• Volume 25,Issue 6,2016 Table of Contents
    Select All
    Display Type: |
    • >Survey
    • Review on the Methods and Applications in Cultural Computing

      2016, 25(6):1-8. DOI: 10.15888/j.cnki.csa.005206 CSTR:

      Abstract (2055) HTML (0) PDF 680.67 K (6879) Comment (0) Favorites

      Abstract:Cultural Computing is the application of computation and related techniques to the field of culture, to explore its rules of development, to point out the internal connections, or to make a visual analysis and display. Therefor, it plays an important role in the data mining, protection, inheritance and development of culture. This paper makes a simple introduction to Cultural Computing. Firstly, starting from the connotation of cultural gene and using culturomics as the theory, it summarizes the development history and the evolution, introduces some articles that use similar ideas to expand the theory of Cultural Computing, and simply compares some different methods of Cultural Computing. Then, presents the main research contents, including cultural gene which plays as essential information mode, cultural quantification and visualization analysi of big data application methods, which tells how they can get a quantified and scientific research on culture. Finally, the paper uses examples to introduce Cultural Computing more clearly, and has a outlook on it.

    • Review on the Shopping Technology Based on Image Retrieval

      2016, 25(6):9-16. DOI: 10.15888/j.cnki.csa.005173 CSTR:

      Abstract (1555) HTML (0) PDF 858.33 K (4107) Comment (0) Favorites

      Abstract:Traditional electronic commerce websites mainly use the key words of commodity to search for goods. However, text information can't describe all the characteristics of the commodity, and can cause subjectivity of human operation. The image retrieval technology based on content provides a new opportunity for the development of electronic commerce website by extracting the visual features of the images. This thesis combs the researches on the shopping technology based on image retrieval, summarizes research status, analyses the principle, and puts forward future trend.

    • News Topic Detection on Chinese Microblog Based on Rough Set and Word Co-Occurrence

      2016, 25(6):17-24. DOI: 10.15888/j.cnki.csa.005155 CSTR:

      Abstract (1492) HTML (0) PDF 1.45 M (2600) Comment (0) Favorites

      Abstract:Traditional word co-occurrence detection methods in microblog news encounter the problems of high computational complexity, high time consuming, low recall rate and low precision. An improved algorithm of word co-occurrence detection based on rough set is proposed in this paper aiming at solving these problems. It builds a word co-occurrence matrix through word co-occurrence relation, and finds out the maximum complete subgraph as topic cluster center via co-occurrence matrix, finally identifies each topic keyword set using the rough set theory. The experimental results carried out on the microblog content corpus of NLPIR and the real-time collection of microblog data set verify that this method can effectively detect news topic from the massive microblog information and realize the news topic tracking.

    • Variation Simulation of Dynamic Cloud Uutsourcing Service Providers Competitiveness

      2016, 25(6):25-32. DOI: 10.15888/j.cnki.csa.005168 CSTR:

      Abstract (1369) HTML (0) PDF 830.02 K (2021) Comment (0) Favorites

      Abstract:Firstly, the paper analyzes the competitiveness factors of cloud outsourcing service providers from two perspectives of both static and dynamic, it is important for responsing to external change of brutal competition in the market. And it proposes the dynamic evaluation model of cloud outsourcing service providers competitiveness and selection methods. The cooperative behavior among outsourcers is simulated by using netlogo to analyze supplier competitive changes characteristics and environmental constraints, it helps cloud outsourcing service providers to improve their competitiveness, and it provides a reference in the long-term viability of emerging industries.

    • Equipment Dispatch and Task Assignment for an Autonomous-Steerable-Vehicle Storage and Retrieval System of a Warehouse

      2016, 25(6):33-39. DOI: 10.15888/j.cnki.csa.005189 CSTR:

      Abstract (1318) HTML (0) PDF 1017.02 K (2212) Comment (0) Favorites

      Abstract:An autonomous-steerable-vehicle storage and retrieval system is a new storage conception, which has high space utilization and can dispatch its equipments flexibly. To achieve efficient and low-cost operations, the equipment dispatch and task assignment should be designed according to the requirements of the warehouse. In this paper, the inbound and outbound processes of the autonomous-steerable-vehicle storage and retrieval system are modeled as queue networks, which include several service centers. The equipments in each service center are dispatched to ensure the steady state of the system. A fuzzy controller based on the expected time of handling palletized units is designed, which can assign the palletized units to the optimal lifters in inbound and outbound process. In this method, the number of forklift can be reduced due to the reduction of the handling distance in the inbound and outbound processes, so that it decreases the operation cost and heightens the operation efficiency. At last, an example simulation of inbound process is shown to verify the validness of the method in the task assignment.

    • Planning and Design of Cloud Computing Field Consultation Platform

      2016, 25(6):40-43. DOI: 10.15888/j.cnki.csa.005193 CSTR:

      Abstract (1307) HTML (0) PDF 1.58 M (2109) Comment (0) Favorites

      Abstract:The consultation platform with integrated applications, based on cloud computing, big data, and the internet of things, is geared to the needs of the agriculture industry in drought areas of Northwest China. It utilizes multi remote sensing facilities such as satellites, UAVs unmanned aerial vehicles and the ground sensor networks to monitor and control land leveling and water fertilization devices in order to build a comprehensive and operational business consultation platform that is accurate in monitor and control, supportive in remote spacial decision, feasible in providing plenty of agricultural information. The consultation platform with integrated applications provides various of services such as business consultation, water and fertilizer management, diseases diagnosis, prevention and treatment, forecast of drought and issue of agriculture remote sensing information.

    • Home Health Tracking System for Smart Healthcare

      2016, 25(6):44-47. DOI: 10.15888/j.cnki.csa.005204 CSTR:

      Abstract (2086) HTML (0) PDF 722.11 K (3030) Comment (0) Favorites

      Abstract:Smart Healthcare is one of the key application fields for the Internet-of-Thing technologies, and home health tracking system is an important component for the realization of it. Based on the open source hardware platform Raspberry Pi and Arduino, this paper designs and implements a home healthcare tracking system. It uses Arduino to collect the physical health data from sensors and transmit the data with Bluetooth, then the collected data is analyzed in QT on the Rasperry Pi platform. Finally, the analyzed health status result is visualized in an LCD screen. We verified the feasibility and effectiveness of the system through the implementation of a prototype system and the extensive test based on it. The home healthcare tracking system is simple to use, extensible and of low cost, which is the solid basis for the realization of smart healthcare.

    • Network Bandwidth Guarantee System Based on SDN

      2016, 25(6):48-52. DOI: 10.15888/j.cnki.csa.005221 CSTR:

      Abstract (1707) HTML (0) PDF 754.76 K (4143) Comment (0) Favorites

      Abstract:Traditional data center network has difficulty in guaranteeing the network bandwidth requirements of specified services. By developing network bandwidth guarantee services in Floodlight controller and designing client software using MVC (Model View Controller) pattern, the network bandwidth guarantee system based on SDN (Software Defined Network) is designed to enable users to monitor the network status real-timely and schedule the bandwidth guarantee strategies flexibly. Through the tests in the virtual network environment which is created by Mininet, the results show that this system can monitor the network status real-timely, schedule bandwidth guarantee strategies flexibly and then guarantee the bandwidth requirements for specified services in the network accurately and effectively.

