) PDF 1.66 M (4208) Comment (0) Favorites

      Abstract:In order to overcome the traditional ant colony algorithm easy to drop into local optimum, and improve the environmental adaptability and convergence speed of the path planning algorithm, an improved ant colony algorithm based on self-adaption threshold has been proposed in this paper. In the early stages of the optimization process, it uses self-adaption threshold to intervene the optimization process to avoid it dropping into local optimum. With the increase of the number of iterations, the threshold continues the impact on the optimization process, until the optimization process is guided by pheromone and heuristic information completely. The simulation experiments demonstrate the feasibility and effectiveness of the optimization algorithm. Compared with existing ant colony algorithms, the proposed algorithm can plan an optimal path quickly in different environments with satisfactory convergence speed and environment adaptability.

    • Application of DBC Optimization Algorithm in Gas Outburst Prediction

      2014, 23(2):119-122. CSTR:

      Abstract (1821) HTML (0) PDF 857.13 K (2790) Comment (0) Favorites

      Abstract:Aiming at the characteristics of the gas outburst disasters, the double chaos search bee colony (DBC) algorithm for gas outburst prediction is proposed. DBC algorithm improves ABC by introducing the chaos optimization idea in the process of population evolutionary. The chaos method generates initial population in order to improve the quality of the food source, to prevent premature convergence of the algorithm. Meanwhile, chaos idea is introduced to the bee swarm local search. Through the method, this drawback of getting in local minima is resolved. Then DBC is merged with MLPNN to construct a gas outburst prediction model by using DBC to train the weights and thresholds. The predicted results show that the method is accurate.

    • Neighborhood Search Algorithm to Solve Resource Constrained Project Scheduling Problem

      2014, 23(2):123-127,41. CSTR:

      Abstract (1424) HTML (0) PDF 1.45 M (3044) Comment (0) Favorites

      Abstract:To solve the resource conflicts between different activities, a new neighborhood search algorithm based on topological sorting was proposed. Two operations namely jumping move and micro-move were designed to update code and get better results. Use cases with different scales from Project Scheduling Problem Library to test the performances of the algorithm. The results showed that the algorithm had searched excellent solutions. Use the algorithm proposed to solve the case in the literature, the results showed that the algorithm had its superiority. Test the proposed algorithm with different parameters and analyze the influences of parameter setting on algorithm performance.

    • Weighted KNN Classification Algorithm Based on Mean Distance of Category

      2014, 23(2):128-132. CSTR:

      Abstract (1798) HTML (0) PDF 970.70 K (4993) Comment (0) Favorites

      Abstract:In this paper, an improved KNN classification algorithm is proposed by using characteristics that the points distributed in the same category of sample collection are in close distance as an assistant to classify KNN algorithm. The way to deal with the k-nearest neighboring sample points is calculating the average distance between categories that the sample points belong to and the differences of unspecified sample points respectively. If the data calculated is greater than a certain threshold, delete this sample point from k-nearest neighboring samples, then determine the categories of unspecified sample points through majority voting. The improved KNN algorithm enhances the precision of classification and maintains the same time complexity as the traditional KNN algorithm.

    • Application of Quantum Genetic Algorithm in Image Sharpening

      2014, 23(2):133-136. CSTR:

      Abstract (1708) HTML (0) PDF 992.38 K (2999) Comment (0) Favorites

      Abstract:Image smoothing will lead to boundaries blurred, so image must be sharpen the edges of the image becomes clear. Traditional way of sharpen picture quantity has many problems. Tubbs used Beta function B (α, β) to sharpen picture, but how to determine the Beta parameters is still a complex issue. This paper describes the use of quantum genetic algorithm for nonlinear transformation parameters α and β, which adaptive to achieve gray-scale image enhancement. Finally, through simulation experiments verify the effectiveness of genetic algorithms to sharpen image.

