• Volume 24,Issue 10,2015 Table of Contents
    Select All
    Display Type: |
    • Quality Evaluation Framework of Source Code Analysis Comments

      2015, 24(10):1-8. CSTR:

      Abstract (2040) HTML (0) PDF 1.19 M (3774) Comment (0) Favorites

      Abstract:The application of open source software is more and more popular these days, but maintenance and full understanding of huge open source system is still a hard problem. The documentations and comments that are useful for open source system understanding is limited. A new type of software analysis task emerged in research field. The source code analysis comment is an important product of software analysis task. It is a type of code analysis documentation existing like code comments. Usually the amount of source code analysis comments is huge, and it is hard to evaluate its quality in limited time. Traditional quality evaluation method of code comments, which only measure comment length or comment ratio, is too simple. It's no longer suitable for source code analysis comments' quality evaluation. Based on existing code comment quality evaluation methods and some existing works in information quality, this paper propose a more complete quality evaluation framework for source code analysis comments, taking both objective quality and subjective quality into consideration. Data gathered from real projects show that the new framework is more suitable for finding quality issues and evaluating the quality of source code analysis comments.

    • Participation Analysis and Predication Model of Crowdsourcing Software Tasks

      2015, 24(10):9-16. CSTR:

      Abstract (1496) HTML (0) PDF 1.96 M (2955) Comment (0) Favorites

      Abstract:With the rapid development of crowdsourcing, more and more Internet companies choose to crowdsource their software tasks. However, software tasks have their own characteristics, such as high threshold, high complexity, and long period, which make them face serious problem of fewer participants. In this paper, using the data on TopCoder, which is the world's largest crowdsourcing platform for software, we carefully researched the quantity of participants of crowdsourcing software tasks. Firstly, we analyzed the factors affecting participation of crowdsourcing software tasks by multiple regression method. Then, participation prediction model was studied with classification algorithms in data mining area. We hope that this empirical study could help companies or crowdsourcing platforms reduce the risk of low participation in crowdsourcing software tasks.

    • Modeling and Simulation Technology Based on Repast Simphony

      2015, 24(10):17-22. CSTR:

      Abstract (2241) HTML (0) PDF 1.47 M (4437) Comment (0) Favorites

      Abstract:Agent-based modeling and simulation technology is considered to be an effective way to study complex systems, Repast Simphony platform provides favorable conditions for agent-based modeling and simulation. According to the problem of how to build simulation models of complex systems on Repast Simphony, this paper focuses on Repast Simphony simulation platform. Its technical superiorities is introduced. The similar simulation platforms are analyzed comparatively. The general simulation and modeling process is summarized through analyzing the main library for the platform. At last, an improved Schelling model simulation example is given for further describing the design and implementation for building complex systems based on Repast Simphony. It is of significance to use Repast Simphony for agent-based modeling and simulation research.

    • Method of Evaluating the Quality of Work Diary in Software Outsourcing Project

      2015, 24(10):23-31. CSTR:

      Abstract (1649) HTML (0) PDF 1.70 M (2981) Comment (0) Favorites

      Abstract:Working diary is an important way of monitoring the progress of software outsourcing project. They are committed by project staff as a report of daily work. The quality of working diary can reflect procedure execution of project to some extent, but because the content of working diary is large and trivial, it is hard to check and evaluate rely only on manual work. Existing researches pay little attention to the quality of logs, so we proposed an automated method to evaluate the quality of working diary. Firstly, this method uses the lexical analysis, interdependence syntactic analysis and LDA model to mine and analysis the historical data. Secondly, we extract quality features from aspects such as structure, content, subject relevance, then collect training samples by artificial tagging. Lastly, we establish evaluation model using classification algorithm, through which we get the final evaluation of the work diary. This paper made a case study based on a national project and achieved a highly accurate evaluation model. The result shows that the method can effectively evaluate the quality of working diary, which helps to make decision for outsourcing department.

    • Distributed Hybrid Database System

      2015, 24(10):32-37. CSTR:

      Abstract (1926) HTML (0) PDF 946.43 K (2636) Comment (0) Favorites

      Abstract:In this paper, we propose a distributed hybrid database system. Firstly, the dissemination server copies entity tables in relational database to the local memory database and the dissemination clients load complete snapshot from server's memory. Then, the client and server will keep synchronization through dissemination mechanism after initialization. In this paper, we present the design of data classification and data storage. Especially, we introduce the design porocess of dissemination mechanism, mainly involving dissemination module, polling mode, Delta id usage, dissemination recovery protocol, DB record synchronization.