    • WSN's Real-time Monitoring System Based on IaaS Cloud Platform

      2016, 25(6):53-58. DOI: 10.15888/j.cnki.csa.005184 CSTR:

      Abstract (1515) HTML (0) PDF 956.75 K (2438) Comment (0) Favorites

      Abstract:Based on USTC'S IaaS cloud platform, this paper designs and implements WSN's real-time monitoring system. The 6LoWPAN is used to build wireless self-organized sensor network, and each sensor node in system transmits data collected by sensors to sink node, then the sink node sends data to the server on USTC's cloud platform through network to record and analyze. In this paper, we adopt Nginx as a web server, and the non-real-time and real-time data is handled by uWSGI application server and Tornado application server respectively. The WebSocket technology is used to achieve real-time data transmission which improves the performance of system in real-time. The test results show that this paper has a certain guiding significance for the construction of real-time monitoring system with good reliability and flexible deployment.

    • Control System Design of the Six Legged Robot Based on AVR and STM32

      2016, 25(6):59-63. DOI: 10.15888/j.cnki.csa.005178 CSTR:

      Abstract (2129) HTML (0) PDF 877.05 K (2856) Comment (0) Favorites

      Abstract:In this paper, a control system based on Arduino is designed. The control system takes ATmega328P as the master control chip, STM32F103C8T6 as the slave computer control chip, and the communication is realized through the serial port mode. The advantages of the two control chips are integrated. This paper introduces the design scheme of the control system from two aspects: hardware and software. The real experiments demonstrateed the bionic six legged robot can achieve automatic posture adjustment ability, stable walking, and reliable obstacle avoidance ability. The content of this article can provide reference for the research work in the relevant fields.

    • Detection Method of Spray Angle for Transient Fuel Sprays of GDI Fuel Injector

      2016, 25(6):64-68. DOI: 10.15888/j.cnki.csa.005186 CSTR:

      Abstract (2390) HTML (0) PDF 745.86 K (2485) Comment (0) Favorites

      Abstract:Fuel injector is the key part of automobile engine and its spray characteristic is an important factor influencing the performance of its work. The spray angle of fuel injectors is one of the most important parameters in the spray characteristic, and needed to measure in the detection of fuel injector performance. General method of measurement is collecting multiple injections of fuel by patternation, but it is poor accuracy and efficiency. And for gasoline-direct injection injectors, the mass lost to vapor can be very substantial, so lead to measurement errors for unable to collect fuel spray completely. Using machine vision technology can detect the spray angle, and using high-speed cameras to capture the injectors spray image, whose shadow can be eliminated by the microsecond exposures for ensuring the quality of spray image. Then the spray angle gets image preprocessing, image segmentation, and calculation. Experimental results show that this method can detect fuel injector spray angles quickly and accurately, and successfully applied to the injector measuring test-bed developed by research group.

    • Unified Communications Conference for mobile Internet

      2016, 25(6):69-74. DOI: 10.15888/j.cnki.csa.005207 CSTR:

      Abstract (1662) HTML (0) PDF 921.03 K (1822) Comment (0) Favorites

      Abstract:Unified communication is a communication mode which uses computer technology and traditional communication. Using of advanced technology to break the current communication method to equipment and network as the center limit, so that people as long as the most commonly use of communication tools and applications, in the enterprise internal and colleagues, customers and partners, it can be easy and efficient to communicate. In this paper, the existing enterprise unified communications project as the background, the main research module of the conference. The conference module was designed, and the process and principle of the MQTT protocol and conference call were introduced. Finally, the design and research of experiments were carried out. Finally we realized the function of the telephone conference call and the multimedia conference communication.

    • Private Cloud Based on Xen Technology

      2016, 25(6):75-80. DOI: 10.15888/j.cnki.csa.005198 CSTR:

      Abstract (1392) HTML (0) PDF 793.11 K (1960) Comment (0) Favorites

      Abstract:In order to take full advantage of enterprises' infrastructure located in different systems, protect the company's core data and provide a unified secure operating interface and operating environment and avoid redeployment for each system, duplicate complex work of design, a better solution is building an enterprise private cloud. This paper analyzes the private cloud architecture and its advantages, such as topology, caching mechanism, load balancing strategy and storage pool design, through physical machine cluster technology and Xen virtualization technology designs Xen-based private cloud infrastructure, and provide users with a unified the simple structure interface.

    • Automatic Generation of Particle Effects from SMS Text to Cell Phone Animation

      2016, 25(6):81-87. DOI: 10.15888/j.cnki.csa.005227 CSTR:

      Abstract (1299) HTML (0) PDF 777.60 K (2210) Comment (0) Favorites

      Abstract:The automatic generation of Particle Effects is an important part of the automatic generation system of mobile phones 3D animation. However, the system lacks of the function of particle effects automatic generation, this paper designs and realizes the automatic generating function of the particle effects. The paper introduces the present situation of ontology library of the phone animation system, studies the qualitative programming of particle effects, and designs a rule reasoning scheme of particle effects. And noted that the difficulties of quantitative realization. Finally, the automatic generation of particle effects is verified by experiments.

    • Application of Data Fusion to Environment Monitoring

      2016, 25(6):88-93. DOI: 10.15888/j.cnki.csa.005202 CSTR:

      Abstract (2101) HTML (0) PDF 998.86 K (2974) Comment (0) Favorites

      Abstract:With the accumulation of time, the data is sharply increased in provincial environment system. And there are many different kinds of monitoring data and the description of the different environmental indicators varies. As the monitoring data is growing every minute, the complexity of the data is increasing. The data fusion technology is a method of processing data in big data technologies, which can process data, analysis data and make trend analysis through transfer, correlation and fusion compute data from multiple sensors. The using of ETL, MapReduce and D-S evidence reasoning algorithm can increase the correlation data, so reduce the size of the data.

    • Operating and Control System of x-Ray Single Crystal Diffraction

      2016, 25(6):94-99. DOI: 10.15888/j.cnki.csa.005218 CSTR:

      Abstract (1504) HTML (0) PDF 712.17 K (2864) Comment (0) Favorites

      Abstract:In 2013, China initiated the project of scientific instruments development of x-ray single crystal diffraction for no independent intellectual property rights. Operating and control system of x-ray single crystal diffraction is core software for the instruments, its main function is monitoring instrument components, acquireing data, analysis and process. The paper mainly introduces the operation, the module structure and design process of the various modules of x-ray single crystal diffraction. At present, the system has run on the independent research and development instrument of x-ray single crystal diffraction stably.

    • System for the Caring for Old People Based on Android

      2016, 25(6):100-105. DOI: 10.15888/j.cnki.csa.005228 CSTR:

      Abstract (1803) HTML (0) PDF 800.94 K (3603) Comment (0) Favorites

      Abstract:In order to solve the caring for the elderly, this paper proposes a system for the caring of the elderly based on Android mobile terminal, which concerns about three main issues: collecting location information, transmission, service creation, and discusses the rescue model based on JPush. The method tries to use GPS positioning for collecting location of the elderly, transmits information by defining Json data model, the service is visualized by using Baidu API and these services include displaying real-time position, playback historical tracking, quick alarm. JPush is used in the system for pushing the elderly's SOS information to the relevant personnel's phone and realizes surrounding assistance model. Through application and practice, it shows that this system has characteristics of instantaneity, public participation high, economic and convenient; it also provides effective reference for the elderly care.

    • Improved Model for Automobile Air Conditioner Control

      2016, 25(6):106-112. DOI: 10.15888/j.cnki.csa.005176 CSTR:

      Abstract (1454) HTML (0) PDF 771.11 K (2301) Comment (0) Favorites

      Abstract:Automotive air conditioning control system has been widely used in our daily life. With the help of the method of theoretical calculation and the principle of thermodynamics to establish a car air heat load balance equation, the traditional mode ignores practicability and operability. Modeling objects based on the car as considering object, this paper establishs a new heat load balance equation, and simplifies the solution to the original formula so that collects more data to reduce the disadvantages. According to air quality in China, it will increase calorific value part of taking a breath fresh air, ensure vehicle ride comfort.