    • GSwMKnn: Weighted MKnn Algorithm Based on the Category’s Gini Subspace

      2014, 23(2):137-141,132. CSTR:

      Abstract (2071) HTML (0) PDF 10.65 M (2305) Comment (0) Favorites

      Abstract:In high-dimensional data spaces, there exists a large number of redundant or useless attributes, and therefore it might be more effective to find target class in their subspaces. A weighted MKnn algorithm based on the Category’s Gini Coefficient subspace is proposed in this paper. Using the Category's Gini Coefficient, the algorithm firstly calculates the corresponding soft subspaces, and projects the training and testing samples onto each category subspaces. Secondly, it calculates the vote weights of unclassified samples on each subspace by the weighted MKnn algorithm and then accumulates them. Finally, it obtains the category labels of unclassified samples. The experimental results on some UCI public datasets demonstrate the effectiveness of the proposed method.

    • Multi-Target Extraction Algorithm of Circuit Board Infrared Image

      2014, 23(2):142-145,85. CSTR:

      Abstract (1361) HTML (0) PDF 1.33 M (3029) Comment (0) Favorites

      Abstract:Extracting the infrared image chip exothermic area at a circuit board is an important part of the fault detection system. The traditional extraction methods to exothermic area of chip need manual intervention more or less, and the effects of artificial participation aren’t ideal at these circuit boards such as the more chips and complex heat radiation. this algorithm put forward a multi-objective region growing arithmetic according to the features of infrared images of a circuit board, which combine with GVF-Snake model to extract infrared image of circuit board. this algorithm can ensure original outline of GVF-Snake model by using the growing area and draw the exothermic area of chips by GVF model. The experiment results show that we can extract accurately exothermic areas of all circuit board chips without manual intervention .And the algorithm have practical and robust traits.

    • Novel Networking Algorithm for Wireless Sensor Networks

      2014, 23(2):146-149. CSTR:

      Abstract (1655) HTML (0) PDF 963.38 K (2688) Comment (0) Favorites

      Abstract:In order to effectively solve the wireless sensor network maintenance difficult problem, networking algorithm with better performance is an effective method to solve the problem. The paper presents the architecture of wireless sensor network model and its connectivity is defined, then the paper presents a networking algorithm for wireless sensor networks with good connectivity, and the algorithm is analyzed by simulations. The wireless sensor network that constructed by our algorithm not only has good connectivity performance, but also can protect energy of network nodes and control network power, so it has a bright application prospect.

    • String Matching Algorithm in the Program of Typing Match

      2014, 23(2):150-154. CSTR:

      Abstract (1532) HTML (0) PDF 947.61 K (3229) Comment (0) Favorites

      Abstract:The program of typing match is a game program which used to test many indicators of typing, like speed, accuracy and so on. Many schools use it to strengthen students mastery of basic computer skills. The traditional algorithm is based on the keywords matching algorithm, only can get the location information, but the game program is the program of matching between two large text segment, it need get more matching information, so the traditional algorithm is unable to meet the requirement. On the basis of traditional algorithm, a new matching algorithm was designed by the exploration and research of the practical problems. This algorithm can match between the two text, and get the correct content, the error content and other information. So wrote a software in this algorithm, proved the feasibility and practicality of this algorithm.

    • Efficient Blob Analysis of Binary Image for Defects Inspection in Valve Rocker Arm Installation

      2014, 23(2):155-159,95. CSTR:

      Abstract (1274) HTML (0) PDF 1.55 M (2841) Comment (0) Favorites

      Abstract:One of the key issues for a vision system used for inspection of defects in Valve rocker arm installation is the real-time performance request for image process. A new Blob analysis algorithm based on Run-Length Encoding(RLE) for binary image was proposed. This algorithm requires only a single pass over the image by using the method of run-lists and dynamic array, without any need to be compared with all the RLEs at the upper line. Moreover, add the rescan algorithm in order to eliminate the labeling errors aroused by label conficts, which simplifys the process and improves the entire efficiency. The experiment results show that the proposed approach is a viable alternative for effectively labeling connected component. The algorithm has been successfully applied to a vision system fort the inspection of defects in valve rocker arm installation.

