Started in January,1974(Monthly)
Supervised and Sponsored by Chongqing Southwest Information Co., Ltd.
ISSN 1002-137X
CN 50-1075/TP
CODEN JKIEBK
Editors
Current Issue
Volume 39 Issue Z11, 16 November 2018
  
Diversity-based Approach for Dynamic Role Transition
Computer Science. 2012, 39 (Z11): 1-5. 
Abstract PDF(0KB) ( 254 )   
RelatedCitation | Metrics
Role-Based Access Control(RBAC) has been widely applied to secure the operating system(OS) due to its flexibility and fine-granularity control. A novel access control model supporting dynamic role transition DRT-RBAC, is proposed on the foundation of authentication trustworthiness measurement system. In the model, through quantifying the uncertainty of authentication and constraining the bound of role transition, the process of role transition can be com- pletely transparent to the user, thus guaranteeing the safety and stability of OS. I'o measure the diversity of roles, we further introduce the Analytic Hierarchy Process(AHP) method. I3y analyzing the internal relation and structuring the hierarchical fabric,we calculate the weight for each layer. The diversity of two roles is finally obtained via comparing their weights. We implement the DRT-RBAC in CentOS 5. 4 and verify its effectiveness.
Research and Design on UCON-based Mobile Digital Publishing Rights Management System
Computer Science. 2012, 39 (Z11): 6-8. 
Abstract PDF(0KB) ( 248 )   
RelatedCitation | Metrics
Aimed at the problem that mobile digital publishing is vulnerable to unauthorized access, resource intercep tion, and hostile attack, a Mobile Digital Publishing Rights Management System based on UCON model was proposed. A detail of the system mechanism and key technologies for system was given. Universal DRM security evaluation indices were used to analyze the safety of the system. The analysis shows that the system guarantees the security and integrity of the mobile digital publishing content and right object with good availability and reliability.
Research of the Active Defense Technology for the SQI. Server Injection Attack
Computer Science. 2012, 39 (Z11): 9-13. 
Abstract PDF(0KB) ( 257 )   
RelatedCitation | Metrics
In view of MSSQL injection attack,the research here thinks that only the active defense can become passive to be active, and then fundamentally lets SQI_ server achieve a real sense of security. hhis paper designed and developed a set of active defense software, which realizes active defense by hooking the APIs of SQL Server process through re- mote thread injection technology. After the active defense software intercepts the creation of process by SQI_ Server, it sends the process creation parameters to the honey pot for execution, and replaces the result of SQL Server with the re- ply of the honey pot. With third-party computer monitoring software, monitoring the honey pot, the system can gather the information of the attackers,and track them. The software also features port mapping. Port of the real host can be mapped to the honey pot, thereby to enhance the honey pot deceptive. When malicious attack is detected, the system provides two ways, SMS alert and F-mail alert, to inform your system administrator as soon as possible.
Application of DSP in the Data Security of Data Link Terminal
Computer Science. 2012, 39 (Z11): 14-15. 
Abstract PDF(0KB) ( 245 )   
RelatedCitation | Metrics
With the development of warfare,information technology has become a key factor to the success of the war. Data link is an important platform on which the information warfare relies. According to the demand of data link, this paper designed a kind of data link terminals for data security module, achieved a relatively independent data encryption and decryption processing on the PXI bus platform, illustrated the designing concept, the function and the basic working process of the module.
Method of Android Applications Permission Detection Based on Static Dataflow Analysis
Computer Science. 2012, 39 (Z11): 16-18. 
Abstract PDF(0KB) ( 250 )   
RelatedCitation | Metrics
Android applications that have access to crucial system resources arc the targets of attackers. An application applies the access rights when it is installed, and users always ignore that. This paper proposes a new method to detect overprivilege in compiled Android applications,which leverages dataflow analysis to get the parameters of an API call. A static detection tool "Brox" is implemented based on this method. And 13rox is tested using multiply Android applica- lions. The test results on the accuracy and performance are quite encouraging.
Mobile Payment Protocols Based on Digital Certificate
Computer Science. 2012, 39 (Z11): 19-23. 
Abstract PDF(0KB) ( 307 )   
RelatedCitation | Metrics
To solve the security issues in the mobile payment, this paper designs a mobile payment protocol based on CA system which uses the digital certificate to bind the user identity and public key. There are tow protocols included: (a) remote mobile payment protocol; (b) on-site payment protocol. The protocols provide mobile network users or Internet network users with information encryption and decryption and digital signature, provide users and information service providers with identity authentication and data authentication, which assures the confidentiality of transaction informa- tion, non-repudiation and integrity, prevents replay attacks, and basically solves the ccommerce security issue.
Principle of GPU Programming and Algorithm Analysis on Network Security
Computer Science. 2012, 39 (Z11): 24-27. 
Abstract PDF(0KB) ( 254 )   
RelatedCitation | Metrics
In recent ycars,GPU has heavily shaked CPU's traditional application. It has been applied to many kinds of high performance computation, especially in the field of network security. In order to overcome the disadvantage of tra- ditional hardware acceleration, we first describe GPU's basic architecture and its parallel computing principle, and com- pare the difference between CUDA GPU programming and CPU programming. Besides, we analyze the GPU's imple- mentation of some algorithms referred to network security, and carry out experiments to test its performance according- ly. It shows that GPU parallel computing gains great advantage in computing,when optimization is reasonable.
Quantitative Assessing Method of Software Quality Evaluation Based on Software Testing and KDD
Computer Science. 2012, 39 (Z11): 28-30. 
Abstract PDF(0KB) ( 244 )   
RelatedCitation | Metrics
How to evaluate software objectively and exactly is a most important subject. `baking advantage of our expe rience in software testing and evaluation and based on Software hrustworthy Model, we put forward a quantitative as- sessing method named QUEST, which makes use of results of software testing and KDl〕and can attain the objective better.
Fusion Approach for Conflicting Evidence
Computer Science. 2012, 39 (Z11): 31-32. 
Abstract PDF(0KB) ( 231 )   
RelatedCitation | Metrics
For dealing with conflicting evidence,this paper determines the weight of evidence by entropy together with support between evidence. The method considers two sides, ability to identify target and surport from other evidence, to determine the weight of evidence. The paper designs the method to calculate weight of evidence. At last, evidence is fused by the method based on discount rate. Compared to traditional methods,the method in the paper is proved better on convergence efficiency decision risk.
Anonymous Authentication Scheme Based on Role Model of PMI
Computer Science. 2012, 39 (Z11): 33-35. 
Abstract PDF(0KB) ( 257 )   
RelatedCitation | Metrics
Nowadays, the privacy protection is one of the most concerned problems. More and more users want to strengthen their own privacy preservation and hope that they can access the resources without providing personal sensi- five informations. An anonymous access control scheme is proposed which is based on PKI/PMI certificates. The trusted third party is introduced between users and the service provider. The role stated-attribute certificate(R}AC) and role assigned attribute certificate(RA-AC) are used to implement the anonymous authentication. Theoretical analysis shows that this solution provides the security,anonymity and no relevance.
Lightweight Intrusion Detection Technology
Computer Science. 2012, 39 (Z11): 36-38. 
Abstract PDF(0KB) ( 241 )   
RelatedCitation | Metrics
hhe intrusion detection system deals with huge amount of data which contains redundant and noisy data eau- sing slow training and testing process,high resource consumption as well as poor detection rate. This paper proposed a lightweight intrusion detection method. This method adapts fast correlation based features selection (FCI3F) to reduce redundant and noisy data and compress data using principle component analysis (PCA). Experiments results demon- strate that the proposed method is efficiency in reducing the amount of data to be treat of and suitable for intrusion de- tection system
Text Watermarking Scheme for Word Documents
Computer Science. 2012, 39 (Z11): 39-40. 
Abstract PDF(0KB) ( 255 )   
RelatedCitation | Metrics
The advantages and disadvantages of the four existing text watermarking algorithms arc presented. ho en- hance the security and robustness of the watermarking information, the RSA encryption algorithm and 13CH error cor- rection of coding are used. The watermarking is embed by changing the RGI3 component of the document characters. U- sing the random to choose the embed position has improved security of the algorithm. The test shows that the algorithm has high watermarking capacity and great watermarking imperceptibility. The applied situation of the algorithm is intro- duced in the end.
Research on Social Engineering Model Based on Objective Management
Computer Science. 2012, 39 (Z11): 41-44. 
Abstract PDF(0KB) ( 240 )   
RelatedCitation | Metrics
Against the unstructured attack, this paper proposes a model of social engineering based on objective manage- ment,and innovative use of the target model simulates the attack process put forwarded by the former Soviet world chess champion Garry Kasparov. A complete system of social engineering attacks and means of achieving are abstracted for the first time and factors extraction and threats assessment arc used towards such unstructured attack process to es- tablish the mathematical model and conclude the social engineering risk value. Combined with a large number of real case of enterprises, the model can evaluate the security posture of the system and organization before the social engi- necring attacks, and provides reliable data support to prevent such attacks so as to eradicate them.
Method for Capture and Classification of New Intrusions
Computer Science. 2012, 39 (Z11): 45-50. 
Abstract PDF(0KB) ( 241 )   
RelatedCitation | Metrics
As less useful information for new intrusions could be obtained by anomaly detection, a method for capture and classification of new intrusion is proposed. First, in order to improve the performance of the system, an improved al- gorithm for feature extraction is proposed and combining with the other two methods a feature integration system is built to capture anomalous connections. Second, patterns matching plays a role of filtering out the known intrusions, and the remaining new intrusions is as the input to clustering module, through which further classification is carried out, af- ter that the valid information about its class is obtained. Finally, the results of experiment simulation using data set KID D(}UP99 show that the detection method has better detection rate and low false alarm rate, and the method to identify and classify the new intrusions is valid.
Survey of Remote Attestation in Trust Computing
Computer Science. 2012, 39 (Z11): 51-54. 
Abstract PDF(0KB) ( 238 )   
RelatedCitation | Metrics
Remote attestation is one of the highlighted topics of trust computing. This paper analyses and compares three representative types of remote attestation methods proposed. They are; information flow-based method, property-based method and behavior-based method. Principles of the representative techniques are summed up and their limitations are analyzed. Future works in this direction are also presented.
Cluster-based Distributed Consensus Algorithms Based on Connected Dominating Set in WSN
Computer Science. 2012, 39 (Z11): 55-57. 