    • Advanced Power Line Communication Topology Inference Algorithm

      2016, 25(6):113-118. DOI: 10.15888/j.cnki.csa.005196 CSTR:

      Abstract (1609) HTML (0) PDF 738.67 K (1907) Comment (0) Favorites

      Abstract:For the problem that failure nodes lead to inaccurate topology inference results in the power line communication, an advanced Tomography-based topology inference algorithm has been proposeed. The algorithm introduces node instability degree and intra-cluster hierarchy to handle with the failure nodes. Firstly the node instability degree is determined according to the failure node communication. And then the intra-cluster hierarchy is used to make the failure node only be a member of the cluster instead of a cluster head. Thus it improves the accuracy of the topology inference result. Experiments show that the algorithm achieves positioning and processing the failure node in the topology inference stage, and effectively improves the topology inference accuracy. As fault prediction has the characteristics of uncertainty, we design a method for fault prediction, which combines fuzzy mathematics membership function with particle filter algorithm to predict fault. The new method uses particle filter algorithm to calculate the future state of the device operation, and then designs the normal membership function and the abnormal membership function of the device operation state, calculates and compares the value of the normal and abnormal membership function by using the calculated results and based on the comparison result to predict potential failure. The feasibility of the proposed method is verified by experiments, which can predict the failure of the system in time. The traditional authentication technology showed some deficiencies in cloud computing, in order to decrease intrusion of untrustworthy user, this paper discusses a scheme for user behavior authentication in cloud computing environment which combines traditional authentication and behavior authentication. The paper presents the creation of the user behavior authentication set. The paper presents the realization process of the whole mechanism. The paper proposes Bayesian network model to predict the level of user behavior authentication based on the combination of the evidence of past transaction and real-time user behavior information. We give an example to demonstrate the effectiveness of the prediction model. This research is of theoretically and practically significant for enhancing user authentication and decreasing intrusion of untrustworthy user effectively. The accuracy of the hand feature points location directly affects the correctness of the hand matching. On the basis of the existing hand features location, this paper proposes a feature points location algorithm, which is based on partial blocks scanning. The algorithm starts from the middle finger peak which is the most easy to locate. Then we determine the coordinates of the rest fingers peak points and valley points, step by step according to a fixed order recursive formula block based on the coordinate of the middle finger peak. Then, we extract the hand feature vectors based on the determined feature point and use matching algorithm based on the hand feature vectors to match. Experimental results show that the success rate of the algorithm's feature points is up to 93% and the accuracy rate of the hand shape recognition is up to 80.5%. This indicates that the algorithm can accurately locate the hand feature points and the algorithm is feasible. The 3D model animation plays an important role in the digital design and application. Though many scholars have got research achievements of 3D model animation, how to reproduce the national dance by 3D digital technology is a challenging problem now. This paper uses the motion capture technology to display 3D digital national dance and compared it with the method only based on the 3D model. Firstly, the motion capture equipment gets human motion data file and then creates 3D model which included skeleton, skin and weight work in Maya. By MotionBuilder, 3D model was combined with motion capture data. In this paper the real dance of 13 different nationalities finally is shown by virtual characters at virtual scene. RP(Relying Party) downloads signed objects in RPKI(Resource Public Key Infrastructure) and processes those objects into authorised relations between IP addresses and AS(Autonomous System), which is used to guide the BGP routing. The current RP uses rsync to realize the synchronization, but rsync(Remote Sync) synchronization algorithm does not take the characteristics of the files (directorise) in the RPKI into account. So the synchronization is not efficient. Through the analysis and combining with the characteristics of the files (directories) in the RPKI, this paper designs and realizes a RPKI repository synchronization tool named htsync which is based on ordered hash tree. The experimental results show that, compared with rsync, htsync transmits less data and costs less time during synchronization. In three designed experimental scenario, average speedup ratios of synchronization time are 38.70%, 30.13% and 3.63%, effectively reduce the consumption of time and resources. First of all,this paper analyzes the basic steps of dark channel prior algorithm, and then proposes a method to improve image quality under special scene image restoration algorithm. The algorithm works on special scene image through reversion operation firstly, and then lets improved dark channel prior algorithm use for inverting image to make the quality of the special image be improved on using the conclusion that an reversed special scene image has the similar features with a haze image. In this paper, we will optimize the parameters of improved dark channel prior algorithm and deal with the sky in the image area and the non-sky area in separate, which is very good visual effect and also reduces the complexity of the algorithm. Collaborative Filtering(CF) is one of the most successful approaches for building recommender system,it uses the known preferences of a group of users to make predictions of unknown preferences of other users. The matrix factorization models which can profile both users and items latent factors directly,and the neighborhood models which can analyze similarities between users and items are current research focuses.A method of merging both matrix factorization models and neighborhood models is proposed, which can make further accuracy improvements. The experiment results show that this method is correct and feasible. In this paper, we proposed a vertical handover algorithm based on speed prediction for high-mobility users, such as the scenario of the highway. The algorithm predicts the RSS(received signal strength) of WIMAX and LTE networks in the next time based on the velocity obtained by APA(acceleration prediction algorithm). Velocities are predicted by APA. Then velocities multiply their timeslots to get moving distance respectively. Then current positions are added with moving distances, thus gets next time's positions. Finally distance between AP (access point)and MN(moving node) are calculated by the relationship between distance and present RSS. In the end, the next time's RSS are predicted. Then an effective handover algorithm is proposed using the predicted RSS aiming to reduce the handover times and shorten handover latency. The simulations results indicate that, the proposed algorithm can reduce about 10% handover times and reduce handover latency with sufficient RSS is guaranteed in communication, comparing to the traditional dwell time algorithm. The compression of the GPS trajectories in a conventional way is greatly different with the original one for ignoring the speed information, the direction of GPS points and the shape of tracks. In this paper, we focus on saving the speed, the direction information and shape features of tracks on the premise of keeping the compression ratio. The Algorithm in this article is based on the road network information, OW(Opening Window) algorithm, the core point algorithm and the stay point algorithm, then presents a online compression algorithm which is capable of saving the temporal characteristics of GPS tracks. Experimental results show that the compression algorithm compareing to the existing compression algorithms, ensurs the compression ratio while improving to retain the temporal characteristics of the track. In this paper, a traffic flow criterion is established which is based on extracting the features of the traffic flow and dividing its state. Combined with spatial and temporal dimensions, a new method is proposed to judge the congestion level of the current road according to the regional density and the time occupancy as the features of the traffic flow state. The simulation shows that this method has better accuracy and objectivity. In order to solve the problem of inaccurate priority judgment and complex operation interface and other issues of the existing image restoration algorithm based on sample block, the thesis introduces the concept of the body structure and takes advantage of the graphical user interface (GUI) to operate. The algorithm gets the body structure through artificial selection of repaired area, the Gaussian filter, wavelet transformation and edge detection on the platform of Matlab7.11. Then determine the priority, and finally use the sample block repair algorithm to update self-confidence to finish the completion of restoration. According to the experimental results, the PSNR increases by 10.5~11.07% after restoration,in addition, the algorithm operates simply and will get wide range of applications. The features of ZigBee make it suitable for the application of data acquisition system. A method which is designed for the ZigBee-based data acquisition system is proposed. Most traditional positioning based on ZigBee uses wireless signal loss model to locate. The work is affected by the impact of the surrounding environment. If we take experience value in reality and sets it as parameters in the model, both the positioning accuracy and the universal of this method are not in ideal. With Curve Fitting method fitting the relationship between RSSI and distance, then RSSI triangle centroid algorithm is used to calculate the coordinates of the nodes to be measured. Actual experimental result shows that the algorithm can improve the positioning accuracy. Network coding technology has obvious advantages for improving networks throughput,balancing network load,improving bandwidth availability ratio, enhancing robustness of networks, but it can't resist against pollution attacks directly. Recently, scholars propose the signature scheme based on homomorphic Hash function, which could better detect pollution attacks, but it is difficult to locate the contaminated node. This paper proposes a network coding scheme based on the digital signature by combining with the advantages of both. It can not only resist pollution attack, but also can effectively identify position of attack source. Thus, it reduces the impact of pollution attacks to the network and enhances the robustness of the network. Aiming at the insufficience of traditional wavelet soft and hard threshold functions and some of the threshold functions in existing literatures, and to propose an improved wavelet threshold denoising algorithm. A new threshold function is presented, which has better smoothness and changes with the changes of wavelet decomposition scale, so it has good adaptability. Besides, it improves denoising stability as a result of that there is no uncertain parameters in the function. Compared with traditional soft and hard threshold functions, that uses of the improved threshold function denoising, signals' SNR and MSE are better. Wavelet threshold denoising based on improved wavelet threshold shows an excellent effect, which has good promotional value. Tracking-Learning-Detection (TLD) is a kind of long-term visual tracking algorithm which receiveds wide attention in recent years. In order to improve the running speed of this algorithm, a novel algorithm named Accelerated TLD (ATLD) is proposed in this paper. Two aspects of improvements were made in original TLD algorithm. The improvement includes as follows: using a grey prediction model in the detection module for estimating the location of the target and setting a detection area; applying an image indexing method based on normalized cross correlation (NCC) distance to manage the positive and negative sample set. And on this basis, the multiple targets tracking algorithm is realized. Through experiments, the ATLD algorithm, the original TLD algorithm and other two