    • Vehicle System with Intelligent Security Pre-warning in Expressway

      2015, 24(10):38-45. CSTR:

      Abstract (1540) HTML (0) PDF 1.43 M (2783) Comment (0) Favorites

      Abstract:In order to reduce the traffic accidents in expressway, a system which can monitor vehicles in expressway has been designed. The system uses GPS to collect vehicle information, and then the data be transmitted to sever through the GPRS, a judgement can be made on the vehicle itself and its surrounding running condition with a specific pre-warning algorithm and driver can receive the automatic warning if there are illegal driving behaviors. The improved schemes on memory scheduling of sever and disconnection of vehicle terminals are be respectively proposed. Finally, the stability of system, the processing efficiency of pre-warning events and accuracy of pre-warning are tested in the simulation environment with LAN, the results show that the system has higher stability and accuracy; it can be referred in further studies on the research of monitoring expressway.

    • Robust Output Control for Magnetically Coupled Resonant Wireless Power Transfer System

      2015, 24(10):46-52. CSTR:

      Abstract (2228) HTML (0) PDF 1.26 M (2821) Comment (0) Favorites

      Abstract:The loads and resonant parameters of magnetically coupled resonant wireless power transfer system are changed due to the external environment, then the operating frequency will be random drift and resulting in model parameter uncertainty. To solve the problem of robust output control with uncertain parameters, the H controller is designed by making use of Robust Control Toolbox of Matlab based on H control theory in this article. We use the method of structured singular value to analysis robust stability and robust performance for the closed-loop system. The results show that by applying H controller the closed loop perturbation system realizes robust output control and the controller is designed to provide a general method for such high-order nonlinear uncertain closed-loop perturbation systems.

    • Massive Atmosphere Particulate Matter Analysis System

      2015, 24(10):53-57. CSTR:

      Abstract (1348) HTML (0) PDF 968.45 K (2236) Comment (0) Favorites

      Abstract:Since 2011, fog and haze has been appeared in many places of China. Atmosphere particulates components analysis could help people to know the reason of the fog and haze so that we can take measures to deal with it. The purpose of this system is to name the atmosphere particulates, which means to classify the atmosphere particulates into seven common types. In traditional practice, we need to name the particulates artificially and one by one. But, if we want to do this automatically, there are two difficulties we need to solve. First, the scale of data is large. Secondly, it is hard to make rules to summarize the human experience. In this system, we try to use data mining technology to solve the two problems. To decrease the scale of data, we use the Adaptive Resonance Neural Cluster Algorithm, and to summarize the human experience, we use the Logistic Regression Classification Algorithm. At last, we adjust the models to get a better accuracy and meet the needs of the actual application.

    • Enterprise Patent Management System Based on PDCA

      2015, 24(10):58-61. CSTR:

      Abstract (1382) HTML (0) PDF 866.90 K (2734) Comment (0) Favorites

      Abstract:Patent management is the key to the implementation of enterprises' patent strategies. Centered on the improvement of patent management quality and in accordance with the theory of PDCA cycle, a patent management system for enterprises is designed and realized in this article. Function modules including proposal management, application management, operation management, statistical analysis, etc. are integrated into the process model of Plan-Do-Check-Act (PDCA), thereby making the patent management system more scientific and effective.

    • High-performance Distributed XMPP Server Based on Actor Model

      2015, 24(10):62-67. CSTR:

      Abstract (1529) HTML (0) PDF 1.36 M (3048) Comment (0) Favorites

      Abstract:The cloud servers need to interact with a large number of clients simultaneously in real time in the cloud computing and the mobile internet environment. Real time communication between servers and clients is usually implemented with XMPP and TCP long connection. However, current XMPP servers, which are usually designed in the traditional concurrent model, can hardly deal with such large number of concurrent connections due to their limited performance. In this paper, we propose a new XMPP system design with the Actor model, and develop a decentralized message routing algorithm based on consistent hashing, to achieve better concurrency, scalability and efficiency. The experiment results show that our system overperforms a popular open source XMPP server in the scenarios of high concurrency.

    • Cross-Platform Transmission System for Analog WSN Based on Arduino

      2015, 24(10):68-73. CSTR:

      Abstract (1471) HTML (0) PDF 1.09 M (2577) Comment (0) Favorites

      Abstract:The cross-platform transmission system for analog WSN based on Arduino is different data model generated by Arduino controller. And it sends these data to service agent via ZigBee wireless transmission, then transfers to specified server for storage. The network test platform will read the stored data in server and display in real time. Also the network test platform can achieve remote control by sending instructions. All the experiments and data transmission analyses indicated that the system has strong-time capability, high precision and easy handling. And the system can be widely used in security, medical treatment, and industrial automation and so on.

    • Middleware of Database System Fragmentation

      2015, 24(10):74-79. CSTR:

      Abstract (1380) HTML (0) PDF 1.04 M (2720) Comment (0) Favorites

      Abstract:As the successively implementation of State Grid's information system first-degree deployment, the tables in database become much more than before, the datas in table become very large. Massive data storage and access caused considerable load on the database, data processing capacity and access encounter bottlenecks. The amount of data is growing rapidly based on State Grid first-degree deployment, this paper proposed data fragmentation middleware UAPDS (UAP DB Sharding) technology. UAPDS provides multiple split solutions, such as separated of reading and writing, divided into multiple tables in a database or in multiple databases, by router, partition, shard three layer split mode, the data cut into different databases or tables according to certain rules, effectively relieve the pressure on the database, improved the efficiency of data access, achieved better in the practical application effect.