Abstract PDF(0KB) ( 284 )   
RelatedCitation | Metrics
Distributed consensus algorithms (INCA) have attracted great attention recently because of their convenience in solving many problems such as distributed cooperative parameter estimation. When applied in WSN, DC八needs to meet the requirement of low energy consumption, high liability and real-time. In order to achieve a faster convergence rate, lower energy consumption and to meet the demand of real-time, a class of cluster-based distributed consensus (C13- D(一)algorithms based on connected dominating set (CDS) is proposed. CDS-based clustering algorithms and gossip al- gorithms on clusters arc the two basic components. A CDS construction algorithm based on neighbor connectivity (NC- CDS) is proposed and a clustering algorithm is given based on NCCDS. The performance of CI3IX; algorithms based on different clustering method is analyzed experimentally. The results show that among a variety of CDS construction algo- rithms,NCCDS is the best for improvement of the convergence rate of consensus algorithm
Research on Creating Semantic Overlay Networks Based on Semantic Association
Computer Science. 2012, 39 (Z11): 58-62. 
Abstract PDF(0KB) ( 250 )   
RelatedCitation | Metrics
People need more and more information resource as the development of networks technology. Users not only satisfy the search based on key works. They wish that the network can take the information that users concerned as cen- ter, and oriented to the need, then collecting all the related information. hhis is the concept of semantic association focu- sing services. In order to realize the above require, we propose to build a semantic overlay networks contains semantic association. At first, we organize the nodes to clustering, and compute the semantic association value, then add associa- tion links between the clusters.
Hybrid Algorithm Based on Particle Swarm Optimization and Simulated in Timed Influence Nets
Computer Science. 2012, 39 (Z11): 63-66. 
Abstract PDF(0KB) ( 250 )   
RelatedCitation | Metrics
The timed influence nets arc an emerging formalism which helps a system modcler in connecting a set of ac- tionable events and a set of desired effects through chains of cause and effect relationships in a complex uncertain situa- lion. The objective is to assess the behavior of the variables of interest as a function of both the timing of actions and the receipt of evidence on indicators, thus providing aid to decision makers in the revision of the planned courses of actions. This paper proposes an Simulated Annealing Algorithm (SA) based approach integrating standard Particle Swarm Opti- mization (PSO) for finding effective courses of action (CO八、).PSO is used in specified period at first, then employs S八 to initialize again for avoiding dropping the local best, and the arithmetic is executed iteratively until the ending condi- lion is satisfied. For the sake of efficiency, we arc going implement the arithmetic using MPI. hhe results suggest the approach appears to work well in uncertain situation.
Survey of SCTP Improvement over Wired-cum-wireless Hybrid Networks
Computer Science. 2012, 39 (Z11): 67-71. 
Abstract PDF(0KB) ( 241 )   
RelatedCitation | Metrics
Traditional SCTP (Stream Control Transmission Protocol) has limitations when it is used in wired and wire- less hybrid network environment because SChP is designed to be used for transmission in wired networks and there arc many problems when it is applied in wired and wireless hybrid network environment, Transmission media carrying data presents a wide range of characteristics in wireless and wired hybrid networks, some of which may cause a degradation of SChP performance. hhe author first analyzed the major factors that influence SChP performance under wired and wireless hybrid network environment,and then concluded the main problems under this hybrid networks. Some research work about whether losses are due to congestion or to radio channel errors, congestion control, and path management and asymmetric paths are carefully analyzed and concluded. Finally, some possible research trends of the development of SChP over wireless and wired hybrid networks in the future arc proposed.
Designing and Implementation of Wireless Data Transceiver Terminal Based on GPRS
Computer Science. 2012, 39 (Z11): 72-75. 
Abstract PDF(0KB) ( 240 )   
RelatedCitation | Metrics
Aiming at the problem of environmental monitoring in real-time remote data collection, transmission, remote control and analysis, the Zigl3ee protocol and RF communication on principle are discussed. Through GPRS technology, the remote monitoring of real-time wireless data transmission is achieved. Based on the ARM chip S3C2440 as the core the hardware circuits are designed, in the embedded Linux developed monitor application and the PC software in the VS2005 development. Through MC35i module, communication of GPRS network and Internet monitoring center is a- chieved, so as to provide a good platform for the overall monitoring of the urban environment.
Approach of Analyzing the Smallest Change Domain in Process Models Based on Petri Nets
Computer Science. 2012, 39 (Z11): 76-78. 
Abstract PDF(0KB) ( 211 )   
RelatedCitation | Metrics
For adapting the ctuickly change of business process, determining the change range in business process has been one of the core problems of business process management. "hhe existing proposed methods are to search the change domain by a given node on the basis of static analysis, which had some limitations. In the paper, according to Petri nets and behavioral profile to analyze business process modcls,thc locating method of change domain in business process model was presented from the perspective of dynamic behavior,further the analyzing method of the smallest change do- main in business process models was proposed. Finally, the specific case analysis was given out, which shows the pro- posed method is effective.
Correcting Accuracy Analysis of Multi-sensor TDOA Location Based on Reference Stations
Computer Science. 2012, 39 (Z11): 79-82. 
Abstract PDF(0KB) ( 226 )   
RelatedCitation | Metrics
According to the impact of the location error by the observer's position error and inherent time difference caused by the receiving and preprocessing module and time and frequency reference source and in multi-sensor time difference of arrival(丁DOA) location system, the error calibration algorithm based on reference station in known loca- lion is analyzed. The impact of location is eliminated by substracting the signal TDOA between target and reference, and the observer's position error and inherent time difference arc corrected. Simulation results show that location perfor- mance at the regional near the reference is improved when the reference stations are outside the location blind area.
Application of Bayesian Network in Transmission Lines Running State Prediction
Computer Science. 2012, 39 (Z11): 83-87. 
Abstract PDF(0KB) ( 212 )   
RelatedCitation | Metrics
In order to improve the efficiency of power transmission line inspection, this paper fully considers various fac- tors that influence the running state of transmission lines, establishs the transmission line operation state model based on bayesian network data mining method, and it can make reasonable inspection plan through the forecast results. The SPSS Clementine simulation test show tht this model has higher accuracy.
Automatic Recognition of Digital and Analog Communication Signals Based on Decision Laws
Computer Science. 2012, 39 (Z11): 88-89. 
Abstract PDF(0KB) ( 219 )   
RelatedCitation | Metrics
Digital and analog modulation communication signal is an important characteristic parameters, and the rapid detection and identification of digital analog communication signal modulation,is extremely important in military and ci vilian aspects. Based on law, this paper proposes an automatic recognition algorithm, which can be used to detect and i- dentify 11 types of signals and implementation process of the analysis and simulation results verifies the effectiveness of the algorithm. When SNR)9dI3, the algorithm average success rate of recognition can be)97 0 o. The communication system can be applied to the actual signal for the rapid detection and identification.
Research on Extended OTIS-Mesh Network Architecture
Computer Science. 2012, 39 (Z11): 90-92. 
Abstract PDF(0KB) ( 219 )   
RelatedCitation | Metrics
OTIS-Mesh is a hierarchical structure interconnection network, which has many good topological properties and solves the communication bottleneck problem of the interconnection network. However, we studied the topological properties of the OhIS-Mesh network and found it was not a completely symmetrical network, so some algorithms based on it were not developed easily. To solve this problem, an extended OTIS-Mesh network was proposed, and its topologi- cal properties and routing algorithm were studied. Compared with OTIS-Mesh network, extended OTIS-Mesh network is more symmetrical than OTIS-Mesh, and has better topological properties.
Improvement on the Energy Conservation Protocol of Wireless Sensor Network
Computer Science. 2012, 39 (Z11): 93-95. 
Abstract PDF(0KB) ( 199 )   
RelatedCitation | Metrics
hhe nodes in wireless sensor networks energy is supplied by the battery, and the energy is very limited. hherefore,we need to design more energy-efficient wireless sensor network protocols to support the operation of the network as much as possible extend the effective lifetime of the current study to become one of the hotspots. This wire- less sensor networks extend the effective lifetime of the issues in the following two aspects; Firstly, we improved the protocol about, number(ID). Second, based on the LEACH protocol, we proposed an optimal algorithm for the non-clus- to head nodes to choose the best cluster. The new algorithm considers both the current energy of the cluster-head and the distance when the non-cluster head node determines its cluster. I3y balancing energy depletion over the whole net- work,simulation results show that our algorithm outperforms LEACH protocol and prolongs the network lifetime.
Research on Directional Beam Simulation of Communication Equipment in Virtual Battlefield
Computer Science. 2012, 39 (Z11): 96-98. 
Abstract PDF(0KB) ( 198 )   
RelatedCitation | Metrics
The directional beam of communication equipment can express the ability of communication equipment, and so it is very important to virtual battlefield simulation. This paper constructed directional beam mathematic model, then re- searched the three-dimensional visualization method of the model. At last, the article used VC++6. 0 and OpenGL to realize the algorithm via computer.
Study on the Security Issues and Strategies of Power Soft-switching System
Computer Science. 2012, 39 (Z11): 99-102. 
Abstract PDF(0KB) ( 196 )   
RelatedCitation | Metrics
The evolution from administrative switching and dispatching exchange to soft-switch system in electricity is an inevitable trend. The soft switch system is the packet IP-based data communications system essentially. It must meet the overall security rectuirements of the electric secondary system. hhis paper analyzes the P2DRR secure model and se- cure risk of electric soft switch system. According to the perspective of system secure isolation, it builds private net- works by using MPI_S VPN technology. And according to secure isolation requirements with different systems, it uses secure isolation device to Internet with other power business system network, uses session border control gateway to in- ternet with other soft switch system network, and uses edge communications agent technology to Internet with terminal access network.
Adaptive Dynamic Uniform Clustering Data Aggregation Algorithm for Wireless Sensor Networks
Computer Science. 2012, 39 (Z11): 103-107. 