recent improved TLD algorithm are compared. The experimental results show that the ATLD algorithm runs faster on the premise of ensuring the accuracy. Project cost forecasting is a key point in the research on project management, in view of support vector machine parameter optimization problem in project cost forecasting, a new project cost forecasting model (IPSO-SVM) is proposed, which is based on the improved particle swarm optimizing supporting vector machine. Firstly, project cost data is collected and processed, and then support vector machine is used to learn for training samples in which improved particle swarm algorithm is used to optimize kernel function parameters of support vector machine, At last, the simulation experiment is used to test the performance of project cost forecasting by using Matlab 2012. The experimental results show that IPSO-SVM can effectively improve the forecasting accuracy of project cost, and the forecasting results have some practical application values. Disaster rescue needs rapid transportation of both supplies and staff. The abrupt disasters often affect the traffic states, and research on the real-time fastest path under dynamic road conditions has important economic and social values. Aiming at dealing with the abrupt and frequent road variation after disaster, a fast algorithm of real-time Fastest Traffic Path(ARFTP) is proposed, which reduces the amount of re-calculation on the nodes and the sub-paths by classifying the nodes into different types and filtering them, then putting them into corresponding calculation modules, so as to avoid redundant calculations. When the vehicles are on the original shortest path to the disaster area and receive real-time road variation information, the up-to-date fastest shortest path can be calculated by ARFTP rapidly. Experiments have been made to test the correctness and efficiency of ARFTP with many cases of road cases, and the results proved its effect in improving the efficiency which has some guidance significance to disaster relief transportation. For the issues that the photographic image (PIM) and computer generated images (PRCG) identification scheme have features of poor generality and high dimension in image forensics, an image forensics scheme base on forecast error variance analysis in color filter array (CFA) interpolation is proposed. First, the Fourier spectrum of prediction error variance of CFA interpolation is analyzed, and the PIM and PRCG are distinguished according to whether there is a distinct periodic peak phenomenon. Then, the periodic peak model is analyzed, and the source of PIM is identified according to the peak value features. Finally, experiments have been done on natural images from Columbia University and computer generated image database ADVENT. Experimental results show that the proposed scheme can accurately distinguish between PIM and PRCG, and the recognition rate of the PIM source devices (Canon, Nikon and SONY) reached 93%. Focused on the issue that software version upgrades frequently, test cycle time is compressed constantly, and the test workload gets heavy, with the combination of a enterprise application software,and based on the QTP technology platform builds a test automation framework. Firstly, this paper designs a automated testing framework for enterprise application software by understanding of the working principle of QTP and the characteristics of enterprise application software; Secondly, through the design of test case, writeing test scripts, strengthening the test script and running automated test, realizing the software automated test. Practice shows that automated testing is more suitable for regression testing because of the time-consuming of automated testing is 15% quicker than manual testing, through the useing of automated testing framework, solves the completeing a large number of test cases covering problems in a short time, guarantees the quality of released software, improves the test efficiency. In this paper, a new type of SQL Injection attack through HTTP Headers is studied. Through analysising an example of the SQL Injection attack, the principle of the new type of SQL Injection attack is revealed, and the defense for the new type of SQL Injection attack is proposed. A defense model is established via such means as the IP filtering, data validation and machine learning, and this model has such advantages as low invasive, easy realization, high availability and strong expandability. Distributed database HBase has the greater advantage than traditional relational database in large scale data loading but there is also a lot of optimization space. We build HBase environment based on the Hadoop distributed platform, and optimize self-defining data loading algorithm. Firstly, this paper analysis the HBase underlying data store, experiments work out that data loading methods of HBase are insufficient in efficiency and flexibility. Furthermore, it proposes self-defining parallel data loading algorithm, and optimizes the cluster. The experimental results show that the optimized self-defining parallel data loading method can give full play to the cluster performance, has good loading efficiency and data operational capacity. For the issues that the building façade maintenance robot (BFMR) is easily affected by environment and vibration, and poor operation stability, a kind of security and stability control scheme is proposed. It uses the rail brake system to suppress the shock in the docking process of vertical and horizontal robot, and a re-leveling process is conducted to compensate the gap which is equal to the positioning error between the built-in transom rail of the robot and the transom rail of the building. In addition, the proposed vibration suppression system is used to control of wire rope vibration acceleration according to the state estimation of the wire rope dynamic properties. This system suppresses the vibration produced by environmental noise, improves the vertical movement of the vertical robot stability and reliability. The experimental results show that, the method can effectively reduce the influence of vibration. Genetic algorithm and Particle Swarm Optimization algorithm with strong search capability have a very wide range of applications in the optimization problem. This paper focuses on approximate solutions of ordinary differential equations and LP solutions, based on genetic algorithm and particle swarm algorithms, a comparison and analysis of the efficiency of two kinds of optimization problems is made. We then fix other parameters but adjust the particle population, in the purpose to compare optimization capability of GA and PSO in approximate solutions of differential equation and the LP problem. This paper puts forward a mobile recommendersystem model based on collaborative filtering algorithm under the mobile circumstances. We aim at the insufficient degree in integration of the existing algorithm and the instant context, and design a circumstance oriented collaborative filtering recommendation system framework model based on the traditional collaborative filtering algorithm. We use MAE and F1 evaluation index to evaluate the commendation quality between our proposed model, pre-filteringmodel and the general context modeling. Through a series of experiments, it shows that the proposed scheme has the better performance in recommendation quality. An improved image magnification adaptive algorithm was proposed on the basis of seam carving algorithm which may appears the situation that the first k small pixels share the same points. It finds the newly adding position of pixels by some strategies through judging the sharing situation and its sharing rate, which makes the addition of new pixels in non-important area of visual attention more reasonable. The manual intervention to select the important area of visual attention is implemented to avoid perpetual object becoming warped and deformed by wrong judgment itself. Experiments show that the improved algorithms get better effects. In recent years, web usage mining has become a new hotspot in the field of data mining. From the web logs which record information of a large number of network user's behavior, web usage mining discovers the characteristics and potential user access law. This paper uses many real running dates of college homepage. Aiming at running log files, we carry out a comprehensive analysis by using the web mining. Analyzing the interest measure of user to the information content. By using the user access to the page, the system can calculate the user data level of interest on each page, and thereby improving the content and layout of the site. An efficient and reliable data resource authorization policy is the key of effective management, and there is no systemic study on how to make an evaluation on its efficiency and reliability. Firstly, QCC (Quantitative Cost Calculation Method) Method is proposed. Compared to the current methods, QCC makes a distinction between the wrong authorization judgment and wrong refused authorization judgment. And then a policy evaluation mechanism based on QCC is put forward. At last, by carrying out real policy evaluation analysis, we verify the effectiveness of the mechanism in improving the work efficiency with the real log data of an integrated network management system. Network intrusion detection is a hot research topic in network security, in order to improve the accuracy of network intrusion detection, a network intrusion detection model (IPSO-SVM) is proposed based on improved particle swarm optimization algorithm and support vector machine to solve the problem of classifier's parameters optimization. Firstly, network intrusion detection rate is taken as the objective function, and support vector machine parameters are used as the constraint conditions to establish mathematical model, and secondly improved particle swarm optimization algorithm is used to find the optimal parameters, finally, support vector machine is used as classifier to build intrusion detection model, and KDD 1999 data is used to validate the performance in Matlab 2012. The results show that IPSO-SVM has solved the optimization problem of the classifier's parameters and improved detection rate, reduced false alarm rate, false negative rate of the network intrusion. Along with the increasingly important role of software in today's society, during the development process of software or system, testing becomes more and more important. With the wide application of object-oriented technology and the demand of automation testing, model-based testing (MBT) approach have been approved by software engineering. Although there are a number of publications discussing model-based software testing, we are lack of technical papers and publications presenting a review of the current advances in model-based software testing and automation tools. The goal of this paper is to review the model-based testing approach, it first discusses the popular models used in model-based testing, the test case generation methods, the testing target. Then, it summarizes MBT practices and discusses and compares the major model-based test tools. Finally, the paper close ends with a discussion of the challenges of current MBT approach, and where model-based testing fits in the future. Inspired by the deficiency of anonymous nodes, the descent of safety caused by the dynamics and the computation insufficiency of current trustworthiness mode, the paper proposes a computing mode of trust evaluation based on the dynamic Bayesian network. The mode calculates the trustworthiness from the direct trust and commendation one according to the historical interaction data. Time-effect factor and penalty factor are introduced in the paper to solve the problems of timeliness and malicious node. The efficiency and practicability of the mode are proved by the simulation experiment. This paper introduces a kind of basic functions of authentication server, high concurrency authentication server has the characteristics of concurrent two-factor authentication of the client and server, epoll is adopted in the system and the thread pool technology is adopted to ensure that its high concurrency, RSA and DES algorithm is used to guarantee the security of information transmission, the server has concurrent processing ability and further improves the performance of network security authentication server. Through the complete design example test, results show that the authentication server runs normally in the case of high load operating. The system has certain practical significance to process synchronously from the client request and certification research in a short time.