    • K-means Optimization Clustering Algorithm Based on Particle Swarm Optimization and Multi-Groups Merging

      2014, 23(2):160-165,69. CSTR:

      Abstract (2509) HTML (0) PDF 1.47 M (3293) Comment (0) Favorites

      Abstract:To deal with the problem of the sensitivity of initialization and premature convergence, this paper proposes a novel K-means optimization clustering algorithm based on particle swarm optimization and multi-groups merging, namely M-PSO-Means. Firstly the algorithm selects the initial cluster center by improving particle swarms clustering algorithm under default number of clustering, then optimizes the clustering, and last carries out cluster merging based on multi-groups merging condition to obtain the best clustering results. The experimental results show that, the algorithm can effectively solve the defects of K-means algorithm, and has a faster convergence rate and better global search ability, as well as better cluster category effect.

    • DVS-Based Performance-Aware Feedback Scheduling Algorithm

      2014, 23(2):166-172. CSTR:

      Abstract (2151) HTML (0) PDF 1.19 M (3059) Comment (0) Favorites

      Abstract:Traditional DVS algorithms have inherent limitation on their capability in energy management because the system performance is not considered. A DVS-based performance-aware feedback scheduling algorithm is proposed to overcome this limitation. In the proposed feedback scheduler, DVS technology and fuzzy control technology are used respectively to design the CPU voltage adjustment module and control tasks periods adjustment module. CPU speed and control tasks sampling periods are dynamically regulated by this two-module scheduler. Simulation results show that the proposed algorithm is able to ensure the system control performance while further reduce the energy consumption of the system by comparing with the DVS feedback scheduling algorithm based on fixed sampling periods.

    • Adaptive Graph-Based Semi-Supervised Learning Method

      2014, 23(2):173-177. CSTR:

      Abstract (1824) HTML (0) PDF 904.32 K (2811) Comment (0) Favorites

      Abstract:In most graph-based semi-supervised methods, graph structure is often set in advance, which leads to the fact that the algorithm can’t learn an optimal graph in the process of label propagation. Therefore, this paper proposes a method called Adaptive Graph-based Semi-supervised Learning Method (AGSSLM). This method can learn the optimal graph and label simultaneously by using the iterative optimization method. Moreover, this method can also obtain higher classification accuracy with fewer labeled samples. The experimental results validate the effectiveness of this method.

    • Optimized Multi-Object Detection Method Based on Histogram Back-Projection

      2014, 23(2):178-182,218. CSTR:

      Abstract (2366) HTML (0) PDF 1.53 M (3580) Comment (0) Favorites

      Abstract:Aiming at the complexity of background image in object detection and the singleness of object’s color type in common back-projection method, an optimized object detection method based on histogram back-projection was presented. In this algorithm, multiple object models were established to make up the defect that multiple objects with different colors cannot be detected by using common back-projection method. Besides, in order to reduce the interference of complex background, a series of optimizing process steps for the probability image was added. Experimental results show that the proposed algorithm not only can accurately detect the position of objects in real-time, but also with better detection effect and higher operation efficiency than the common back-projection algorithm and other methods.

    • Storage of Small Files in Hdspace Distributing Institutional Repository System

      2014, 23(2):183-188. CSTR:

      Abstract (1623) HTML (0) PDF 1.06 M (3072) Comment (0) Favorites

      Abstract:The development of Institutional Repository requires a massive resource accumulation, the demand for storage keeps increasing especially for the small files. This article proposes a distributing storage model Hdspace which is based on Dapace and HDFS to resolve the problem of the storage of massive small files of Institutional Repository. First by a means of merging small document files to get new storage files, then by establishing two indexes based on subjects and index pre-caching to improve the file-reading response, finally put forward a method for the storage of massive small files.

    • Web QoS Distinction Based Load Balancing Cluster Model

      2014, 23(2):189-194. CSTR:

      Abstract (1768) HTML (0) PDF 1.32 M (2811) Comment (0) Favorites

      Abstract:With the gradual deepening of e-commerce applications, the user accesses are sharply increased and the service requests become more diverse. How to achieve quick response to all requests is the current problem. To solve this problem, this paper proposes a Web QoS distinction based load balancing technology. Establish Web QoS distinction based load balancing cluster model. According to the type of service request and the service level for the division of user authority, high level service requests with high priority scheduling rights, which in the cluster are scheduled to a node by dynamically balancing scheduling feedback technology, so as to achieve the purpose of distinction of the Web QoS services, meanwhile, also to ensure the load balance for the cluster server. Under the same network and hardware environment conditions, this load balancing cluster model has been tested and compared with some commonly-used load balancing technologies, the experimental results proved that the proposed method was much more effective.