    • Visual Web Designer

      2015, 24(10):80-84. CSTR:

      Abstract (2041) HTML (0) PDF 953.89 K (3290) Comment (0) Favorites

      Abstract:This paper describes design ideas, architecture and implementation techniques of a kind of visual Web designer VWD (Visual Web Designer). VWD consists of five parts: interactive interface description language based on IFDL, a pattern extraction method, a interface prototype designer based on browser, a visual Web design based on Eclipse plug-in, a compiler engine. Interactive interface description language defines reusable Web structure. Pattern extraction methods describe the schema definition and extraction mode. VWD accelerated interface prototyping application's needs to be quickly identified. Eclipse plug-in based designer facilitates docking and debugging in data models services facilitates collaborative development by separating frontend from backend. Application examples and assessments indicate that VWD improved application development efficiency.

    • Real-Time Web Video Monitoring Based on Vert.x

      2015, 24(10):85-89. CSTR:

      Abstract (1527) HTML (0) PDF 937.23 K (3035) Comment (0) Favorites

      Abstract:With the rapid development of mobile internet and popularity of mobilephone, human increased demand for multimedia applications. Vert.x framework is the best solution to meet the need of high concurrent mobile client connection request processing and multimedia application with large amount of video or audio transmission. The new kind of mobile web video monitoring system was developed with the Vert.x, HTML 5 and jQuery, and the paper mainly descripts the implementation technology, architecture design and system programming.

    • Video Data Private Cloud Storage System

      2015, 24(10):90-94. CSTR:

      Abstract (2077) HTML (0) PDF 981.71 K (2946) Comment (0) Favorites

      Abstract:Introduction of a criminal investigation of video surveillance system based on cloud computing architecture, and one of the cloud storage strategies for a special design and modeling. The explosive growth of unstructured data trend, the traditional storage technologies in throughput scalability and ease of management and other aspects need to be improved, in order to cloud storage and storage system reliability theory, the establishment of a distributed storage model for unstructured data. By analyzing forensic video data storage problems, with cloud storage technology to store forensic video data can be stored in the mass privatization of the read-only forensic video data on inexpensive untrusted nodes and provide efficient and reliable access. Relative to the centralized storage, the new system has high availability. Simulation results show high reliability and easy storage expansion, the distributed storage system can be applied dynamically open computing environment, providing high performance cloud storage service.

    • Control System of a Substation Live Water Flushing Working Mobile Robot Based on the Tip-Position Algorithm of Mechanical Arms

      2015, 24(10):95-99. CSTR:

      Abstract (1355) HTML (0) PDF 1.10 M (2577) Comment (0) Favorites

      Abstract:In order to solve the problem of artificial water flushing equipment of Substation, this paper introduces a new live water flushing working mobile robot of substation and its open control system architecture. Firstly, it introduces the overall design of the live water flushing working mobile robot of substation, and then gives its open control system architecture. The live water flushing working mobile robot of substation uses open control system based on PC, touch screen and motion controller, so it can improve the openness and interaction performance of the control system; And control system based on the idea of hierarchical control is divided into three levels including the organization level, the coordination level and the execution level, so ensures the real-time work of motion control algorithm and the coordination of each subsystem through the cooperation of each layer.

    • Distributed Hotline Recording System for Digital Director

      2015, 24(10):100-105. CSTR:

      Abstract (1809) HTML (0) PDF 1.48 M (2356) Comment (0) Favorites

      Abstract:Hotline is not only the important way for the radio station to give radio broadcast and the audience to participate in the programs, but also the important form of live broadcast. At present, most of the radio station used the traditional phone coupler which is used to realize the hotline access and transfer. As the broadcast station payed more and more attention to the hotline programs, the hotline is more and more important, phone coupler equipment is difficult to meet the business requirements of radio station, so digital director system applications. The traditional hotline recording system used server to realize voice recording function. So it need high-performance server. The destruction of the Server's hardware will cause the loss of the whole file resources which is saved for hotline recording. In order to improve these deficiencies, through the analysis and study of the characteristicsof the hotline recording, the author designed the distributed hotline recording system. We used the modular design method, designed the distributed architecture. The recording system is based on the hardware sound card. The system can reduce the server load and ensure the safety of the recording files. This paper intends to design a distributed hotline recording system by the combination of theory and experiment.