    • Particle Filter Fault Prediction Based on Fuzzy Membership Degree

      2016, 25(6):119-124. DOI: 10.15888/j.cnki.csa.005177 CSTR:

      Abstract (1469) HTML (0) PDF 791.21 K (2300) Comment (0) Favorites

      Abstract:As fault prediction has the characteristics of uncertainty, we design a method for fault prediction, which combines fuzzy mathematics membership function with particle filter algorithm to predict fault. The new method uses particle filter algorithm to calculate the future state of the device operation, and then designs the normal membership function and the abnormal membership function of the device operation state, calculates and compares the value of the normal and abnormal membership function by using the calculated results and based on the comparison result to predict potential failure. The feasibility of the proposed method is verified by experiments, which can predict the failure of the system in time.

    • Authentication and Prediction of User Behavior in Cloud Computing

      2016, 25(6):125-130. DOI: 10.15888/j.cnki.csa.005169 CSTR:

      Abstract (1274) HTML (0) PDF 831.54 K (2284) Comment (0) Favorites

      Abstract:The traditional authentication technology showed some deficiencies in cloud computing, in order to decrease intrusion of untrustworthy user, this paper discusses a scheme for user behavior authentication in cloud computing environment which combines traditional authentication and behavior authentication. The paper presents the creation of the user behavior authentication set. The paper presents the realization process of the whole mechanism. The paper proposes Bayesian network model to predict the level of user behavior authentication based on the combination of the evidence of past transaction and real-time user behavior information. We give an example to demonstrate the effectiveness of the prediction model. This research is of theoretically and practically significant for enhancing user authentication and decreasing intrusion of untrustworthy user effectively.

    • Location Algorithm Based on the Block-Type Hand-Shaped Feature Points

      2016, 25(6):131-135. DOI: 10.15888/j.cnki.csa.005171 CSTR:

      Abstract (1143) HTML (0) PDF 755.37 K (1759) Comment (0) Favorites

      Abstract:The accuracy of the hand feature points location directly affects the correctness of the hand matching. On the basis of the existing hand features location, this paper proposes a feature points location algorithm, which is based on partial blocks scanning. The algorithm starts from the middle finger peak which is the most easy to locate. Then we determine the coordinates of the rest fingers peak points and valley points, step by step according to a fixed order recursive formula block based on the coordinate of the middle finger peak. Then, we extract the hand feature vectors based on the determined feature point and use matching algorithm based on the hand feature vectors to match. Experimental results show that the success rate of the algorithm's feature points is up to 93% and the accuracy rate of the hand shape recognition is up to 80.5%. This indicates that the algorithm can accurately locate the hand feature points and the algorithm is feasible.

    • National Dance 3D Digital Display Method Based on Motion Capture Technology

      2016, 25(6):136-140. DOI: 10.15888/j.cnki.csa.005232 CSTR:

      Abstract (1900) HTML (0) PDF 825.18 K (4130) Comment (0) Favorites

      Abstract:The 3D model animation plays an important role in the digital design and application. Though many scholars have got research achievements of 3D model animation, how to reproduce the national dance by 3D digital technology is a challenging problem now. This paper uses the motion capture technology to display 3D digital national dance and compared it with the method only based on the 3D model. Firstly, the motion capture equipment gets human motion data file and then creates 3D model which included skeleton, skin and weight work in Maya. By MotionBuilder, 3D model was combined with motion capture data. In this paper the real dance of 13 different nationalities finally is shown by virtual characters at virtual scene.