Abstract PDF(0KB) ( 208 )   
RelatedCitation | Metrics
In order to solve the problem of unable to do data aggregation operation and the problem of unbalanced ener- gy consumption cased by the nonuniform clustering process in the LEACH protocol, an Adaptive Dynamic Uniform Clustering (ADUC) data aggregation algorithm is proposed. In the cluster construct phase of ADUC, the logic area di- vide mechanism and the cluster head energy optimize mechanism arc introduced to ensure the uniformity of cluster head distribution and the energy consumption balance of the network, in the data aggregation phase, the adaptive weighted mechanism is introduced to reduce the redundancy and errors of the monitoring data and control the amount of commu- nication packets. Simulation results prove that ADUC algorithm can not only improve the accuracy of monitoring data but also reduce more than 43. 1 0 0 energy consumption of the network.
Application of Improved BP Neural Network in Predicting of Region GDP
Computer Science. 2012, 39 (Z11): 108-110. 
Abstract PDF(0KB) ( 204 )   
RelatedCitation | Metrics
BP (back-propagation, BP) algorithm is a way widely used in artificial neural networks. However, this algorithm exposes its defects in tardiness of convergence rate and easily falling into partial minimum. Thus,aiming at those defects,measures of improved BP algorithm are adopted by additional momentum and variable learning rate, and the simulation of MATLAB to Guangxis GDP from 2001 to 2010 shows that the multiple BP algorithm is superior to the standard BP algorithm in both convergence rate and accuracy.
Study on Mining Data Streams in WSNs for Environment Monitoring
Computer Science. 2012, 39 (Z11): 111-113. 
Abstract PDF(0KB) ( 208 )   
RelatedCitation | Metrics
In applications of wireless sensor networks for environment monitoring, the monitoring data collected by the sensor is a typical distributed data streams, therefore, there is a great limitation in the processing of monitoring data using traditional static data processing technology. In this paper, wireless sensor networks for environment monitoring,data stream processing mechanism, and changes in magnitude determine the transmission of data according to monitoring data, improve the bandwidth utilization of the environment monitoring system for environment monitoring of streams data characteristics. Pretreatment module on sensor nodes can simplly process data streams, and the base station can make correlation analysis of distributed data streams.
Research on RFID Process Definition Language Based on Cloud Service
Computer Science. 2012, 39 (Z11): 114-118. 
Abstract PDF(0KB) ( 211 )   
RelatedCitation | Metrics
RFID technology is the core technology of application of Internet of Things (IoT). Integrating IoT applications to business process of enterprise system using cloud services saves amount of developing work. I}his paper proposes an RFID process definition language (SPDL) based on cloud services, defines the RFID standard services, which build RFID service flow model in plugin form,designs the parser of process model based on SPDL,which meets the requirements of deploying service flow dynamically, and makes a simulated experiment targeting the tobacco logistic distribution as application object at last.
SOAP-based Things Management Protocol for Internet of Things
Computer Science. 2012, 39 (Z11): 119-121. 
Abstract PDF(0KB) ( 222 )   
RelatedCitation | Metrics
With development of integration requirements for things' information based on different connection technology in Internet of Things, higher level connection-technology-independent protocols arc needed to shield different connection technologies. Things management protocol is one of these protocols and can be used to exchange things' information. Architecture of Internet of Things and necessity of things management protocol are discussed. A SOAP-based things management protocol is designed and implemented, including operations supported, interface definitions for these operations, implementation structure and processing for this protocol.
Information System Model of Administrative Service Center Based on the Internet of Things
Computer Science. 2012, 39 (Z11): 122-124. 
Abstract PDF(0KB) ( 232 )   
RelatedCitation | Metrics
The paper analyzed the existing problems of administrative services center, discussed the application prospects of the Internet of Things technology in the administrative service center, put forward service processes of the administrative service center based on the Internet of Things,and information system model of administrative service center with Two-dimensional code, RFID, mobile Internet as its representative technology. Finally, it gave architecture and implementation of the model.
Designing for the Internet of Things under the Three-stage Method of Search-Oriented Restful Web Service
Computer Science. 2012, 39 (Z11): 125-127. 
Abstract PDF(0KB) ( 206 )   
RelatedCitation | Metrics
The design of the Internet of Things is discussed. Under the threelayer structure of the Internet of Things,a three-stage design method based on search-oriented Restful Web Service is proposed. According to the method, the manu-factoring service management system of the Internet of things projects is designed and implemented. Our study has shown that the threcstage design method based on Restful Web Service is also a critical strategic necessity for the Internet of Things.
Multi-copy Data Integrity Verification Scheme of Research and Design under Cloud Storage Environment
Computer Science. 2012, 39 (Z11): 128-130. 
Abstract PDF(0KB) ( 214 )   
RelatedCitation | Metrics
Cloud computing, with bringing convenience to consumer, also poses new security challenges to consumer data. Where the data integrity is one of the security issues that consumer worry about. We first analyse the deficiency of existing data integrity verification scheme in cloud storage environment, in which we can only validate the individual data file, then present a new improved scheme. The latter not only supports the integrity verification of multiplcreplication data,but also supports the data privacy protection in the process of validation. I3y security and feasibility analysis of improved scheme in more details,we indicate that the improved scheme is secure and effective.
Identification and Positioning Method for VANET
Computer Science. 2012, 39 (Z11): 131-134. 
Abstract PDF(0KB) ( 210 )   
RelatedCitation | Metrics
Identification and positioning arc key technologies for vehicular Ad hoc nctwork(VANEI}),also a hot research topic in recent years. A vehicle identifiable information identification method based on radio frequency identification (RFID) was proposed, and a coding structure using EPG64 type班for vehicle identity information was put forward. I}he global positioning system (GPS) positioning method, the dead reckoning (DR) positioning method and the base station wireless positioning method algorithm and precision analysis were introduced. On this basis, the application priority of GPS positioning method for VANET was confirmed. Finally,a identification and positioning method combining RFID and GPS for VANEI} was proposed. I}he experiment shows that the method preliminary reaches the application rectuirements for VANE?.
Improved Design and Implementation of Adaptive Binary Searching Anti-collision Algorithm
Computer Science. 2012, 39 (Z11): 135-138. 
Abstract PDF(0KB) ( 187 )   
RelatedCitation | Metrics
As an important branch of RFID anti-collision algorithm, binary searching anti-collision algorithm has been facing many new problems when RF)D is been widely used in supply chain for items management Based on the introducing about the traditional binary searching algorithm, the writer designed an improved adaptive binary searching algorithm concerning with system efficiency, consumer privacy and system flexibleness. The writer proved the correctness of the improved adaptive binary searching algorithm with the simulated C program and the theoretical analysis, and comparcel the main performance improvement of the improved adaptive binary searching algorithm with the conventional binary searching algorithm.
Research of Key Technologies of Electronic Evidence Forensics Based on Cloud Computing Environment
Computer Science. 2012, 39 (Z11): 139-142. 
Abstract PDF(0KB) ( 208 )   
RelatedCitation | Metrics
Cloud computing is a method of calculation which provides users with the computing capacity, storage capacity and service capabilities, according to need and the final purpose is user-friendly and greatly reduces the user's hardware and software procurement costs. Cloud computing forensics is a new battlefield, in order to better combat cybercrime in the battlefield, you must come up with some novel methods of investigation. Static electronic evidence, dynamic web-based electronic evidence, the cloud environment of electronic forensics related concepts, key technologies, etc. are reviewed and the key technologies of the electronic evidence collection model in cloud computing environments are discussed. I}hat cloud computing mode of thinking is proposed. It points out the cloud forensics technology development trends.
Micro-blogs Data Collection Based on MapReduce
Computer Science. 2012, 39 (Z11): 143-145. 
Abstract PDF(0KB) ( 213 )   
RelatedCitation | Metrics
Micro-blogs is not only large volumes of data but also high real-time,while it is difficult to obtain sufficient micro-blogs in a short period of time by using traditional Web text crawling methods. To solve the problem about data collection when researching the micro-blogs, this paper presents a data collection platform based on MapReduce which is set up on hadoop platform, and takes full advantage of the characteristics of the hadoop distributed framework to crawler micro-blogs with multi-node at the same time, greatly improving the crawling rate. To solve the problem that the input data of micro-blogs collection is too small that hadoop cannot effectively balance load, this paper presents we can effectively solve the problem with the input of a number of small files. Finally we test sing micro-blogs as an example. The results show that the system is of low cost, scalable, and of high performance. I}his system can be widely used in public opinion analysis, communication and social network based on the data on micro-blogs, as their basic data collection platform.
Sentiment Analysis of Chinese Micro-blogs Based on Emoticons and Emotional Words
Computer Science. 2012, 39 (Z11): 146-148. 
Abstract PDF(0KB) ( 211 )   
RelatedCitation | Metrics
Micro-blog is a new social media platform based on Web 2. 0. Internet users express their feelings, emotions,favorites and disgust through micro-blogs, resulting in a large number of emotional text information. We can know the emotional state of the Internet users, the point of a social phenomenon and preference of a product, through analysis of the emotional text information, which not only has a certain kind of commercial value, and is helpful to the stability of the society. In this paper,we use the emoticons form micro-blogs,combined with emotional words to build the Chinese emotional corpus,ensuring the scale and accuracy of the corpus,eliminating the need for artificial burden. Based on the corpus,we construct Baycs classifier and use the entropy to improve the performance. We compare different performance while changing the type of n-gram. Finally, we get the best classification results using unigrams as features and optimizing with entropy. Recall rate and accuracy can be achieved above 85 0 o,the F measure can even reach more than 89%.
Research on Nearest Neighbor Query Based on Temporal Distance
Computer Science. 2012, 39 (Z11): 149-153. 
Abstract PDF(0KB) ( 202 )   
RelatedCitation | Metrics
The mining technique of moving objects trajectory data is one of the important research branches of moving objects databases, and information derived from trajectory data can be applied to traffic control, climate forecast, ecological study and so on. A formal definition of temporal distance based on the trajectory data is provided firstly,and in order to decreasing the amount of computation in the process of query, this paper uses a relatively simple approximate distance to replace accurate distance. Distance query,instant nearest neighbor query and interval nearest neighbor query based on temporal distance arc implemented on relational model and tree structure. I}he query efficiency of two models is also compared, and the experimental results show that tree structure has better efficiency. In order to further improve the efficiency, this paper adopts embedded index in the tree structure model.
Incremental Within-class Locality Preserving Dimension Reduction Algorithm
Computer Science. 2012, 39 (Z11): 154-158. 
