Started in January,1974(Monthly)
Supervised and Sponsored by Chongqing Southwest Information Co., Ltd.
ISSN 1002-137X
CN 50-1075/TP
CODEN JKIEBK
Editors
Current Issue
Volume 40 Issue Z6, 16 November 2018
  
Survey of Model Checking
WANG Zhen-zhen
Computer Science. 2013, 40 (Z6): 1-14. 
Abstract PDF(1387KB) ( 2210 )   
RelatedCitation | Metrics
Model checking is an important technique in software/hardware verification,and it has become an enormous system of methodologies.Now we investigated the contents of model checking from three categories which are standard methods,abstract interpretation methods and integrate methods respectively.The aim of this survey is making one to have a complete impression about model checking.In this way one may fully understand and grasp the spirits and concrete contents of every method in model checking.The studies help in applying these methods to the piratical software/hardware verification,and furthermore,inspired of this,one may develop new model checking theories or new methods or tools of model checking.
Improved Differential Evolution Algorithm Based on Mutation Strategy of Tournament Selection for Function Optimization
FU Si-peng,QIAO Jun-fei and HAN Hong-gui
Computer Science. 2013, 40 (Z6): 15-18. 
Abstract PDF(438KB) ( 1117 )   
References | RelatedCitation | Metrics
The traditional mutation strategy of differential evolution algorithm can not reach a good tradeoff between robustness in global convergence and the search efficiency.The operators are constants,and the differential evolution algorithm leads to many problems,such as the low search efficiency and the premature convergence.Based on analysis of performance of the mutation strategies,a new mutation strategy with tournament selection rule taking the best individual vector from the random individual vectors as the base vector was proposed in this paper.Meanwhile,selecting the direction for the difference vector beneficial to search and making strengthen on the difference vectors is to improve the convergence rate and maintain the diversity of population.The random normal scaling factor F and the time-varying crossover probability factor CR are used synchronously to advance the local search and global search.Finally,the improved differential evolution algorithm was tested on four benchmark functions.The simulation results show that the improved algorithm can effectively avoid the premature convergence,as well as improve the global convergence ability and the search efficiency remarkably.
QoS Aggregation for End-to-End QoS Requirement in Service Composition
LIU Zhi-zhong,WANG Yong,HE Yi-hui and PENG Hui
Computer Science. 2013, 40 (Z6): 19-21. 
Abstract PDF(336KB) ( 762 )   
References | RelatedCitation | Metrics
While service individual’s QoS description is from its own viewpoint,there is a semantic gap between these services’ description.Based on a hierarchical ontology model,a QoS ontology model was proposed,which establishes the relationship between user QoS and service QoS.And the QoS aggregation mechanism was studied for several basic structures.A QoS aggregation algorithm was proposed to aggregate the QoS of whole composite service.Further,A QoS translation algorithm was discussed to translate service QoSs to user QoSs,and it satisfies the end-to-end QoS requirements.
Hierarchical Agent in Military Analysis Simulation for On-line Decision Support System
YANG Mei,YANG Shan-liang,ZHAO Xin-ye,YANG Zheng-jun and ZHOU Yun
Computer Science. 2013, 40 (Z6): 22-26. 
Abstract PDF(443KB) ( 1512 )   
References | RelatedCitation | Metrics
Command and Control(C2) are one of the major objects in Military analysis simulation for on-line decision support system.Hierarchical Agent-based framework was proposed to modeling C2and the relationship between them with three layers which are strategic level,tactical level and execution level.The implementation of the models was complied with the simulation engine of BOM-based HPC-RTI.The example of Air-Ground system illustrates the application of the proposed approach.
Optimization of Weights of LVQ Clustering Algorithm Based on Immune Clonal Algorithm
ZHANG Xiao-dan and HUANG Hai-yan
Computer Science. 2013, 40 (Z6): 27-28. 
Abstract PDF(232KB) ( 708 )   
References | RelatedCitation | Metrics
A major problem of learning vector quantization(LVQ) clustering algorithm is its sensitivity to the initialization,affecting the clustering precision.This paper fist introduced the theory of LVQ clustering algorithm,then used immune clonal algorithm to optimize the initial values of LVQ.And the paper used IRIS data to test this new method.Comparing the evolving LVQ with the standard LVQ,the experiment results indicate that the approach of LVQ based on immune clonal algorithm has obvious stability to initial weights.
Research on Representation Arithmetic of Radar Detection Range in Complicated Terrain Environment
BAI Yu-bing,YU Xiao-you,CHEN Shou-zhe,YIN Ling and CHEN Tie-jun
Computer Science. 2013, 40 (Z6): 29-32. 
Abstract PDF(582KB) ( 1016 )   
References | RelatedCitation | Metrics
Through analysis of the relative position between the borderline of radar coverage and the height of digital terrain,the correction arithmetic of radar coverage influenced by complicated terrain was proposed,which is based on the principle of geometrics optics.Finally,the correction of radar coverage in complicated terrain was realized,which uses the propagation attenuation theory of the radar electromagnetic wave,the method of mixed sampling and the correction arithmetic.The result of experiment shows that this method not only is efficient for the complicated terrain,but also can make the visualization lifelike.