    • RPKI Repository Synchronization Method Based on Ordered Hash Tree

      2016, 25(6):141-146. DOI: 10.15888/j.cnki.csa.005203 CSTR:

      Abstract (1161) HTML (0) PDF 724.30 K (2287) Comment (0) Favorites

      Abstract:RP(Relying Party) downloads signed objects in RPKI(Resource Public Key Infrastructure) and processes those objects into authorised relations between IP addresses and AS(Autonomous System), which is used to guide the BGP routing. The current RP uses rsync to realize the synchronization, but rsync(Remote Sync) synchronization algorithm does not take the characteristics of the files (directorise) in the RPKI into account. So the synchronization is not efficient. Through the analysis and combining with the characteristics of the files (directories) in the RPKI, this paper designs and realizes a RPKI repository synchronization tool named htsync which is based on ordered hash tree. The experimental results show that, compared with rsync, htsync transmits less data and costs less time during synchronization. In three designed experimental scenario, average speedup ratios of synchronization time are 38.70%, 30.13% and 3.63%, effectively reduce the consumption of time and resources.

    • Image Restoration Algorithm for Improving Image Quality Under Special Scene

      2016, 25(6):147-153. DOI: 10.15888/j.cnki.csa.005238 CSTR:

      Abstract (1490) HTML (0) PDF 936.54 K (1969) Comment (0) Favorites

      Abstract:First of all,this paper analyzes the basic steps of dark channel prior algorithm, and then proposes a method to improve image quality under special scene image restoration algorithm. The algorithm works on special scene image through reversion operation firstly, and then lets improved dark channel prior algorithm use for inverting image to make the quality of the special image be improved on using the conclusion that an reversed special scene image has the similar features with a haze image. In this paper, we will optimize the parameters of improved dark channel prior algorithm and deal with the sky in the image area and the non-sky area in separate, which is very good visual effect and also reduces the complexity of the algorithm.

    • Recommender Algorithm Incorporating Neighborhood Model with Matrix Factorization

      2016, 25(6):154-159. DOI: 10.15888/j.cnki.csa.005185 CSTR:

      Abstract (1645) HTML (0) PDF 1.37 M (1970) Comment (0) Favorites

      Abstract:Collaborative Filtering(CF) is one of the most successful approaches for building recommender system,it uses the known preferences of a group of users to make predictions of unknown preferences of other users. The matrix factorization models which can profile both users and items latent factors directly,and the neighborhood models which can analyze similarities between users and items are current research focuses.A method of merging both matrix factorization models and neighborhood models is proposed, which can make further accuracy improvements. The experiment results show that this method is correct and feasible.

    • Vertical Handover Algorithm Based on Acceleration Prediction within Heterogeneous Network

      2016, 25(6):160-165. DOI: 10.15888/j.cnki.csa.005213 CSTR:

      Abstract (1394) HTML (0) PDF 714.90 K (1841) Comment (0) Favorites

      Abstract:In this paper, we proposed a vertical handover algorithm based on speed prediction for high-mobility users, such as the scenario of the highway. The algorithm predicts the RSS(received signal strength) of WIMAX and LTE networks in the next time based on the velocity obtained by APA(acceleration prediction algorithm). Velocities are predicted by APA. Then velocities multiply their timeslots to get moving distance respectively. Then current positions are added with moving distances, thus gets next time's positions. Finally distance between AP (access point)and MN(moving node) are calculated by the relationship between distance and present RSS. In the end, the next time's RSS are predicted. Then an effective handover algorithm is proposed using the predicted RSS aiming to reduce the handover times and shorten handover latency. The simulations results indicate that, the proposed algorithm can reduce about 10% handover times and reduce handover latency with sufficient RSS is guaranteed in communication, comparing to the traditional dwell time algorithm.

    • Online Compression Method for GPS Trajectory Based on Road Network

      2016, 25(6):166-170. DOI: 10.15888/j.cnki.csa.005212 CSTR:

      Abstract (1328) HTML (0) PDF 771.24 K (2840) Comment (0) Favorites

      Abstract:The compression of the GPS trajectories in a conventional way is greatly different with the original one for ignoring the speed information, the direction of GPS points and the shape of tracks. In this paper, we focus on saving the speed, the direction information and shape features of tracks on the premise of keeping the compression ratio. The Algorithm in this article is based on the road network information, OW(Opening Window) algorithm, the core point algorithm and the stay point algorithm, then presents a online compression algorithm which is capable of saving the temporal characteristics of GPS tracks. Experimental results show that the compression algorithm compareing to the existing compression algorithms, ensurs the compression ratio while improving to retain the temporal characteristics of the track.

    • Discriminant Method of Traffic Congestion Based on Regional Density

      2016, 25(6):171-174. DOI: 10.15888/j.cnki.csa.005220 CSTR:

      Abstract (1671) HTML (0) PDF 839.10 K (4315) Comment (0) Favorites

      Abstract:In this paper, a traffic flow criterion is established which is based on extracting the features of the traffic flow and dividing its state. Combined with spatial and temporal dimensions, a new method is proposed to judge the congestion level of the current road according to the regional density and the time occupancy as the features of the traffic flow state. The simulation shows that this method has better accuracy and objectivity.

    • Digital Image Restoration Algorithm Research Based on Improving the Sample Block and GUI Design

      2016, 25(6):175-179. DOI: 10.15888/j.cnki.csa.005199 CSTR:

      Abstract (1263) HTML (0) PDF 922.61 K (2137) Comment (0) Favorites

      Abstract:In order to solve the problem of inaccurate priority judgment and complex operation interface and other issues of the existing image restoration algorithm based on sample block, the thesis introduces the concept of the body structure and takes advantage of the graphical user interface (GUI) to operate. The algorithm gets the body structure through artificial selection of repaired area, the Gaussian filter, wavelet transformation and edge detection on the platform of Matlab7.11. Then determine the priority, and finally use the sample block repair algorithm to update self-confidence to finish the completion of restoration. According to the experimental results, the PSNR increases by 10.5~11.07% after restoration,in addition, the algorithm operates simply and will get wide range of applications.

    • Indoor Location Algorithm Based on ZigBee

      2016, 25(6):180-184. DOI: 10.15888/j.cnki.csa.005208 CSTR:

      Abstract (1147) HTML (0) PDF 1.12 M (3789) Comment (0) Favorites

      Abstract:The features of ZigBee make it suitable for the application of data acquisition system. A method which is designed for the ZigBee-based data acquisition system is proposed. Most traditional positioning based on ZigBee uses wireless signal loss model to locate. The work is affected by the impact of the surrounding environment. If we take experience value in reality and sets it as parameters in the model, both the positioning accuracy and the universal of this method are not in ideal. With Curve Fitting method fitting the relationship between RSSI and distance, then RSSI triangle centroid algorithm is used to calculate the coordinates of the nodes to be measured. Actual experimental result shows that the algorithm can improve the positioning accuracy.

    • Pollution-Resistant Network Coding Scheme Based on Digital Signature

      2016, 25(6):185-190. DOI: 10.15888/j.cnki.csa.005192 CSTR:

      Abstract (1243) HTML (0) PDF 676.81 K (1987) Comment (0) Favorites

      Abstract:Network coding technology has obvious advantages for improving networks throughput,balancing network load,improving bandwidth availability ratio, enhancing robustness of networks, but it can't resist against pollution attacks directly. Recently, scholars propose the signature scheme based on homomorphic Hash function, which could better detect pollution attacks, but it is difficult to locate the contaminated node. This paper proposes a network coding scheme based on the digital signature by combining with the advantages of both. It can not only resist pollution attack, but also can effectively identify position of attack source. Thus, it reduces the impact of pollution attacks to the network and enhances the robustness of the network.