Abstract PDF(0KB) ( 210 )   
RelatedCitation | Metrics
The original batch learning method contains redundant computation on the issue of on-line learning. To improve the learning efficiency, an incremental within-class locality preserving dimension reduction algorithm is proposed in this literature. This algorithm updates the projection matrix immediately after combing the advantages of a dimension reduction algorithm via QR decomposition and the local within-class features preservation kernel fisher discriminant algorithm. At the same time, this algorithm is effective on the data which is multimode or overlapping by considering the local structure and global distribution of the input samples. The experiments on ORL data set and COIL20 data set show this algorithm has a comparative dimension reduction performance with the batch method and a more fast speed.
Automatic Semantic Annotation for Metadata in Databases
Computer Science. 2012, 39 (Z11): 159-162. 
Abstract PDF(0KB) ( 196 )   
RelatedCitation | Metrics
The solution to semantic heterogeneity of the integrated data is a key point in the integration of heterogeneous databases. To aim at adding semantic information to tables and fields in relational databases,automatic semantic annotation for metadata in relational database is a hot spot. In this paper, a semantic annotation method was developed based on similarity algorithms. Firstly,implicit semantic information is extracted from metadata in relational databases,and domain ontologies are created based on the information. Then, the extracted information is annotated automatically by using name similarities and structural similarities between metadata and the ontology entity, and the similarity algorithms are improved. The experiment shows that the method is effective for the task of automatic semantic annotation.
Research on Data Search Algorithm for Heterogeneous Interest Networks
Computer Science. 2012, 39 (Z11): 163-167. 
Abstract PDF(0KB) ( 205 )   
RelatedCitation | Metrics
Through analyzing the characteristics of topology distribution of interest network, a new parameter which describes network interest distribution was introduced. And a aggregation search algorithm ( ASA) for the heterogeneous interest networks was proposed, which uses parameter to find suitable search radius according to the giving search recourse. ASA can select the optimized network according to network delay. Then the selected network uses optimized search method by choosing search radius. The simulation results show that ASA has better performance than traditional data search algorithm.
MySQL Replication Technology and its Applications
Computer Science. 2012, 39 (Z11): 168-170. 
Abstract PDF(0KB) ( 193 )   
RelatedCitation | Metrics
Database replication technology is an important technology which is aimed at improving the concurrency and fault tolerant of database systems. With replication technology, same data can be stored in distributed system. Because multiple database system provides data access services, database response and concurrency have been greatly improved.This paper is based on the current status of database system applications, analyzes and compares the replication technology of several major databases, such as ORACLE, SQL Server, Sybase and MySQL. This paper focuses on MySQL replication technology and its concrete application in distributed database systems. In addition, this paper also proposed a model of chain replication of MySQL in distributed system. All of these achieve the purpose of data replication in distributed system
Research and Application of Automating the Design of Data Mining Algorithms
Computer Science. 2012, 39 (Z11): 171-173. 
Abstract PDF(0KB) ( 225 )   
RelatedCitation | Metrics
This paper brings a solution of the study of automating the design of data mining algorithms. The genetic algorithm is adopted to mine automatically the association rule in data mining, and it brings an automatic mining method of association rules based on genetic algorithm, and associated with the TV shopping project, this paper gives test shows of the algorithm. At last, the algorithm is proved effective via comparing with the traditional Apriori algorithm.
Realization of Data Cleaning Based on Editing Rules and Master Data
Computer Science. 2012, 39 (Z11): 174-176. 
Abstract PDF(0KB) ( 208 )   
RelatedCitation | Metrics
To effectively clean the dirty data among the database,a variety of integrity constraints have been proposed,such as Conditional Functional Dcpcndcncics(CFD) , Conditional Inclusion Dcpcndcncics(CIDS). Even though these constrains are compentent to detect the existence of mistakes,they couldn't effectively guide us to corretc these mistakes,as a mater of fact, data repairing based on these constraints maybe not able to find certain fixs that arc absolutely right,what's more, thay may introduce new mistakes, so it reduced the effenciency of data repairing. Focusing on the above-mentioned demerits, this paper proposed a better data repairing framework; firstly, those fixes which arc based on Editing Rules and Master Data arc bound to be certain, we also provide an an algorithm to automatcly repairing the dirty data; seconldly, the prior step may not repair the whole attributes of the relation, so we employ the CFDto correct the reamining dirty data, unfortunatly, these fixes arc possible fixes which maybe not totally right. Even so, compared with others, the framework show great superiority, not only enhance the efficiency and uniqueness, but slao make sure the percision of data repairing.
Construction of Case-based Reasoning High-speed Machining Database System
Computer Science. 2012, 39 (Z11): 177-180. 
Abstract PDF(0KB) ( 202 )   
RelatedCitation | Metrics
A case-based database model of high-speed cutting for engine parts was built, and a case-based reasoning algorithm was presented to solve the problem of lack of complete and practical database in high-speed machining area. By researching high-speed cutting process of engine parts, this paper analyzed the factors that play important role in cutting process. These factors arc described as process features, which describe cases and arc taken as the case retrieval conditions. A method of calculating the local similarity for each process features, as well as an objective entropy method to determine the weights of process features were presented. Case retrieval is achieved by nearest neighboring method.Through application, the feasibility of the database and the rationality of the cascbased reasoning are proved.
Architecture of Remote Sensing Producing Line for Supporting Multi-task Parallel Proceeding
Computer Science. 2012, 39 (Z11): 181-184. 
Abstract PDF(0KB) ( 207 )   
RelatedCitation | Metrics
In order to meet the production needs of massive remote sensing data products, especially need to solve a problem of high-activity processing of massive remote sensing data products. I}o change the status quo of inefficiency,production of long time, the utilization ratio of computing resources is too low. Through the analysis of remote sensing image data characteristics and remote sensing products production and processing,this paper designs and implements a remote sensing product line model which supports multi-task parallel proceeding. I}his model uses cluster parallel computing technology, combines with distributed data storage and efficient task scheduling strategy. And at last the experimental result shows that the architecture be able to shorten the production time, improve the utilization of computing resources,meet the requirements of the bussiness production in performance.
Rtop-k:A Keyword Proximity Search Method Based on Structure Relaxation
Computer Science. 2012, 39 (Z11): 185-190. 
Abstract PDF(0KB) ( 195 )   
RelatedCitation | Metrics
Recently, most of existing algorithms for keywords search always compute the most compact fragments which contain keywords. However, many of these methods do not take the structure-relationship embedded in the XML document into consideration. For the structural query of XML documents,it always has a higher accuracy as it can capture the information searched by users accurately. In this paper, we combine the methods of structural query together with the keyword information retrieval,and infer the needs of users' query through analyzing the relationship between keywords and the structure of the XMI. document. We introduce the thinking of object-oriented and the query of relaxation into keyword query methods,and propose a new architecture of keyword proximity qucry(Rtolrk). Experimental results show that our method can capture the search-intention of users accurately with high recall and precision.
Recognition of Temporal Expressions and their Types in Chinese
Computer Science. 2012, 39 (Z11): 191-194. 
Abstract PDF(0KB) ( 205 )   
RelatedCitation | Metrics
At present, time expression recognition plays an important role in information extraction, ctuestion answering,summary generation, topic detection and tracking. Then, it has become one of the most important tasks in natural language processing. This article mainly studies two tasks of TempEval-2:the temporal expression recognition in one sentence and the temporal type identification. This paper proposes a method based on rule base,which is generated by "Unit of time" based POS tagging to indentify the time expression, and a method based on ME model to label the type of time expression. The experiments show that the accuracies of the two tasks are respectively 85.16% and 93. 02%.
Design and Development of Database System for Coatings' Cutting Machining
Computer Science. 2012, 39 (Z11): 195-196. 
Abstract PDF(0KB) ( 215 )   
RelatedCitation | Metrics
With the development of Remanufacturing technology, it is widely used in maintenance engineering. But the coatings have peculiar machineability which makes it differ from traditional machining. The processes, from forming to cutting, of remanufacturing coatings was analyzed in this article. The E-R of the database was created. The logic model was obtained after standardization and optimization. The database and data sheets in SQL Server 2000 were created. The database system foreground application programming tools are E-language and database management software is SQL Server 2000. The machining parameters stored in the database provide the reference for relevant people, and the numerical control program can be used in CNC machine.
Research on Modeling and Algorithms for Ranking Approaches of Meta Search Engine
Computer Science. 2012, 39 (Z11): 197-199. 
Abstract PDF(0KB) ( 198 )   
RelatedCitation | Metrics
The key technology of meta search engine is ranking algorithm. Based on the research of ranking algorithms,we establish a reasonable mathematical model to describe basic methods of ranking algorithms for meta search engine through a series of steps including simplification. By combining with market shares and search results of each search engine, we then propose a new ranking algorithm which is simple and easy to implement
Identifying Interleaved User Sessions Based on m-Markov Model
Computer Science. 2012, 39 (Z11): 200-203. 
Abstract PDF(0KB) ( 222 )   
RelatedCitation | Metrics
The data of Web log is record collection of users' access request independently. The task of identifying sessions is to partition the independent access request to session segments. But the general reconstructed session algorithms can't identify the sessions from the Web log which includes many interleaved sessions data. This paper presents an approach for interleaved server session from Web server logs using self-adaptive m-order Markov model combined with server different principles which detect the end of sessions. The proposed approach has the ability to reconstruct interlcaved sessions from server logs. The experiments show that combining rnMarkov model with rewords-punishment policy will achieve a significant improvement in regarding interleaved sessions compared to the traditional methods.
Rules Extraction Method Based on Concept Lattice and its Application
Computer Science. 2012, 39 (Z11): 204-206. 
Abstract PDF(0KB) ( 208 )   
RelatedCitation | Metrics
Concept lattice is an effective tool for rules extraction. First, the rule sets and the general attribute sets are defined under the premise of that all the concepts were known and the lattice structure need not be known in a formal context. Then a rule-generating algorithm of universal application is given, which is a rules extraction method for each type of sample set in the redundant rules set based on the general attribute sets. Furthermore, the related rule subsets can be generated. Finally, the method is used in rules extraction of C-band radio signal, and the experimental results show the method is feasible and effective.
Data Cleaning and its General System Framework
Computer Science. 2012, 39 (Z11): 207-211. 