    • 802.11n Ad-hoc Communication Terminal

      2015, 24(10):106-110. CSTR:

      Abstract (1593) HTML (0) PDF 900.54 K (2944) Comment (0) Favorites

      Abstract:Wireless Ad-hoc networks do not need any infrustrature, and the terminals can establish network by themselves. Therefore, they have broad prospective applications in military, disaster rescue and other scenes. However, in the market so far there are no such kinds of products that can meet the demand of broadband communications. This paper presents a new wireless Ad-hoc terminal prototype developed by the autors' research team. It uses Samsung S3C2440 ARM9 processor as main controller and Ralink RT3070 IEEE 802.11n wireless module as air interface. The device has the functionality of text, voice and video transmissions, as well as other functions.

    • Novel Moving Target Detection Algorithm Based on Improved Difference between Frames and Optical Flow

      2015, 24(10):111-115. CSTR:

      Abstract (1318) HTML (0) PDF 1.01 M (2384) Comment (0) Favorites

      Abstract:To overcome cavities and false targets in moving target detection, a novel moving target detection algorithm based on difference between frames and optical flow is presented. Firstly, image preprocessing, difference, gray-scale transformation and binarization are carried out on seven successive images. And the first and the last three frames among the obtained binary images are summed respectively, then logic operation is done on the two accumulations to get rough area of the moving target in the intermediate frame. Then, difference is done between intermediate frame and background frame, and image edge extraction, binarization and arithmetic operations of pixels are operated on the processed frame to obtain accurate area of the moving target in the intermediate frame. Based on what is said, the moving target accurate information is obtained by the improved optical flow method. Finally, threshold segmentation and morphological processing is completed to extract the target. Comparative experiments indicate that the proposed method can detect and segment the moving target accurately and fastly.

    • Machine Code Translation Based on Pattern Matching

      2015, 24(10):116-121. CSTR:

      Abstract (1432) HTML (0) PDF 958.27 K (2418) Comment (0) Favorites

      Abstract:Machine code translation converts machine code into assembler code, commonly used in disassembly, debugging, virus analysis and other fields. Machine code translation is based on a series of tables which are used as the description of the instruction set, including the instruction set format table, the op-code table, the addressing table, and so on. Traditional translation methods query these tables step by step to find the corresponding assembly code. Traditional methods are usually slow because of the complexity of table look-up process. This paper proposes a method based on pattern matching. By simplifying the table look-up process, the speed of the machine code translation to some extent. And at the same time, it's much easier to develop and maintain the translation program by this method.

    • Link-Layer Topology Discovery Algorithm under Dynamic Networking Environments

      2015, 24(10):122-128. CSTR:

      Abstract (1145) HTML (0) PDF 1.37 M (2431) Comment (0) Favorites

      Abstract:Complete and accurate network topology is the basis for the network management. With the increasing diversity, transparency, dynamics of the link layer devices, discovering the link-layer network topology becomes increasing challenging. Existing works on link-layer topology discovery is based on the assumption that the network is static without mobile devices. However with popularity of wireless access, there are more and more mobile devices, making the network more and more dynamic. In this paper, we propose an algorithm for discovering the link-layer topology under dynamic networking environments. Simulation experiments on ns-3 and the real-world networking topology measurement results indicate that our algorithm could exclude the impact of mobile devices and discover the linker-layer topologies efficiently and accurately.

    • Document Combination Based on the Mashup

      2015, 24(10):129-135. CSTR:

      Abstract (1562) HTML (0) PDF 1.21 M (2100) Comment (0) Favorites

      Abstract:With the development of cloud computing services, people demand for huge amounts of document resources from the Internet growing. It becomes a research hospot that how to quickly and efficiently merge document elements or context from different sources to a new document. Based on the above requirements, this paper puts forward a kind of document combination scheme based on Mashup. Through constructing the Mashup server, we put the document resources which come from the different domain into the new XML file. And according to users' requirements, the orchestration of the document after the combination with DITA system design into a set of output in the form of different output. Finally, we through a medical electronic health records to verify the document combinationscheme based on Mashup.

    • Resource Scheduling Based on Particle Swarm and Differential Genetic Algorithm in Cloud Computing

      2015, 24(10):136-141. CSTR:

      Abstract (1105) HTML (0) PDF 1.09 M (2355) Comment (0) Favorites

      Abstract:Resource scheduling in cloud computing has long been the focus of research. In this paper, particle swarm algorithm is introduced into the cloud computing and aiming at the shortcomings of this algorithm like fast local convergence and being easy to fall into local optimal value. Two improvements are made in this paper: one is to introduce differential genetic algorithm into particle swarm algorithm while finding the optimal solution, which can not only give play to particle swarm's advantage of quick global searching speed, but also give play to differential genetic algorithm's advantage of efficient local researching while combining the advantages of these two algorithms and making up for the deficiency of particle swarm algorithm. Another is to introduce penalty function so as to avoid particles moving towards void space and save costs of moving. Cloudsim platform shows that algorithm in this paper can effectively meet resource scheduling in cloud computing while having great improvement in reducing time of completing the task as well as consumption of costs so as to provide a reference for resource scheduling in cloud computing.