    • Research and Application of the Real-time Optimization Strategy on the Spacecraft Tracking and Control Information Database

      2014, 23(2):195-199. CSTR:

      Abstract (1401) HTML (0) PDF 1.26 M (2920) Comment (0) Favorites

      Abstract:In order to make up the real-time performance of tracking and control information database, this paper design a kind of two-layer’s real-time data storage model based on memory database and relational database. In this article, the two-layer’s real-time data storage mechanism and life cycle are expounded in detail, analyzing and inducing the real-time data characteristic and storage strategy, providing the memory database’s self-adaption index algorithm of T-tree index and hash index, and introducing the database synchronization mechanism between the memory database and relational database and so on. In this way, so as to improve and optimize the real-time, reliability and security of database, for future expansion of the real-time application data provides a reliable guarantee.

    • Research of Fault Analysis Based on the Hybrid Diagnosis Model

      2014, 23(2):200-204,213. CSTR:

      Abstract (1527) HTML (0) PDF 1.52 M (2692) Comment (0) Favorites

      Abstract:Hybrid diagnostic model (HDM) is an extension of diagnostic dependency model, it is a model which makes function and failure mode model into one system model. This paper studied the hybrid diagnostic inference rules in the model, and proposed the hybrid diagnosis reasoning based on the failure mode and function, and the specific divided into five different inference rules. The modeling of hybrid diagnosis model reasoning process has carried on the detailed description, maked the relationship between the failure rate function and fault patterns clear. The experiments showed that a hybrid diagnostic model is a kind of effective model is suitable for fault analysis, applying the model to our equipment fault analysis is feasible and effective.

    • Research on Mobile Social Network Real-time Communication Mechanism

      2014, 23(2):205-208. CSTR:

      Abstract (1789) HTML (0) PDF 915.78 K (3587) Comment (0) Favorites

      Abstract:Real-time communication technology has been widely used in mobile Internet. The real-time rich-media communication between users requires relatively reliable real-time communication mechanism in the unstable mobile Intrernet. This paper used ELGG as the social networking platform, and MQTT as the message transport protocol. On the bases of relationships between mobile radio users, we designed and implemented the architecture of real-time communication mechanism based on message notification. Finally, we validated the feasibility of this communication mechanism through information exchange over mobile terminals.

    • Reseach of Semantic Retrieval of Science Effect Based on Domain Ontology

      2014, 23(2):209-213. CSTR:

      Abstract (1609) HTML (0) PDF 1020.12 K (3096) Comment (0) Favorites

      Abstract:Current information retrieval (IR) approaches do not formally capture the explicit meaning of a query. Ontology-based approaches allow for sophisticated semantic search but impose a query syntax more difficult to handle. Through the analysis of user’s query habits and query phrase, we found that a simple query phrase usually verb-object phrase. For the field of chemistry knowledge and scientific effects of the characteristics of the user’s query habits, we present an approach for translating natural language queries to ontology knowledge.

    • Applying RTDX in Missle-Borne DSP Software Debug

      2014, 23(2):214-218. CSTR:

      Abstract (1420) HTML (0) PDF 1016.23 K (3116) Comment (0) Favorites

      Abstract:Based on the study of existing technique, this paper analyses the feasibility of using RTDX in Embedded Software debugging. In order to validate it, experiment of using RTDX to transmit debug information from TMS320F2812 DSP to host is carried out. Experiment results prove that the RTDX can correctly transmit debug information from DSP to host in real-time, also provide basis for further researching on fault injection and verification.

    • Detection Method of Image Focused Region Based on RPCA

      2014, 23(2):219-222. CSTR:

      Abstract (1913) HTML (0) PDF 888.06 K (3542) Comment (0) Favorites

      Abstract:Detecting the focused region in one image is an importance research direction in image fusion and computer vision areas. Focused region belongs to salient region, but current salient detection algorithms have difficult to perfectly detect focused region. Due to the limitations, in this paper we propose a novel solution based on recently developed RPCA (Robust Principal Component Analysis) technology to efficiently detect the focused region. The main idea is using the sparse matrix decomposed from RPCA result, which contains the characteristic of focused region. The experimental results show the efficiency of detecting the focused region, which point out that the RPCA based method has vast applications.