Abstract PDF(0KB) ( 201 )   
RelatedCitation | Metrics
Data cleaning is one of the important methods to improve data quality. This pare studies data cleaning and system framework from the perspective of comparing data product with physical product and software product, Data quality research is begun from the data cleaning. The status and function of data cleaning is identified from the point of view of the data quality development,and it is compared to default diagnosis and servicing. 10 items of explaination for the data cleaning arc given, and its basic meaning is elucidated roundly. We compare data cleaning and data integration,and point that they arc the two coequal concepts of data quality. A general system framework of data cleaning is constructed. The framework consists of five phases, and they are preparation, detection, location, modification and validation. It could apply to different data cleaning tasks, and is a framework with good flexibility, extensibility, interactivity and loose coupling.
Intrinsic Dimensionality Estimation Based on Manifold Learning
Computer Science. 2012, 39 (Z11): 212-214. 
Abstract PDF(0KB) ( 181 )   
RelatedCitation | Metrics
The locally linear embedding (LLE) algorithm is considered as a powerful method for the problem of nonlinear dimensionality reduction. In this paper, a new method called globally-preserving based LLE (GPLLE) is proposed.It not only preserves the local neighborhood,but also keeps those distant samples still far away,which solves the problem that LLE may encounter, i. e. LLE only makes local neighborhood preserving, but can't prevent the distant samples from nearing. Moreover, GPLLE can estimate the intrinsic dimensionality d of the manifold structure. The experiment results show that GPLLE always achieves better classification performances than LLE based on the estimated d.
Study on the Information Accessing and Anglicizing System of UAV Based on Ontology
Computer Science. 2012, 39 (Z11): 215-219. 
Abstract PDF(0KB) ( 206 )   
RelatedCitation | Metrics
The Chinese ontology by setting the characteristic information reflects the unmanned air vehicles and the kernel techniques and background. The system just combines the Chinese ontology with information search technology, instructed the software to extract the admirable information from the massive and disordered information sea of the Web sites,then achicvs a clear and structural characteristic information and can make comparative analysis and graphical representation. The automatic evolution ontology and efficient matching model, humanized interaction interface, made the system can timely track the UAV development situation all over the world, and provided comprehensive and timely information for researchers. Based on the theory research and practice, the construction of the system and the innovative application of the ontology are provided.
Efficient Data Transmission Mechanism for Compass Based Vehicle Management System
Computer Science. 2012, 39 (Z11): 220-222. 
Abstract PDF(0KB) ( 211 )   
RelatedCitation | Metrics
Compass and GPS positioning technology arc popularly used in the vehicle management systems. The position reporting message is the most frectuent message submitted from vehicles to the monitoring platform,which includes the states of vehicles. In order to improve the efficiency of data transmission and save operating costs, this paper extended the national standard communication protocol JT/T 808-2011. To the single position reporting message,a more effective reporting and handling mechanism has been presented, which would reduce the message length about 40%. For the bulk location data reporting, we optimized the standard LZW algorithm to improve data compression performance. The experimental results on the simulation data and real operating data show that combining the a new location reporting protocol and compression algorithm can reduce about 35% of the data flow.
Research and Implementation of the Radioactive Source Management System POI Accurate Positioning Based on GIS
Computer Science. 2012, 39 (Z11): 223-225. 
Abstract PDF(0KB) ( 173 )   
RelatedCitation | Metrics
At present, the geographic information system has been widely applied to various fields of the society. GIS research and development of the actual system to solve the contradiction between the search coverage and search accuracy have been a research focus of staff attention. Algorithms have been proposed based on basic POI search algorithm by increasing the auxiliary information points to help a fast and accurate positioning of a point of interest. I}his algorithm improves the efficiency of the search. On the basis of these work, using ARCGIS and the VS2010 tools, developes Guiyang radioactive source management system, achieve the basic function of the geographic information system, and using the auxiliary information point POI search algorithm achieves a system of basic search function. These works verify the feasibility of the algorithm
Model Development Environment Research of Embedded Real-time Software
Computer Science. 2012, 39 (Z11): 226-229. 
Abstract PDF(0KB) ( 167 )   
RelatedCitation | Metrics
To guarantee the functional safety and real time of embedded real-time(ERT) software,based on model-driven architecture, this paper researches the architecture of model development environment(MDE) of ERT software, designs a prototype of MDE for ER T software, in which task model is divided into two levels: the upper level is used to model the function behaviors and performance features of tasks and to support formal verification of functional safety and real time; the lower level is used to model tests and to generate task source code supporting APIs of embedded real-time operating systems and driver functions, whereby we implement by tool integration the complete development process of ERT software including modeling, analysis and verification, code generating and testing. The application of this prototype provides a base for further improving the construction techniques in MDE.
Formal Verification of Trusted Connection Architecture
Computer Science. 2012, 39 (Z11): 230-233. 
Abstract PDF(0KB) ( 198 )   
RelatedCitation | Metrics
TCA (trusted connection architecture) is the solution of trusted network of China. TCA specifies the entitics, the interfaces of information exchange among these entities and the behaviors of information exchange among these entities when a terminal with TPCM (trusted platform control module) connects to a trusted network. We give the process algebra description of each entity's state transferring based on the abstraction of the information exchange behaviors of entities in TCA. Formal verification of trusted connection architecture is done by use of axioms of process algebra. Verification result exhibits that TCA has desired external behavior.
Research of Distance Domination Numbers for Bubblesort-star Networks
Computer Science. 2012, 39 (Z11): 234-236. 
Abstract PDF(0KB) ( 198 )   
RelatedCitation | Metrics
For any positive integer L and any graph G= (V , E) , a set D of vertices of G is said to be an l-dominating set if every vertex in V(G)-D is at distance at most L from some vertex in D. L-domination number yi (G) is the minimum cardinality of an l-domination set of G. 1-domination number is also called domination number and is ofen denoted by y(BSn). The bounds of domination number and the distance 2-domination number as well as distance 3-domination number of rrdimensional Bubblesort-star network are investigated in this paper. And above the bounds are improved for some low dimensional Bubblesort-star networks.
Study on the Application of Evidence Theory in Software Requirements Engineering
Computer Science. 2012, 39 (Z11): 237-239. 
Abstract PDF(0KB) ( 193 )   
RelatedCitation | Metrics
Software rectuirement is a kind of uncertain information. Using evidence theory to do ctuantitative analysis of software requirements can clear credibility in different requirements for software and the credibility among requirement, reduce the ambiguity of software requirements engineering so as to offer necessary bases for software design and implementation.
Pi-calculus Based Model of Trust Web Service Composition
Computer Science. 2012, 39 (Z11): 240-244. 
Abstract PDF(0KB) ( 201 )   
RelatedCitation | Metrics
To enhance the credibility of Web service composition, Pi calculus based formal verification of trust Web service composition is proposed. Trust Web service composition is firstly defined abstractly, and then the powerful behavioral theory of Pi-calculus is used to depict structure and internal interaction of trust Web service composition, and the mapping relation between trust entity and Pi calculus is discussed. Automatic reasoner MWI3 is used to analyze and reason the trust Web service composition system, which is aimed at finding and correcting the faults before the execution of trust authentication of Web service composition and meet the users' demands on trust quality effectively.
Interactive Tolerance Relation in Interval-valued Decision Table and Attribute Reduction
Computer Science. 2012, 39 (Z11): 245-248. 
Abstract PDF(0KB) ( 185 )   
RelatedCitation | Metrics
Process of interval-valued decision table plays an essential role in practical problem solving. According to the new notion of relative inclusion degree of intervals,interactive similarity degree of intervals and interactive tolerance relation on interval-valued decision table are proposed, which considers the interactive relation between intervals and improves the accuracy of classification. Attribute reduction and relative attribute reduction in interval-valued decision table based on interactive tolerance relation are then discussed, and approaches for reduction and relative reduction are provided.
Application Research of Improved Cloud Particle Swarm Optimization Algorithm
Computer Science. 2012, 39 (Z11): 249-251. 
Abstract PDF(0KB) ( 196 )   
RelatedCitation | Metrics
In order to solve the problems of optimization efficiency and inferior local search of cloud particle swarm algorithm which is based on cloud digital features (Ex, En, He) , this paper proposes two improvements, combines local search with global search which is based on the solution space transform, and achieves the evolution of the learning process and the variation operation according to the normal cloud particle. The improved algorithm is used to the function extreme optimization of muti-variables. Simulation results show that the improved algorithm has lower generation,higher efficiency, diverse population, and it proves that the improvement is efficient.
Improved Algorithm of Sticker Model in Two Special Problem
Computer Science. 2012, 39 (Z11): 252-255. 
Abstract PDF(0KB) ( 187 )   
RelatedCitation | Metrics
In order to avoid the complexity of filtering the initial solution space and take full advantage of the superiority of sticker model in biological process, an improved DNA algorithm based on the sticker model has been designed. For the minimum dominating set and the minimum vertex cover problem, what has been designed here can generate the solution space composed of all the feasible solutions directly,making the space complexity less than O(2n) and being convenient to screen the optimal solutions. Finally, two concrete examples illustrate the feasibility of the new algorithm.
Research on Formalized Reasoning Algorithm Based on Fuzzy Colored Petri Net
Computer Science. 2012, 39 (Z11): 256-258. 
Abstract PDF(0KB) ( 190 )   
RelatedCitation | Metrics
Petri net has been applied in formalized reasoning widely by its graphics mode, and the formalized reasoning based on fuzzy colored Petri net(PCPN)is formed by the advantages of the traditional fuzzy colored Petri net in reasoning, the logical relationships of the rules, and by application of the fuzzy knowledge, the place abstraction and the transition abstraction to represent the Petri nets in a graphical way with hierarchical classification and colored display. In this way, a new mode of fuzzy colored Petri net in knowledge reasoning and mode achieving is constructed to improve the traditional Petri net effectively and make the course of reasoning and realizing easily.
Extended Pi-calculus for Service Selection Using Particle Swarm Optimization
Computer Science. 2012, 39 (Z11): 259-269. 
Abstract PDF(0KB) ( 178 )   
RelatedCitation | Metrics
An extended Pi-calculus is proposed to model the Qos-aware service selection using PSO(Particle Swarm Optimization). Firstly, the syntactic components are expanded,which include the beam-channel with dimension and concurrency constraints based on channel, paralleling linkage derived from parallel composition and stochastic and cost choice from summation. Secondly, the semantics of the extended Pi-calculus which import the cost measure function and PSO meta-control primitives are illustrated. Finally, based on this target language, the discrete scheme of PSCTDPSO is used to solve a service selection with a real scenario in multimedia conference with the modeling and simulation. The simulation results show that this method can ensure the good performance and scalability.