    • SIMD Algorithm Based on Tree Matching for Multi-cluster and VLIW DSP

      2015, 24(10):142-147. CSTR:

      Abstract (1189) HTML (0) PDF 1.75 M (2293) Comment (0) Favorites

      Abstract:BWDSP is a new type of processor designed for high performance computing, using multi-cluster VLIW structure and SIMD architecture, including a rich instruction set. In order to make full use of the resources of BWDSP, a SIMD algorithm is to be proposed. In this paper, an algorithm for DSP SIMD compiler optimization based on open64 infrastructure is studied and implemented. This algorithm is based on WHIRL intermediate language of Open64 and can make full use of rich hardware resources and vector instruction set. The experimental result shows that the vectorization algorithm achieves 6 times performance improvement for double-word vectorization and 4 times performance for single-word vectorization on average.

    • Dynamic Hand Gesture Tracking and Recognition Based on TLD and DTW

      2015, 24(10):148-154. CSTR:

      Abstract (1247) HTML (0) PDF 1.13 M (3306) Comment (0) Favorites

      Abstract:For lack of stability in dynamic hand gesture tracking and low recognition efficiency, a hand gesture tracking and recognition framework is proposed based on TLD and DTW algorithm. First, the hand gesture area is got with a Haar features based classifier. Then the gesture trajectory is obtained by using the TLD tracking algorithm initialized by the hand area. Finally, features are extracted from the trajectory and the improved DTW algorithm is used to recognize the dynamic gesture. Experiments show that the framework can track the hand gesture stably for a long time and be able to improve the recognition speed greatly under the premise of ensuring high recognition accuracy.

    • Memetic Non-dominated Sorting Particle Swarm Optimization Algorithm for Solving the Multi-objective Flexible Job Shop Scheduling Problem

      2015, 24(10):155-161. CSTR:

      Abstract (1214) HTML (0) PDF 1.04 M (2313) Comment (0) Favorites

      Abstract:In this paper, a memetic non-dominated sorting particle swarm optimization algorithm is proposed for the discrete flexible job shop scheduling. Shorting the production period, reducing the machine idle time and improving the product qualification rate are the algorithm's optimization objectives. This algorithm adopts two-dimensional coding method. First, a multi-objective discrete resources optimization scheduling model is established by different mutation operation for the process and the machine allocation. Then, the Pareto optimal solution is obtained using the non-dominated sorting strategy and the random walk method. Besides, using the analytic hierarchy method, the resource optimal allocation scheme is given. Finally, the actual production data is used for simulation. The result shows that the proposed optimization algorithm can balance the global search and the local exploitation abilities.

    • I/O Security Mechanism for Microhypervisor Based Virtualization Architecture

      2015, 24(10):162-168. CSTR:

      Abstract (1189) HTML (0) PDF 1.10 M (2285) Comment (0) Favorites

      Abstract:Micro-kernel based virtualization architectures such as NOVA solves the problems of large trusted computing base and attack surface in most macro-kernel based virtualization systems. However, NOVA lacks of protections for the virtual machines of different security levels separately. Also, it lacks of access control mechanisms of the virtual machines to the I/O resources. In this paper, we propose the concept of security regions and introduce a way to divide virtual machines into several security regions, upon which the I/O resources access control mechanism is built. To implement I/O resource access control between different security regions, this mechanism adds an access control module to the key code path between the virtual machine monitor to the I/O services. The experiments show that when promoting the isolation and safety of data, it only impacts the performance of CPU bound tasks and I/O bound tasks slightly.

    • Binding Sites Prediction Method Based on Structural Alignment

      2015, 24(10):169-175. CSTR:

      Abstract (1532) HTML (0) PDF 1.09 M (4190) Comment (0) Favorites

      Abstract:Proteins interact with other molecules through binding sites, so it is significant to identify protein binding sites. Although there are different computational methods for the identification of binding sites, the existing prediction methods have problems of low hit rate or large computation. In this paper, a binding sites prediction method based on structural alignment is introduced. In the process of structural alignment, homologous index is applied to screening out homologous templates, with which query chains are aligned, and then the ligands in similar structure templates are mapped onto the query chains. Clustering method is used for analysis of sites. The result indicates that reduced computation and improved prediction accuracy, compared with other prediction methods, can be obtained through our method.

    • Novel Immune Effectiveness Balancing Task Scheduling Algorithm Based on User and Resources Constraints in Cloud Computing Environment

      2015, 24(10):176-180. CSTR:

      Abstract (1078) HTML (0) PDF 890.84 K (2331) Comment (0) Favorites

      Abstract:To deal with problems for task scheduling in cloud computing, this paper proposes a immune effectiveness balancing task scheduling algorithm. The proposed algorithm is modeled as a multi-objective optimization model, taking into account the time span of tasks and load balancing of virtualized resources. The simulation result shows that the proposed algorithm is efficient to improve user satisfaction and reduce the completion time of the task.