    • Optimization of Network Intrusion Detection Model based on Artificial Bee Colony Algorithm

      2014, 23(2):223-226,222. CSTR:

      Abstract (1742) HTML (0) PDF 1.38 M (3094) Comment (0) Favorites

      Abstract:The Artificial Bee Colony Algorithm based on network intrusion detection is a set of application programming interface, based on which a sophisticated intrusion detection system is designed and developed on Linux platform, and based on such an algorithm combined with Differential Evolution (DE), data information exchange is thereby realized, with data processing model adopted and analysed independently under the bi-group structure rules. By analyzing bee colony with distributed technology and with the space information search tool, the study strategy function is thereby assured. The quality of population improvement can be proved through emulation experiments. A script of description language for a simple intrusion detection model is designed, with a view to optimize the detection sample database and perform the detection for network anomalous behaviors.

    • Electricity Production Management System Business Support Platform

      2014, 23(2):227-229,234. CSTR:

      Abstract (1746) HTML (0) PDF 1.30 M (5286) Comment (0) Favorites

      Abstract:The text introduces current construction requirement of power production management system, fully considering future development of business, analizing the requirement of construction of business system which for business support platform, on which, the text expounds position and feature of business support platform, and finally discussing design idea and implementation approach of business support platform in detail.

    • Interceptor Mechanism Based the Automatic Cleaning of Files Uploaded By the Editor

      2014, 23(2):230-234. CSTR:

      Abstract (1654) HTML (0) PDF 1011.50 K (3626) Comment (0) Favorites

      Abstract:The text editor for internet has been widely used in web projects. In view of the problem how to clean up the corresponding disk files in the server when deleted the objects of the image,audio and video from the content in the editor, a general-purpose sulotion application on Java EE platform was put forward. Based on filters or interceptor mechanism, it could automatically clean up the attachments loaded to the server but of no use whenever the eidt was over. Taking the FCKeditor application for example, the software implementation technology and method was introduced in detail. The cleaning was transparent to user. The sulution is safe and reusable, and also easy to implement. It can effectively apply in various types of web projects related to content publishing.

    • Digital Photo Frame Base on the Naked-Eye Stereoscopic Display Technology

      2014, 23(2):235-240. CSTR:

      Abstract (1510) HTML (0) PDF 1.24 M (3402) Comment (0) Favorites

      Abstract:Based on the relating theories and technologies of the light barrier type naked-eye 3D technology, combining hardware platform of the current mainstream 2D digital photo frame as well as integrating optical barrier-style 3D LCD screen to digital photo frame products, this paper discusses software platform of digital photo frame based on the naked-eye 3D technology and probes its key algorithm. With the implementation of the digital photo frame based on the light barrier type naked-eye 3D technology and the relevant verification as well as the ultimate test results, it is approved that the design of digital photo frame based on the naked eye 3D technology can achieve the ideal designed features and performance. Therefore, it has certain value of application and popularization.

    • Mixed Architecture CAPP System Based on Memory Data Object

      2014, 23(2):241-243,240. CSTR:

      Abstract (1555) HTML (0) PDF 1.44 M (2903) Comment (0) Favorites

      Abstract:It’s inevitable trend that Information management system provides access to internet. In this paper, The mixed architecture system, that built on the basis of the traditional desktop system, not only has high interaction, but also has access to remote database. The system can also cross several different types of networks. The local memory database avoids the system to access the remote database frequently, and the common client proxy aims to improve loose coupling and maintainability of the system.

    • Design and Implementation of Network Device Account Management Authorization

      2014, 23(2):244-247,136. CSTR:

      Abstract (1652) HTML (0) PDF 1.60 M (3300) Comment (0) Favorites

      Abstract:In response to problems associated with account management and remote operation of LAN devices, the paper implements a Radius based authorization strategies for account management of network facilities. Through unified management, authorization, coordination and modification of devices within the entire LAN using the open-source software of FreeRadius, the proposed schemes achieve improved authorization efficiency for management of all LAN devices.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063