Particle Swarm Optimization Algorithm and its Application in Location Routing Problem
Computer Science. 2012, 39 (Z11): 270-272. 
Abstract PDF(0KB) ( 195 )   
RelatedCitation | Metrics
An improved particle swarm optimization(PSO) algorithm for location routing problem with soft time windows(LRPSTW) is researched. According to the character of LRPSTW based on a stage to the solution of design thinking with the operational rule for swap operator and swap sequence, the greed mutation operator is used in this proposed algorithm, so that the quality of the solution and the efficiency of the proposed algorithm are feasible and efficient.
Wavelet Transform-based Orthorgonal Matching Pursuit Algorithm and its Application
Computer Science. 2012, 39 (Z11): 273-275. 
Abstract PDF(0KB) ( 191 )   
RelatedCitation | Metrics
In this article, we first presented the basic principle and theoretical model of the compressed sensing, and then we elaborated the matching pursuit (MP) and the orthogonal matching pursuit (OMP),at the last we proposed a new algorithm based on the wavelet transformed by OMP (WOMP). In this algorithm we transform the signal with singlelayer wavclet, after that, we reserved the approximation coefficients and compress the detail coefficients only. OMP is used to recovery the detail one. In the end all the coefficients can be reconstructed by the inverse wavelet transform. Our simulation experiment indicated that, in the same measurements and iterations, WOMP behaved more outstandingly compared with traditional MP and OMP. The recovery rate reached up to 95.2%.
Detection Side Effect in Expressions by Using Attributed Grammar
Computer Science. 2012, 39 (Z11): 276-279. 
Abstract PDF(0KB) ( 189 )   
RelatedCitation | Metrics
Expression is a basic unit of a program. There will be side effect while using increasing operator or decreasing operator in an expression or in a function call. If there is side effect in a program,the result of a program will be abnormal, even more, the computer system will be breakdown. In this paper, the reasons that cause the side effect in an expression arc analyzed and the lexical rule and attributed grammar that can detect the side effect in expression or in a function call are provided. By using the lexical analyzer that generated form the lexical rule and the parser analyzer generated from the attributed grammar, the expressions and function calls that contain side effect can be detected.
Application of Bayesian Networl} to Predicting Students' Achievement
Computer Science. 2012, 39 (Z11): 280-282. 
Abstract PDF(0KB) ( 196 )   
RelatedCitation | Metrics
Students' achievement is an important basis for the evaluation of teaching quality in universities. This paper presented a construction method for main courses Bayesian networks,which use course score as data sample. After the network parameter learning, we have inference and prediction to course score. The results show that the model can reveal effectively the key factors of which affect the course score, and to provide a basis for decision-making.
Study on the Sequence Encoding Method of Protein Subcellular Location Prediction
Computer Science. 2012, 39 (Z11): 283-287. 
Abstract   
RelatedCitation | Metrics
With the advent of the post genome era, the number of protein sequences has grown rapidly. It is difficult to use experimental methods in largcscale analysis of protein subcellular location. In recent years, by using the various features of protein information (the encoding methods) , the algorithms that automatically predict protein subcellular location have been rapidly developed. In this paper, the encoding methods of protein sequence were surnrnarized, and the existing problems of encoding methods and the possible future research were discussed.
Switched Domain Topology Discovery Algorithm Based on Spanning Tree Protocol
Computer Science. 2012, 39 (Z11): 288-290. 
Abstract PDF(0KB) ( 190 )   
RelatedCitation | Metrics
Discovery of switched domain topology of the network is an important part of LAN network management tasks. This paper proposed a switched domain topology discovery algorithm relying on spanning tree protocol. The algorithm gets spanning tree status information of each switch in switched domain by SNMP. According to STP rules,switched domain topology of the network is derived. The algorithm is much easier and more accurate than other existing algorithms relying on FDB information. Now this algorithm is made application to network management in reality suc- cessfully.
Task Analysis Approach for Multimodal Interaction in Command Space
Computer Science. 2012, 39 (Z11): 291-294. 
Abstract PDF(0KB) ( 189 )   
RelatedCitation | Metrics
We first analyzed the constitute factor of command space and built up a structure framework for multimodal interaction. On the basis of the CTT model, we put forward the extend-CTT task model representation methodology and carried out an in-depth analysis of the command space. Finally, based on the research aboved, we designed and implemented a multimodal intelligence discussion prototype system-MTTDS, which verified the theory presented in this paper.
Expanded Application Framework Based on DirectUI
Computer Science. 2012, 39 (Z11): 295-300. 
Abstract PDF(0KB) ( 206 )   
RelatedCitation | Metrics
Along with the development of software technology,the architecture of the software changes majorly. Traditional software architecture has many defects in upgrading, performance optimization. When the upgrading is performed, it need recompile and link the whole code. In the performance, most of the software always loads all modules when it starts. In order to solve these problems, this work bases on dynamic link library, presenting a new software design method. Using this framework, engineers could program the software interface efficiently, loading the modules when it needs. This framework supports expanding. When engineers do the second development, they needn't compile the main framework. Every modules display as dynamic link library, reducing the application's coupling.
Research in Monitoring Performance of Disk in Windows NT System
Computer Science. 2012, 39 (Z11): 301-304. 
Abstract PDF(0KB) ( 186 )   
RelatedCitation | Metrics
Based on Windows NT(5.0) OS,it can monitor the Read-and-write performance of disk under Windows NT in different ways(application layer, kernel layer) so as to improve traditional mechanical drives as well as the performance of SSI).The article introduces the basic framework of ETW mechanism(Event Tracing for Windows);the implement principle of ETW technology; the application of ETW technology in monitoring the Read-and-write performance of physical disk; It also does analyze to the path of reading and writing data from application layer to driver layer under Windows NT,introduces the realization and distinguishing feature of driver HOOK technology in kernel; put forward the concrete implementation in monitoring Read-and-write performance of physical disk of driver HOOK technology;compares the merits and demerits of the two ways. In the end, the article will introduce the application prospect of the realization of Read-and-write performance of physical disk of driving mode.
Design and Research of Infrared Sensor Monitoring System Based on STM32
Computer Science. 2012, 39 (Z11): 305-307. 
Abstract PDF(0KB) ( 192 )   
RelatedCitation | Metrics
In view of the present security system can not ctuickly respond to remote warning, a kind of remote monitoring system Based on STM32 and GSM/GPRS technology was developed. I}he system used ShM32F103 as the main control chip, The alarm signal will send to the mailbox or the user mobile phone by email or MMS. the actual application results show that the system is stable,response fastly,high cost performance,it's very convenient when people are not at home and providing security for safety precautions.
Improved Genetic Algorithm Based on the Assisted Search Method of the Virtual Population
Computer Science. 2012, 39 (Z11): 313-315. 
Abstract PDF(0KB) ( 186 )   
RelatedCitation | Metrics
An improved Genetic Algorithm (GA) based on the virtual population technology was proposed to avoid the frequent occurrences of premature convergence,and this improved algorithm can efficiently jump out of the local optimum. The parameter value of the key genetic operators,such as the selecting,the crossing and the mutating,in the improved GA were unchanged with the increased generation. I}his can avoid the problem of the slow convergence, which was often caused by the improper strategy of changing the parameter value of the genetic operators. The diversity of the real population was increased implicitly by the informational exchange between the real population and the virtual one.Finally, the simulation result indicated that, with the same size population, the improved Virtual Population Genetic Algorithm (VPGA) can jump out of the local optimum within the least generations,and also,can convergent to the globaloptimum at the minimum generation.
Research on the Description Method of Enterprise-level Architecture of Command Information System
Computer Science. 2012, 39 (Z11): 316-319. 
Abstract PDF(0KB) ( 191 )   
RelatedCitation | Metrics
In order to make sure the concepts and meanings of the enterprise level architecture of command information system, and standardize the description of enterprise level architecture, a description method for the enterprise level architecture of command information system is provided. Firstly, the concepts such as definition, effect and characteristics of enterprise level architecture arc researched. Secondly, the description framework of enterprise level architecture is provided, and the views, relations of views and products of this framework are researchedo Finally, a description method with the combination of the object oriented method and description logic method for the products of this enterprise level architecture framework is provided, and the relevant examples are presented.
Multi-core Processor——Technology, Tendency and Challenge
Computer Science. 2012, 39 (Z11): 320-326. 
Abstract PDF(0KB) ( 197 )   
RelatedCitation | Metrics
Multi-core processor has become important developing direction to current micro-processor technology. The paper first introduced the origin and development status of multi core processor, and analyed its developing tendency.Key techniques of multi-core processor including NoC, storage architecture design, programming interface and resource management arc presented. And then, the main challenges to multi-core processor arc discussed.
Low Power Research Based on a New NoC Topology Architecture
Computer Science. 2012, 39 (Z11): 327-330. 
Abstract PDF(0KB) ( 199 )   
RelatedCitation | Metrics
With the improvement of circuit integration, NoC (Network on Chip) is a new development trend of SoC( System on Chip) , and power has become a bottleneck in performance improvement. To reduce the power of NoC, a new topology structure-HMesh (Hexagon Mesh) was proposed and the corresponding routing algorithm-HM was constructed. The power consumption of Mesh, I}orus and HMesh were tested on the platform-Orion. The results show that, compared with Mesh and Torus, the average power of HMesh drops by 12.9% and 11.24% respectively as the networks is not in congestion, so it is more suitable for NoC.
Research on Intelligent Optimal Dispatching Method in Eelevator Group Control Systems Based of PSO
Computer Science. 2012, 39 (Z11): 331-333. 
Abstract PDF(0KB) ( 185 )   
RelatedCitation | Metrics
The dispatching method of elevator group control System (EUCS) is a complicated optimization problem with multi-input and multi-output and it belongs to NP hard ctuestion. In order to solve the dispatching method of EUCS, a new strategy is proposed based of particle swarm optimization in this paper. Each particle stands for a dispatching scheme. Some solutions will be initialized at first, then the dispatching method is optimized in the direction of the shortest average passenger waiting time, ride time and the consumption of elevator energy. The comparative simulation resups show the effective of this algorithm.