    • Service Priority Software Router Based on Click System Computing Environment

      2015, 24(10):181-185. CSTR:

      Abstract (1204) HTML (0) PDF 1.07 M (2572) Comment (0) Favorites

      Abstract:In the cloud computing environment, the use of software component become an important part for forwarding inside-network packets. Click is a modular software router and can be very goodly accessed to any network. By extending its modules, click router can achieve any complicated scheduling strategy. This thesis researches on how to design and implement a priority-based forwarding router and use it in the cloud computing environment. In the event of multiple service request at the same time, the router can forward these packets by priority. This method is used to solve the problem of important service with slow response time.

    • Facial Expression Recognition Method Based on One-Against-One Extreme Learning Machine

      2015, 24(10):186-190. CSTR:

      Abstract (1576) HTML (0) PDF 936.00 K (2538) Comment (0) Favorites

      Abstract:By using a vote of one-against-one Support Vector Machine advantages of high classification algorithm accuracy, an improved expression recognition method was proposed in order to modify the Extreme Learning Machine's disadvantage of bad stability and poor classification accuracy. The method combines one-against-one classification algorithm with Extreme Learning Machine, which are consist of a new algorithm-OAO-ELM. First, the algorithm uses the ELM process classification as weak classifier when training sample by one-against-one. Then, these weak classifiers are combined into the finally strong classification. Prediction the results of classification, by votes to the class. Gabor facial expressional features, since the high-dimensional Gabor features are redundant; The dimensional principal component analysis is used to select these features. Experimental results based on the JAFFE database show that it obtains higher accuracy and better stability.

    • Integrated Entropy Weight on Hierarchical Topology Security Assessment Profile

      2015, 24(10):191-196. CSTR:

      Abstract (1830) HTML (0) PDF 962.81 K (2573) Comment (0) Favorites

      Abstract:This paper proposed a Hierarchical Topology Security Assessment Profile (HTSAP), and based on that designed a security assessment in the process of risk factors for weight algorithm. This algorithm improved the traditional AHP by the introduction of the concept of entropy weight method and correction. In the process of practical application its calculation result is more reasonable, and lays a good foundation for the network security situation assessment.

    • Optimization Approach for Virtual Machine Images Placement Based on QoS

      2015, 24(10):197-203. CSTR:

      Abstract (1712) HTML (0) PDF 1.02 M (2429) Comment (0) Favorites

      Abstract:With the rise of cloud computing, virtualization technology application is becoming more and more prevalent. How to manage them efficiently and economically has become an important problem. This paper proposed an approach which optimizes the placement of virtual machine images based on QoS. It analyzed the revenue of the storage service constrained by QoS and optimized the strategy of images placement. Experiments show that this approach can meet the constraints of user's QoS and improve the revenue of storage effectively.

    • Energy-efficient Real-time Scheduling Based on Multidimensional Limitation in Multi-core Systems

      2015, 24(10):204-211. CSTR:

      Abstract (1440) HTML (0) PDF 1.01 M (2933) Comment (0) Favorites

      Abstract:This paper introduces the multidimensional-limitation-based challenges for multi-core systems such as practical limitations of processor, preemptive scheduling and parallel task model. To solve this problem, it discusses the energy-efficient real-time scheduling strategies based on the practical multidimensional models including the processor overhead model and limited-preemptive model and complex parallel task model, and provides an theoretical and technical reference for the application of multi-core systems to real-time embedded field.

    • Capsule Image Segmentation Algorithm Based on Region Feature

      2015, 24(10):212-216. CSTR:

      Abstract (1695) HTML (0) PDF 878.88 K (1918) Comment (0) Favorites

      Abstract:For the image segmentation effect is not ideal in capsule defect detection, a segmentation algorithm of capsule image based on region feature is proposed. First, the original image is divided into 5 sub images, and then capsules are extracted from sub images. First of all, sub-image is removed highlight and noise, then put each row of image region as a sub-region, according to the characteristics of the capsule position in image region, find the boundary of capsule and non-capsule region and remove non-capsule region by judging whether exist boundary points between chain plate and background or not and whether capsule is connected with sprocket or not. Finally the capsule is extracted from sub-image after scanning the sub-image region line by line. Experiments show that the algorithm is fast and its accuracy and robustness are improved noticeably.