    • Wavelet Threshold Denoising Algorithm Based on Improved Wavelet Threshold Function

      2016, 25(6):191-195. DOI: 10.15888/j.cnki.csa.005197 CSTR:

      Abstract (1294) HTML (0) PDF 668.46 K (4444) Comment (0) Favorites

      Abstract:Aiming at the insufficience of traditional wavelet soft and hard threshold functions and some of the threshold functions in existing literatures, and to propose an improved wavelet threshold denoising algorithm. A new threshold function is presented, which has better smoothness and changes with the changes of wavelet decomposition scale, so it has good adaptability. Besides, it improves denoising stability as a result of that there is no uncertain parameters in the function. Compared with traditional soft and hard threshold functions, that uses of the improved threshold function denoising, signals' SNR and MSE are better. Wavelet threshold denoising based on improved wavelet threshold shows an excellent effect, which has good promotional value.

    • Accelerated TLD Algorithm and its Application in Multiple Target Tracking

      2016, 25(6):196-201. DOI: 10.15888/j.cnki.csa.005222 CSTR:

      Abstract (1452) HTML (0) PDF 855.98 K (2575) Comment (0) Favorites

      Abstract:Tracking-Learning-Detection (TLD) is a kind of long-term visual tracking algorithm which receiveds wide attention in recent years. In order to improve the running speed of this algorithm, a novel algorithm named Accelerated TLD (ATLD) is proposed in this paper. Two aspects of improvements were made in original TLD algorithm. The improvement includes as follows: using a grey prediction model in the detection module for estimating the location of the target and setting a detection area; applying an image indexing method based on normalized cross correlation (NCC) distance to manage the positive and negative sample set. And on this basis, the multiple targets tracking algorithm is realized. Through experiments, the ATLD algorithm, the original TLD algorithm and other two recent improved TLD algorithm are compared. The experimental results show that the ATLD algorithm runs faster on the premise of ensuring the accuracy.

    • Project Cost Forecasting Based on Improved Particle Swarm Algorithm Optimizing Support Vector Machine

      2016, 25(6):202-206. DOI: 10.15888/j.cnki.csa.005210 CSTR:

      Abstract (1177) HTML (0) PDF 710.85 K (2720) Comment (0) Favorites

      Abstract:Project cost forecasting is a key point in the research on project management, in view of support vector machine parameter optimization problem in project cost forecasting, a new project cost forecasting model (IPSO-SVM) is proposed, which is based on the improved particle swarm optimizing supporting vector machine. Firstly, project cost data is collected and processed, and then support vector machine is used to learn for training samples in which improved particle swarm algorithm is used to optimize kernel function parameters of support vector machine, At last, the simulation experiment is used to test the performance of project cost forecasting by using Matlab 2012. The experimental results show that IPSO-SVM can effectively improve the forecasting accuracy of project cost, and the forecasting results have some practical application values.

    • Algorithm of Real-Time Fastest Traffic Path for Disaster Rescue

      2016, 25(6):207-212. DOI: 10.15888/j.cnki.csa.005158 CSTR:

      Abstract (1155) HTML (0) PDF 672.48 K (1885) Comment (0) Favorites

      Abstract:Disaster rescue needs rapid transportation of both supplies and staff. The abrupt disasters often affect the traffic states, and research on the real-time fastest path under dynamic road conditions has important economic and social values. Aiming at dealing with the abrupt and frequent road variation after disaster, a fast algorithm of real-time Fastest Traffic Path(ARFTP) is proposed, which reduces the amount of re-calculation on the nodes and the sub-paths by classifying the nodes into different types and filtering them, then putting them into corresponding calculation modules, so as to avoid redundant calculations. When the vehicles are on the original shortest path to the disaster area and receive real-time road variation information, the up-to-date fastest shortest path can be calculated by ARFTP rapidly. Experiments have been made to test the correctness and efficiency of ARFTP with many cases of road cases, and the results proved its effect in improving the efficiency which has some guidance significance to disaster relief transportation.

    • Forecast Error Variance Analysis of CFA Interpolation and its Application in the Image Forensics

      2016, 25(6):213-218. DOI: 10.15888/j.cnki.csa.005165 CSTR:

      Abstract (1310) HTML (0) PDF 804.39 K (2297) Comment (0) Favorites

      Abstract:For the issues that the photographic image (PIM) and computer generated images (PRCG) identification scheme have features of poor generality and high dimension in image forensics, an image forensics scheme base on forecast error variance analysis in color filter array (CFA) interpolation is proposed. First, the Fourier spectrum of prediction error variance of CFA interpolation is analyzed, and the PIM and PRCG are distinguished according to whether there is a distinct periodic peak phenomenon. Then, the periodic peak model is analyzed, and the source of PIM is identified according to the peak value features. Finally, experiments have been done on natural images from Columbia University and computer generated image database ADVENT. Experimental results show that the proposed scheme can accurately distinguish between PIM and PRCG, and the recognition rate of the PIM source devices (Canon, Nikon and SONY) reached 93%.

    • QTP Based Enterprise Application Software Automation Testing Method

      2016, 25(6):219-224. DOI: 10.15888/j.cnki.csa.005200 CSTR:

      Abstract (1507) HTML (0) PDF 981.22 K (2426) Comment (0) Favorites

      Abstract:Focused on the issue that software version upgrades frequently, test cycle time is compressed constantly, and the test workload gets heavy, with the combination of a enterprise application software,and based on the QTP technology platform builds a test automation framework. Firstly, this paper designs a automated testing framework for enterprise application software by understanding of the working principle of QTP and the characteristics of enterprise application software; Secondly, through the design of test case, writeing test scripts, strengthening the test script and running automated test, realizing the software automated test. Practice shows that automated testing is more suitable for regression testing because of the time-consuming of automated testing is 15% quicker than manual testing, through the useing of automated testing framework, solves the completeing a large number of test cases covering problems in a short time, guarantees the quality of released software, improves the test efficiency.

    • Research and Defense of a New Type of SQL Injection Attack

      2016, 25(6):225-230. DOI: 10.15888/j.cnki.csa.005195 CSTR:

      Abstract (1345) HTML (0) PDF 636.82 K (2546) Comment (0) Favorites

      Abstract:In this paper, a new type of SQL Injection attack through HTTP Headers is studied. Through analysising an example of the SQL Injection attack, the principle of the new type of SQL Injection attack is revealed, and the defense for the new type of SQL Injection attack is proposed. A defense model is established via such means as the IP filtering, data validation and machine learning, and this model has such advantages as low invasive, easy realization, high availability and strong expandability.

    • Research on Large Scale Data Loading Based on HBase

      2016, 25(6):231-237. DOI: 10.15888/j.cnki.csa.005194 CSTR:

      Abstract (1714) HTML (0) PDF 1.94 M (2450) Comment (0) Favorites

      Abstract:Distributed database HBase has the greater advantage than traditional relational database in large scale data loading but there is also a lot of optimization space. We build HBase environment based on the Hadoop distributed platform, and optimize self-defining data loading algorithm. Firstly, this paper analysis the HBase underlying data store, experiments work out that data loading methods of HBase are insufficient in efficiency and flexibility. Furthermore, it proposes self-defining parallel data loading algorithm, and optimizes the cluster. The experimental results show that the optimized self-defining parallel data loading method can give full play to the cluster performance, has good loading efficiency and data operational capacity.

    • Maintenance Robot Stable Motion Controlling Using Built-In Guide

      2016, 25(6):238-243. DOI: 10.15888/j.cnki.csa.005163 CSTR:

      Abstract (1657) HTML (0) PDF 1.03 M (1789) Comment (0) Favorites

      Abstract:For the issues that the building fa?ade maintenance robot (BFMR) is easily affected by environment and vibration, and poor operation stability, a kind of security and stability control scheme is proposed. It uses the rail brake system to suppress the shock in the docking process of vertical and horizontal robot, and a re-leveling process is conducted to compensate the gap which is equal to the positioning error between the built-in transom rail of the robot and the transom rail of the building. In addition, the proposed vibration suppression system is used to control of wire rope vibration acceleration according to the state estimation of the wire rope dynamic properties. This system suppresses the vibration produced by environmental noise, improves the vertical movement of the vertical robot stability and reliability. The experimental results show that, the method can effectively reduce the influence of vibration.