Review of Coverage Path Planning Arithmetic in Unl}nown Indoor Environment
Computer Science. 2012, 39 (Z11): 334-338. 
Abstract PDF(0KB) ( 185 )   
RelatedCitation | Metrics
The coverage exploration to the environment which is detected by robots according to self-sensor in the case of global unknown environment is named for coverage path planning in the unknown environment. The algorithm can be divided into three categories; I}he first is the simple random coverage strategy, such as circuitous back and forth; The second establishes the environment contour pattern after the edgeways learning,adopts the algorithm in which the global perspective combines to the local path planning; The last is the wandering detective path planning of dori t adopt edgeways learning.
Design and Implementation of the Open Cloud Platform Based Open Source Online Judge System
Computer Science. 2012, 39 (Z11): 339-343. 
Abstract   
RelatedCitation | Metrics
Designed and Implemented the open cloud platform based open source online judge system from the applicable view. The system resolved a set of problems in deploying online judge system by universities or research institutions, which included implementing, deploying, maintenance and questions acquiring. Discussed the Feasibility theoretically and proved it by running codes and applicable system.By releasing all the source code, provided a new way to improvement online judge system.
Simulation Realization of Configurable Disk Arrays Storage System Based on Multi-module
Computer Science. 2012, 39 (Z11): 344-348. 
Abstract PDF(0KB) ( 185 )   
RelatedCitation | Metrics
Given a simulation of configurable disk arrays storage system based on multi-module. This software supports RAIDO,RAIDl,RAID3,RAID5,RAID6,and adds the RAID5x This software adopts multi-thread technology to simulate the dynamic interaction of the client and storage system. According to user configuration, this software can test the read and write performance of array on normal or degraded status. By experimental tests,the software can be a more realistic simulation of the array storage system. After further optimization, this software will be able to a simulated research platform of disk array performance, reliability, and optimization method.
Development and Application in the Sun Solaris System Based on the GTK+
Computer Science. 2012, 39 (Z11): 349-351. 
Abstract PDF(0KB) ( 196 )   
RelatedCitation | Metrics
It elaborates on GTK+ and Samba's basic concept and key techonloy, mainly introduces how to develop GUI(Graphic User Interface)on the Sun Solarieis system. In the Windows system developing GUI with GTK+,and throughSamba software to complete Sun Solaris and Windows system resource sharing and interaction,realize the across systemfile sharing, visual operation and document processing. I3y the FXP/FTP software executable program is transmitted tothe Sun Solaris shared folders, realization of Sun Solaris system user interface development This method is easy to operarte, especially for users and developers not familiar with programming under Sun Solaris system, and has a friendly interface, strong expansibifity, high reliability, compatibility with a wide and other advantages. Also it can be widely used in the Windows and Solar in the development of transplantation across platform.
Design and Realization of the Educational Information Inquiry System Based on WAP Technology
Computer Science. 2012, 39 (Z11): 352-354. 
Abstract PDF(0KB) ( 184 )   
RelatedCitation | Metrics
With the rapid development of mobile communication technology, WAP as a mature, convenient means of access,has become an important supplement to the wired networko Based on W八P technology, this paper has finished the design and realization of mobile educational information inctuiry system by mobile development component provided by Visual Studio. Multi-data source, mobile form development, device recognize and page render, Cookieless and Session mode, MIME registration, etc. has been focused on the elaboration.
Danjiangkou Ship Lift Control System Design
Computer Science. 2012, 39 (Z11): 355-358. 
Abstract PDF(0KB) ( 183 )   
RelatedCitation | Metrics
Danjiangkou ship lift running,mode is complex Base on running classification control procedure design,will make the design more complex, operating condition variation will result in a large program modification, it is difficult to debug and function modify control process. The ship lift operation conditions in accordance with the operation preparation and operation of two phases, preparation before operation including ectuipment preparation and operation of various operating conditions of identification, operation according to the command of the transmission system control, thus completing the operation process more clearly.
Image Segmentation for Space Target Besed on Differential Box Counting
Computer Science. 2012, 39 (Z11): 359-361. 
Abstract PDF(0KB) ( 190 )   
RelatedCitation | Metrics
This report proposes a new image segmentation method facing space target based on differential box counting(DBC). Firstly,according to features of the natural background of space target, utilizing similarity of fractal theory to analyze nebula background, using pixel region gray variance to obtain the edge between target and background. Secondly, through analyze relation of threshold and the DISC dimension under the threshold, threshold selection method of gray variance is given. Finally, following chart of the image segmentation is given; besides the experiment result also proves that the segmentation can achieve excellent effect.
Study on Tool Radius Compensation at Vector Method
Computer Science. 2012, 39 (Z11): 362-365. 
Abstract PDF(0KB) ( 175 )   
RelatedCitation | Metrics
The traditional method to calculate radius compensation is complicated,with a relatively large amount of calculation. This paper put forward a new method of vector compensation for the tool radius. I3y analysising the tangent vectors intersection angle of processing line at transition point in plane coordinate system, so that to judge different connecting types and by calculating the compensation of the tool radius,we can get the coordinate of every transfer point.Simulation Result shows that this method is simple and practical. And the calculation is significantly reduced compared with the traditional method, especially for the calculating of transfer point, introducing of vector method makes it possesses huge advavtage compared to triangle function method.
New Ideas of Face Orientation Discrimination Based on BP Neural Networks
Computer Science. 2012, 39 (Z11): 366-368. 
Abstract PDF(0KB) ( 190 )   
RelatedCitation | Metrics
BP neural network is a relatively mature solution to face orientation discrimination of a single image. Put forward a new eigenvalue extraction method on the basis of previous studies. Firstly, detect the boundary of the image and make it binary to produce a 0-1 matrix corresponding to pixels. I}hen, obtain the data related to the surrounding areas of eyes by splitting the matrix. Considering the specialty of face image, that is, the interference from the data on side bums,split the matrix again. Secondly, extract two types of eigenvalue. One is the distribution discrete degree of elements whose value is 1; the other is their average distribution position. Finally, construct the neural network by taking a 2-dimention vector of the two eigenvalucs as input and 5 types of face orientation as output. The correct recognition rate of the network is 100%. Comparing to eigenvaluc extraction by PCA, this way is more comprehensible because eigenvalue has more significance in practice. There is no need to find out eye position, so this way is more succinct than geometric methods.
Contacts Calibration of Optical Touch System Based on Image Registration
Computer Science. 2012, 39 (Z11): 369-371. 
Abstract PDF(0KB) ( 196 )   
RelatedCitation | Metrics
In view of the current optical touch system frame, it exists the accuracy restrictions of contacts calibration because of the characteristics of the camera image, this paper researches a high performance contacts coordinates calibration form, and put forward a general contacts calibration algorithm, it expands the adaptability to cameras and the installation environment. Through the introduction of image registration method and the extraction of feature point, it realizes the unification of coordinate; by combining with the dynamic search table algorithm, it improves image registration effieiency. Finally, the validity of this method was verified by theoretical and experimental results.
New Kind of Algorithm Used on Fixed-background Video Compression
Computer Science. 2012, 39 (Z11): 372-374. 
Abstract PDF(0KB) ( 181 )   
RelatedCitation | Metrics
In order to achieve a high compression ratio when compressing videos with fixed background, a new kind of algorithm used on fixed-background video compressing was proposed by improving JPEG still image compression standard. The algorithm separates the JPEG encoding into two parts-lossy procession and lossless procession, reduces compressed data volume by processing XOR operation between frames after lossy procession. The simulation in MATLAB and implementation in FPGA prove that the algorithm can increase the compression ratio effectively, the decomposition will not bring in evident noise, and the algorithm can be implemented in hardware.
New Color Quantization Algorithm Based on K-means Clustering
Computer Science. 2012, 39 (Z11): 375-377. 
Abstract PDF(0KB) ( 186 )   
RelatedCitation | Metrics
Color quantization is a key technology in digital image processing. Based on the segmentation and clustering algorithm for color quantization, this article puts forward a kind of new color quantization algorithm upon K-means clustering. First of all, take a coarse classification to the pixels according to tonal H. Then, take quantization processing to each child clustering group based on k-means clustering color. Through the comparison with the current commonly used quantitative algorithm comes to a conclusion that this algorithm has a better performance in quantization effect and execution tmue.
Automatic Domain Motion Characterization in Video
Computer Science. 2012, 39 (Z11): 378-380. 
Abstract PDF(0KB) ( 194 )   
RelatedCitation | Metrics
Domain motion analysis is an important research area in content based video index and retrieve. We propose a novel approach of automatic detecting video domain motion which doesn't rely on threshold. Based on the motion vectors of feature points, the distribution of motion is estimated by kernel density estimation. A Kullback-Leibler divergence based k-Nearest Neighbor classifier is proposed to classify the camera moving into pan八ilt/zoom etc category.The training samples arc generated automatic according to the character of each domain motion. Experimental results show that our proposed method is capable of achieving both accuracy and robustness.
Description for Partial Characteristics of Medical Image by Uniting Gabor and Fractal Dimension
Computer Science. 2012, 39 (Z11): 381-383. 
Abstract PDF(0KB) ( 192 )   
RelatedCitation | Metrics
A method, joined Uarbor wavelet and fractal together, used to describe the local structure feature of medical imaging tumor boundary is put forward. The method shows the following characteristics; using Mcycr cartoon-texture image decomposition model, describing local scale by using scale-space kernel function, measuring scale by the characteristic difference in adjacent scale curvature, extracting structure irregular feature based on local fractal detention of boundary. Thus, this description method for medical imaging tumor boundary has more diagnostic significance.
Iris Location Algorithm Based on Ant Colony and Hough Transform
Computer Science. 2012, 39 (Z11): 384-385. 
Abstract PDF(0KB) ( 198 )   
RelatedCitation | Metrics
In order to improve the speed and the precision of iris location, iris location algorithm based on ant colony and Hough transform was proposed. In the algorithm,the ants search iris edge by the gradient information of iris edge. And then, the boundary-points of iris are gotten according to the constantly increasing pheromone on the path which ants passed through. At last, we can locate the iris in the original image by Otsu threshold and Hough Transform method.The results of experiments show that the proposed algorithm can locate iris accurately and quickly.
Overview of the Chinese Voice Synthesis Technique
Computer Science. 2012, 39 (Z11): 386-390. 