    • Attribute Reduction of Bank Customer Information Algorithm Based on Quick Ant Colony Optimization

      2015, 24(10):217-221. CSTR:

      Abstract (1554) HTML (0) PDF 851.61 K (2218) Comment (0) Favorites

      Abstract:As bank customer segmentation has a profound significance for business marketing, while customer information has the characteristics of large amounts of data high dimensions and frequently-changing demand, we need to introduce a fast algorithm for attribute reduction to meet the needs of rapid attribute extraction to construct decisions. This paper proposes a new quick attribute reduction based on ant colony optimization by improving the collection for each iteration of the ant search transfer strategy. Numerical experiments on a number of UCI datasets show that the proposed new algorithm has a lower computational cost than the traditional ant colony-based attribute reduction algorithm and a better solution quality. Finally, the feasibility of the proposed algorithm is verified through the use of the bank customer data.

    • Online Shopping Preference Analysis of Campus Network Users Based on MapReduce

      2015, 24(10):222-226. CSTR:

      Abstract (1310) HTML (0) PDF 921.87 K (3527) Comment (0) Favorites

      Abstract:A method for online shopping preference analysis based on MapReduce is proposed in this paper. The campus network traffic is analysed using MapReduce model, in which the features of users online shopping behavior is extracted by four MapReduce jobs combined with deep packet inspection (DPI). Making use of those features occuring in different E-commercial websites and with the help of the product information database established by a web crawler, user online shopping conversion rates of E-commercial websites and category of purchased product are analysed and preference analysis results are presented.

    • Routing Protocol Based on Virtual Channel Multipath Fusion for Cognitive Radio Networks

      2015, 24(10):227-232. CSTR:

      Abstract (1382) HTML (0) PDF 1.12 M (2514) Comment (0) Favorites

      Abstract:A routing algorithm based on virtual channel multipath fusion for cognitive radio networks(CRN) was proposed to resolve the problem of dynamic, time-varying and diversitys of pectrum in cognitive radio networks and node mobility. In the process of route setup, in order to solve the problem of source node and destination node channel synchronization, source node broadcast request routing(RREQ) which add virtual channel on control channel, if intermediate node's current channel equal to virtual channel, forwards RREQ.Destination node fuse multiple paths through the channel switch, to avoid PU activity area, reduce the path hop, improve the stability of the link.In the routing maintenance phase, predict node movement speed through Kalman filter and start the routing repair to repair broken link. NS2-based platform CRCN Simulator's simulation results show that the algorithm in the stability of the communication link, packet delivery ratio, throughput, end-to-end delay have obvious improvement, improve the overall performance of the network.

    • Fisher Kernel Construction Method Based on Gaussian Distribution

      2015, 24(10):233-237. CSTR:

      Abstract (1217) HTML (0) PDF 908.75 K (2465) Comment (0) Favorites

      Abstract:Based on the actual application background and the supervised learning situation in which samples of each class comply with Gaussian distribution, we propose a new method for Fisher kernel construction. With the help of classification information in the sample, this method use maximum likelihood estimation rather than EM algorithm to estimate the GMM parameters, which can effectively reduce the time complexity for Fisher kernel construction. A simulation experiment on standard face database shows that the above-mentioned method combined with Fisher kernel classification can not only reduce the time complexity of fisher kernel construction, but also exceed the traditional Gaussian kernel and polynomial kernel in terms of recognition rate. The study of this method will benefit the application of Fisher kernel from speech recognition to image recognition.

    • Pedestrian Detection Technology Based on Features Fusion

      2015, 24(10):238-242. CSTR:

      Abstract (1395) HTML (0) PDF 1013.70 K (2477) Comment (0) Favorites

      Abstract:First of all, we studied three different types of feature operators in the application of image-based pedestrian detection. They are Histogram of Oriented Gradient(HOG), Local Ternary Patterns(LTP) and the Sqrt Local Ternary Patterns(S-LTP). Through conducting experiments to compare these three feature operators, we combined the algorithms of HOG and S-LTP and proposed a new human detection feature operator named HOG+S-LTP. Finally, by using a linear SVM as the classifier, we compared the new feature with the other single features in INRIA person dataset. Results of experiments showed that the new combined feature operator significantly improves the pedestrian detection rate, and it also meets real-time requirements.

    • Application of an Improved BP Neural Network Algorithm in Water Quality Monitoring

      2015, 24(10):243-247. CSTR:

      Abstract (1390) HTML (0) PDF 1.16 M (2117) Comment (0) Favorites

      Abstract:This paper proposes an identification for a class of MIMO system. Taking "A simulation of the western basin of Lake Erie" as an example, quality characteristics of water system is analyzed and mathematical models of Lake Erie is made in this paper. An optimized BP ANN model is used for this MIMO system and the MATLAB's NNT is used to carry on data processing. The effectiveness of system identification is inspected by the curves between models' output and actual results. The comparison between traditional and optimized BP ANN is given at the end of this paper. In this paper data collected under different noises is compared to study on the effect of white noises on ANN.