    • Efficiency Comparison of GA and PSO on DE and LP Problem

      2016, 25(6):244-248. DOI: 10.15888/j.cnki.csa.005183 CSTR:

      Abstract (1461) HTML (0) PDF 694.55 K (3505) Comment (0) Favorites

      Abstract:Genetic algorithm and Particle Swarm Optimization algorithm with strong search capability have a very wide range of applications in the optimization problem. This paper focuses on approximate solutions of ordinary differential equations and LP solutions, based on genetic algorithm and particle swarm algorithms, a comparison and analysis of the efficiency of two kinds of optimization problems is made. We then fix other parameters but adjust the particle population, in the purpose to compare optimization capability of GA and PSO in approximate solutions of differential equation and the LP problem.

    • Context-Oriented Recommender System in Mobile Circumstances

      2016, 25(6):249-253. DOI: 10.15888/j.cnki.csa.005205 CSTR:

      Abstract (1314) HTML (0) PDF 707.80 K (1985) Comment (0) Favorites

      Abstract:This paper puts forward a mobile recommendersystem model based on collaborative filtering algorithm under the mobile circumstances. We aim at the insufficient degree in integration of the existing algorithm and the instant context, and design a circumstance oriented collaborative filtering recommendation system framework model based on the traditional collaborative filtering algorithm. We use MAE and F1 evaluation index to evaluate the commendation quality between our proposed model, pre-filteringmodel and the general context modeling. Through a series of experiments, it shows that the proposed scheme has the better performance in recommendation quality.

    • Research and Implementation of Image Magnification Algorithm Based on Seam Carving

      2016, 25(6):254-259. DOI: 10.15888/j.cnki.csa.005215 CSTR:

      Abstract (1432) HTML (0) PDF 752.91 K (2833) Comment (0) Favorites

      Abstract:An improved image magnification adaptive algorithm was proposed on the basis of seam carving algorithm which may appears the situation that the first k small pixels share the same points. It finds the newly adding position of pixels by some strategies through judging the sharing situation and its sharing rate, which makes the addition of new pixels in non-important area of visual attention more reasonable. The manual intervention to select the important area of visual attention is implemented to avoid perpetual object becoming warped and deformed by wrong judgment itself. Experiments show that the improved algorithms get better effects.

    • Internet Users' Browsing Behaviors Analysis

      2016, 25(6):260-264. DOI: 10.15888/j.cnki.csa.005180 CSTR:

      Abstract (1376) HTML (0) PDF 1.38 M (2820) Comment (0) Favorites

      Abstract:In recent years, web usage mining has become a new hotspot in the field of data mining. From the web logs which record information of a large number of network user's behavior, web usage mining discovers the characteristics and potential user access law. This paper uses many real running dates of college homepage. Aiming at running log files, we carry out a comprehensive analysis by using the web mining. Analyzing the interest measure of user to the information content. By using the user access to the page, the system can calculate the user data level of interest on each page, and thereby improving the content and layout of the site.

    • Data Resource Authorizaton Policy Evaluation Based on Log Data

      2016, 25(6):265-268. DOI: 10.15888/j.cnki.csa.005214 CSTR:

      Abstract (1226) HTML (0) PDF 678.48 K (1883) Comment (0) Favorites

      Abstract:An efficient and reliable data resource authorization policy is the key of effective management, and there is no systemic study on how to make an evaluation on its efficiency and reliability. Firstly, QCC (Quantitative Cost Calculation Method) Method is proposed. Compared to the current methods, QCC makes a distinction between the wrong authorization judgment and wrong refused authorization judgment. And then a policy evaluation mechanism based on QCC is put forward. At last, by carrying out real policy evaluation analysis, we verify the effectiveness of the mechanism in improving the work efficiency with the real log data of an integrated network management system.

    • Network Intrusion Detection Based on Improved Particle Swarm Optimization Algorithm and Support Vector Machine

      2016, 25(6):269-273. DOI: 10.15888/j.cnki.csa.005304 CSTR:

      Abstract (1297) HTML (0) PDF 726.06 K (2106) Comment (0) Favorites

      Abstract:Network intrusion detection is a hot research topic in network security, in order to improve the accuracy of network intrusion detection, a network intrusion detection model (IPSO-SVM) is proposed based on improved particle swarm optimization algorithm and support vector machine to solve the problem of classifier's parameters optimization. Firstly, network intrusion detection rate is taken as the objective function, and support vector machine parameters are used as the constraint conditions to establish mathematical model, and secondly improved particle swarm optimization algorithm is used to find the optimal parameters, finally, support vector machine is used as classifier to build intrusion detection model, and KDD 1999 data is used to validate the performance in Matlab 2012. The results show that IPSO-SVM has solved the optimization problem of the classifier's parameters and improved detection rate, reduced false alarm rate, false negative rate of the network intrusion.

    • Survey on Model-Based Testing in Software Testing

      2016, 25(6):274-278. DOI: 10.15888/j.cnki.csa.004880 CSTR:

      Abstract (2044) HTML (0) PDF 604.26 K (4193) Comment (0) Favorites

      Abstract:Along with the increasingly important role of software in today's society, during the development process of software or system, testing becomes more and more important. With the wide application of object-oriented technology and the demand of automation testing, model-based testing (MBT) approach have been approved by software engineering. Although there are a number of publications discussing model-based software testing, we are lack of technical papers and publications presenting a review of the current advances in model-based software testing and automation tools. The goal of this paper is to review the model-based testing approach, it first discusses the popular models used in model-based testing, the test case generation methods, the testing target. Then, it summarizes MBT practices and discusses and compares the major model-based test tools. Finally, the paper close ends with a discussion of the challenges of current MBT approach, and where model-based testing fits in the future.

    • Trusted Measurement Model Based on Dynamic Bayesian Network in P2P Networks

      2016, 25(6):279-283. DOI: 10.15888/j.cnki.csa.005142 CSTR:

      Abstract (1387) HTML (0) PDF 728.87 K (1943) Comment (0) Favorites

      Abstract:Inspired by the deficiency of anonymous nodes, the descent of safety caused by the dynamics and the computation insufficiency of current trustworthiness mode, the paper proposes a computing mode of trust evaluation based on the dynamic Bayesian network. The mode calculates the trustworthiness from the direct trust and commendation one according to the historical interaction data. Time-effect factor and penalty factor are introduced in the paper to solve the problems of timeliness and malicious node. The efficiency and practicability of the mode are proved by the simulation experiment.

    • An Implementation Method of High Concurrency Authentication Server

      2016, 25(6):284-287. DOI: 10.15888/j.cnki.csa.005398 CSTR:

      Abstract (1337) HTML (0) PDF 732.19 K (2229) Comment (0) Favorites

      Abstract:This paper introduces a kind of basic functions of authentication server, high concurrency authentication server has the characteristics of concurrent two-factor authentication of the client and server, epoll is adopted in the system and the thread pool technology is adopted to ensure that its high concurrency, RSA and DES algorithm is used to guarantee the security of information transmission, the server has concurrent processing ability and further improves the performance of network security authentication server. Through the complete design example test, results show that the authentication server runs normally in the case of high load operating. The system has certain practical significance to process synchronously from the client request and certification research in a short time.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063