Abstract PDF(0KB) ( 192 )   
RelatedCitation | Metrics
With 30 years development of Chinese voice synthesis techniques, many new technologies and patterns have sprung up. The essay firstly introduces the theory of Chinese voice synthesis system. Then, by comprehensive compare among synthesis techniques that have already existed, the essay j ust focuses on the better ones and elaborates on the implementation technique of four key modules, which are text analyzing, rhythm controlling, voice synthesis, and corpus building. Besides, a common scheme is proposed according to the development of Chinese voice synthesis technique based on the embedded device and PC platform. It can be a reference for further research on Chinese voice synthesis system.
SIFT Algorithm on the CUDA-accelerated Real-time Character Recognition and Positioning
Computer Science. 2012, 39 (Z11): 391-394. 
Abstract PDF(0KB) ( 193 )   
RelatedCitation | Metrics
Firstly, Directshow technology used in the video image to detect moving targets, and on this basis, the video image segmentation and recognition,and finally achieve the image recognition and positioning of the head and the body.Video image processing and recognition using finite difference method and the SIFT characteristics of the pattern mat ching body and head mainly to complete the identification and location. SII门气algorithm on the CUDA-accelerated can get better recognition speed and recognition accuracy by experimental validation, and solve some technical problems of image rccogmtion.
Hyperspectral Images Compression Algorithm Based on Contourlet Transform
Computer Science. 2012, 39 (Z11): 395-397. 
Abstract PDF(0KB) ( 196 )   
RelatedCitation | Metrics
The hyperspectral images compression algorithm based on contourlet transform is proposed, which using multiscale geometric analysis for hyperspectral image space de-correlation. Firstly, wavelet based contourlet transform on each band of hyperspectral images, then predict current band by transform coefficients of the previous band. Finally,SPIHT coder used on prediction error and embedded data stream generated. Experimental results show that the proposed algorithm based on contourlet transform achieve well compression efficient and retain high spectral image texture information better than comparison algorithm.
New Method for Modified Histogram
Computer Science. 2012, 39 (Z11): 398-401. 
Abstract PDF(0KB) ( 182 )   
RelatedCitation | Metrics
Modified histogram to make the image as a whole or a part of the gray-scale transformation of gray, is an important aspect of image enhancement. Mature modified histogram, histogram Equalization and the provisions of the law.This histogram extension method,which features both balanced and provisions of the law. This law defines the concept of transformation than departure raises rates,high and low-side transformation from original image histogram adjusted than determine new histogram of an image, resulting in a new image in order to achieve the purpose of gray-scale transformation on the original image. Applies the law of CT image processing have obtained satisfactory results.
Research of Figure Transmission,Message Collection and Remote Control System Based on 3G Net and Micro-power Ad hoc Network in MCU Control
Computer Science. 2012, 39 (Z11): 400-401. 
Abstract PDF(0KB) ( 191 )   
RelatedCitation | Metrics
Based on MCU control various function modules, making a kind of figure transmission, message collection and remote control system by 3G net and micro-power Ad hoc Network. This system can use Internet, 3G, wireless WIFI Ad hoc network monitor field or collect data,and can control electrical equipments by power line carrier. Every system uses modular design. According to the need, a new system can be established. hhis article introduce this system and working flow.
Texture Transfer Technique Based on Deviation Mapping
Computer Science. 2012, 39 (Z11): 402-405. 
Abstract PDF(0KB) ( 185 )   
RelatedCitation | Metrics
In order to improve the speed and accuracy of 2D image texture transfer,a deviation mapping algorithm was proposed. Traditional technology usually used texture synthesis method to realize texture mapping effects. However,these methods cost much time. hherefore, based on the technology of Phong illumination model, we establish our me thod for obtaining artistic appearances taking the deviation mapping as the underlying basis, and the foreground image paints in this virtual surface can be illuminated to generate the final effect, The proposed method can obtain gray and color results. In additional,the texture sample can be mapped to the local region of input image. hhe experiment results show that the algorithm has better real-time and achieve satisfactory artistic effects.
Fingerprint Matching Algorithm Based on Similar Principle of Ridge Lines
Computer Science. 2012, 39 (Z11): 406-408. 
Abstract PDF(0KB) ( 180 )   
RelatedCitation | Metrics
This paper discusses the extraction and matchingof fingerprint's features, using the 8-Neighborhoods algorithm to gainthe endpoint' scharacteristicsof fingerprint, and in the meantimeproposes the triangular fingerprint matching algorithm based on the similar ridge line. The kernel of this algorithm is constructing vector triangles and further matching them according to all the extractedendpoints and bifurcationsof the extractedfcatures. Firstly, matching the similar ridge line based on the extracted endpoints, finding the matching endpoints, and then performingthe triangleon similarly matching purpose. I}his algorithm effectively reduces the number of matching triangles and accordingly accele-rates the matching speed. Finally, using Matlab put the fingerprint identification system into practice. The results show that the algorithm is able to achieve a certain degree of recognition.
Validation Environment of Software Architecture Based on OCL
Computer Science. 2012, 39 (Z11): 409-414. 
Abstract PDF(0KB) ( 196 )   
RelatedCitation | Metrics
In the research of software architecture, how to ensure the consistency of the software architecture has become a very important issue. Proposed in this paper is a development and validation environment of the consistency of software architecture based on OCL. I3y defining software architecture constraints before modeling and checking model in real-time while modeling and after modeling to provide a way to ensure the consistency of the software architecture.It makes the environment easier to use and more reliable. Designed and implemented a prototype architecture modeling tool Artemis-GOdE.
Research and Analysis of the Novel SQI. Injection Technique
Computer Science. 2012, 39 (Z11): 415-417. 
Abstract PDF(0KB) ( 183 )   
RelatedCitation | Metrics
SQL injection technictue is mainly through the submission of abnormal SQL query, bypassing the database access restrictions, check out the website user information, including the web site administrator, user data. The permission of the webmaster of the site can be obtained by using SQL injection, so it cause a very serious impact The novel SQL injection technology and traditional SQL injection technology, although both the principle is the same, but the former joined the attack techniques of many of the latest applications, injection means arc different This paper analyzes the eauses of SQL injection,and the combined SQL injection firewall source code,a detailed analysis of three novel SQL injection technology.
Adjoint Vector Method-based Optimal Disturbance Rejection for Multiple-delay Systems
Computer Science. 2012, 39 (Z11): 418-423. 
Abstract PDF(0KB) ( 195 )   
RelatedCitation | Metrics
The paper considers the optimal disturbance rejection problem for continuous-time systems with state, controy and measurement delays. Firstly, the conditions of system transformation are analyzed and the approach is proposed, based on which the original system is transformed into one without delays. Then combining the system and the exosystem to an augmented system, the optimal disturbance rejection control problem is converted to an optimal state regulator problem. The necessity is proved by using Pontryagin minimum principle and the sufficiency is proved applying dynamic programming. hhe physical unrealization problem of disturbance vector and optimal performance index is solved by defining an adjoint vector. Finally, numerical simulations arc made to compare the system responses using some different control laws. The effectiveness and simplicity of the designed control law are demonstrated.
Modeling and Analysis of Wireless Sensor Networks Based on AADL
Computer Science. 2012, 39 (Z11): 424-427. 
Abstract PDF(0KB) ( 184 )   
RelatedCitation | Metrics
It presents the application of Architecture Analysis and Design Language (AADL) for modeling of wireless sensor networks, and introduces a careful analysis of wireless temperature sensor. Firstly, the structure language AADL is introduced along with its advantages of modeling in embedded systems. Secondly, features and key technologies of wireless sensor networks are provided. Based on AADL, structure and function of the wireless temperature sensor are introduced, explaining the internal structure and the working principle of the temperature sensor, which plays an important role in improvement and extension in practical applications and helps a further applied to the sensor networks.
Design and Implementation of Resource Replication Based on Thread Pooling
Computer Science. 2012, 39 (Z11): 428-433. 
Abstract PDF(0KB) ( 193 )   
RelatedCitation | Metrics
To organize and manage distributed and heterogeneous resources effectively in the distance education environment, a remote education resource management system resource management model based on hierarchical modeling is proposed. On that basis, asynchronous resource replication strategy based on thread pooling technology and asynchronous message communication mechanism between distributed resources is put forward, which mainly solves resource sharing and access problems brought by heterogeneous, distribution and dynamic distance education resources.Finally, the validity and efficiency of the presented strategy is demonstrated by the experimental results.
Design and Implementation of Process System Supporting Process Dynamic Updating
Computer Science. 2012, 39 (Z11): 434-439. 
Abstract PDF(0KB) ( 179 )   
RelatedCitation | Metrics
As the Internet platform is opening and changing, the business processes need to be dynamic updated when running, at the same time, the instances under the original model must be migrated to the updated process model. This thesis designs a process system to support dynamic updating. In model level, AOP(Aspect Oriented Programming) is used to construct the new model when instances arc running. In engine levcl,modifying the existing engine so that running instances can be suspended and resumed, thus supporting the dynamic migration of instances. In instance level, an instance migration algorithm is put forwards to support model dynamic updating. At last, an example is used to verify the correctness of our system.
Design of the Electric Power System's Security Monitoring System Based on Classified Protection
Computer Science. 2012, 39 (Z11): 440-442. 
Abstract PDF(0KB) ( 193 )   
RelatedCitation | Metrics
With the construction and development of the electric power informatization, electric power enterprise has established the basic information security protection system, take a lot of security measures, its increasingly important for security monitoring and management According to GB/T 22239-2008 and baseline for classified protection of power industry information system, the framework of electric power information security protection monitoring system based on classified protection is presented, and security event correlation analysis rules arc designed in this paper. Using the electric power system's security monitoring system, security events can be quickly and accurately locate and enhance emergency handling ability of the electric power system security protection system.
Review of QoS-driven Cloud Computing
Computer Science. 2012, 39 (Z11): 443-448. 
Abstract PDF(0KB) ( 195 )   
RelatedCitation | Metrics
Cloud computing is an emerging network computing paradigm, which focuses on the services. Cloud computing aims at providing its customers with a content quality of service (QoS) and thus researches on QoS-driven cloud has been an demanding topic. Based on the quality of services, the basic theory and status of Qo}driven researches relevant to cloud computing are introduced. Then, the key frameworks and techniques on QoS-driven cloud are discussed.Some problems of the cloud computing environment concerning QoS are put forward in the end.