    • Privacy Data Preservation of Multi-tenancy Based on Trusted Computing

      2015, 24(10):248-252. CSTR:

      Abstract (1329) HTML (0) PDF 883.65 K (2680) Comment (0) Favorites

      Abstract:To address the problem of privacy data preservation of multi-tenancy applications, on the basis of analyzing characteristics of multi-tenancy applications and the corresponding demands of privacy data preservation. The trusted computing technique was introduced into privacy data preservation of multi-tenancy, presented an encryption and preservation approach with customizability based on virtual trusted platform module(vTPM). Privacy data of multi-tenant was encrypted by making use of encryption key provided by vTPM, and the encryption key was protected by using encryption key preservation and management of vTPM. Finally, the approach was implemented based on the Xen implementation vTPM.

    • Application of Improved Sequential Pattern mining in Hospital Referral

      2015, 24(10):253-258. CSTR:

      Abstract (1201) HTML (0) PDF 1017.23 K (2108) Comment (0) Favorites

      Abstract:In order to analyze the patients' referral behavior pattern among different hospitals, the sequential pattern mining algorithm can be applied. Apriori-like algorithm is the classical algorithm in the sequential pattern mining, but there are some deficiencies, such as generating too many candidate sequences and scanning the database too often. To solve such problems, this paper has proposed some measures for improvement, including using a new pruning strategy and reducing the unnecessary scans of the database. The experiments prove that the improved algorithm performs more efficiently in the frequent referral sequence mining.

    • Gesture Control Research Based on Leap Motion

      2015, 24(10):259-263. CSTR:

      Abstract (1489) HTML (0) PDF 938.93 K (6149) Comment (0) Favorites

      Abstract:The latest somatosensory device Leap Motion detects dynamic gesture to provide users a new experience, such as the somatosensory games, virtual playing, volley painting and other non-contact human-computer interaction. Firstly, this paper focuses on the technology characteristics of Leap Motion and compares with another similar device, then introduces some applications based on Leap Motion and prospects for development. This paper analyzes the theory and technology of Leap Motion, and defines the gesture control technology based on Leap Motion. Finally, this paper gives a specific example of gesture control virtual objects in the scene movement based on Unity 3D, which makes a detail introduction about the implementation of gesture control techniques using Leap Motion.

    • Process of ETL Application Migration to Server Localization on Bank Information Management System

      2015, 24(10):264-270. CSTR:

      Abstract (1237) HTML (0) PDF 1.32 M (2653) Comment (0) Favorites

      Abstract:In this paper, we describe a migration process of ETL system to localized server environment in a large state-owned bank branch. Using technologies of data separation based on application domain and data synchronization based on views/materialized views, data, data synchronization, Synonym, we mainly accomplish the process of migrating branch-related data from imported server environment to localized server environment. In this process, the cause of data incorrectness during application migration is found, which arises from insufficiently support of commercial database system to temporal data. This problem makes it difficult to develop programs to check data synchronization result. In the actual process of migration, through the corresponding measures to ensure that we successfully completed the migration process.

    • Implementation of Edge Detection Algorithm in FPGA

      2015, 24(10):271-275. CSTR:

      Abstract (1761) HTML (0) PDF 1.45 M (2835) Comment (0) Favorites

      Abstract:Edge detection algorithm is the most common image processing algorithms. The principles of two kinds of edge detection algorithm-Prewitt operator and Sobel operator are analyzed. The DSP design of the image edge detection algorithm is completed by using DSP Builder tool in a friendly environment MATLAB/Simulink. And then the design is implemented directly in FPGA. It can shorten the image processing time with the capability of parallel process by using FPGA to process image.

    • Weixin Mobile Receiving Alarm System

      2015, 24(10):276-280. CSTR:

      Abstract (1187) HTML (0) PDF 1.39 M (2749) Comment (0) Favorites

      Abstract:The integrated solutions of send alarm by weixin APP & province unified receive alarm & linked process alarm by three call in one system is proposed in this paper, and verified the feasibility study and the system model implementation.Alarm service by weixin is mainly by means of weixin public receipt number, based on weixin open platform and mobile network communication technology, and the event of linked process will raise by pushed information. Alarm by Weixin is an effective way and easy to accepted by most people for simple and easy to use.

    • Development of Automatic Test and Analysis System Based on WAP

      2015, 24(10):281-283. CSTR:

      Abstract (1256) HTML (0) PDF 907.84 K (2242) Comment (0) Favorites

      Abstract:In order to realize the high test accuracy and automaticity of WAP page in mobile terminal, the automatic test and analysis system based on WAP, which consists of control end(Eclipse), test end (Firefox) and analysis end (Showslow), is proposed for easier problem search. Through simulated on a PC access to the WAP website, this system can eliminate the influence factors caused by network and terminal performance. At the same time, the automatic execution to ensure every operation steps were the same, but also reduces the labor burden. Finally, based on the detailed data acquisition from the system proposed is convenient to facilitate the optimization of WAP performance.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063