Particle Swarm Optimized Particle Filter Based on Metropolis-Hastings Mutation
LU Wei and ZHANG Bang-ning
Computer Science. 2013, 40 (Z6): 33-36. 
Abstract PDF(335KB) ( 1019 )   
References | RelatedCitation | Metrics
A particle swarm optimized resampling method for particle filter based on Metropolis-Hastings(MH) mutation was proposed for improving estimation performance and particle impoverishment problem in the particle filter.The new algorithm chooses the MH moving as a mutation operator of particle swarm optimized,combines the mutation operator with velocity-position searching progress,and generates the particles so that their stationary distribution is a target posterior density.The new algorithm solves the problem of particle divergence effectively,speeds up the convergence rate,and improves the estimation precision.The simulation results show that the PSO resampling based on MH mutation can remove the degeneracy phenomenon and improve the tracking estimating effects in non-line system.
Research on Architecture of Intelligent Manufacturing Based on Cyber-physical System
ZHANG Cai-xia,CHENG Liang-lun and WANG Xiang-dong
Computer Science. 2013, 40 (Z6): 37-40. 
Abstract PDF(422KB) ( 1940 )   
References | RelatedCitation | Metrics
The characteristics and functions of cyber-physical system provide effective thinking and approach for discrete manufacturing intelligent production and competitiveness.Based on the existing networking and the concept of CPS and combining the existing discrete manufacturing industry structure characteristics,we constructed a discrete manufacturing physical system basic framework based on the CPS,at the same time,the framework and the corresponding function module were analyzed.Finally,several important research problems associated with the existing discrete manufactu-ring of CPS,including the discrete manufacturing CPS basic theory and system model,system optimization scheduling and autonomous mechanism,safety,reliability,system verification and so on,were elaborated.
Application of PSOEM-LSSVM in Medium and Long Term Power Load Forecasting
DUAN Qi-chang,ZHOU Hua-xin,ZENG Yong and ZHANG Guang-feng
Computer Science. 2013, 40 (Z6): 41-43. 
Abstract PDF(247KB) ( 721 )   
References | RelatedCitation | Metrics
For medium and long term power load forecasting,considering the factors affecting medium and long-term power load,a method based on the particle swarm optimization with Extended Memory(PSOEM) and Least squares support vector machines(LSSVM) was proposed for medium and long -term load forecasting.PSOEM has more extensive capability of global optimization than PSO owing to higher accuracy and convergence rate,so it is used to optimize the parameters of the LSSVM,and obtains an optimum PSOEM-LSSVM model to forecast the load.An example simulation shows that this method can offer a higher precision and speed of forcasting than several other methods.
Study on Finer-Grained Privilege Model for MIS Based on Domain-driven
ZHANG Zhong-jie,YU Xin and WANG Gao-cai
Computer Science. 2013, 40 (Z6): 44-49. 
Abstract PDF(559KB) ( 1179 )   
References | RelatedCitation | Metrics
Privilege management is an very important part for management information system(MIS).Nowadays,the existing privilege management methods are coarse or confused,and they can’t implement integrated and elaborate privilege management.On the other hand,others privilege management schemes maybe good,but they can’t match current mainstream software development models and frameworks,and can’t provide better exercisablility.Therefore,this paper improved and refined traditional RBAC model based on domain-driven to construct and implement a finer-grained privilege model for MIS.The paper also showed the whole privilege management process for constructing,and provided a whole solvable project for developing privilege management.
Partition Algorithm of Animal Foci Distribution Based on Spatial Clustering Analysis
GUO Mao-yun,PAN Li-juan,JIANG Hong-qi and CHAI Yi
Computer Science. 2013, 40 (Z6): 50-53. 
Abstract PDF(360KB) ( 723 )   
References | RelatedCitation | Metrics
The reasonable effective configuration of epidemic prevention and management resources(personnel and equipment,etc.) is one of the main concerns about animal epidemic prevention system.This paper proposed a method to classify and divide foci based on a spatial clustering method and a principle of maximum included angles.Firstly,the K-Means clustering analysis method was applied to the foci distribution and realized the classification of foci by intimate or distant relationship.Secondly,based on the principle of maximum angle,determined the boundary line of each classification.By above methods,realized the foci classification division according to the spatial relationship and got divided area,so that epidemic management personnel could get decision support to effectively monitoring and analyzing epidemic spatial distribution model,controlling and preventing the spread of the animal epidemic information.
Research on Optimal Test Selection Based on Fused Algorithm
LIU Gang,LI Fang and DI Peng
Computer Science. 2013, 40 (Z6): 54-57. 
Abstract PDF(352KB) ( 684 )   
References | RelatedCitation | Metrics
Test optimization selection is a set cover problem,and heuristic algorithm for set covering problem is effective method.A genetic simulated annealing neural network fused algorithm was proposed by fusing the genetic algorithm,BP neural network and the simulated annealing algorithm,the genetic algorithm global search ability,strong ability of BP neural network training algorithm and fast search ability of simulated annealing algorithm were made full use of in this algorithm,the phenomenon falling into local optimum was avoided,and also the search efficiency and accuracy wad improved,the algorithm is applied to solve the test optimization selection problem.Example proves,this algorithm can effectively and quickly obtain test the optimal solution of optimization problems.
Applications of Memristive Cellular Neural Network in Car License Plate Location
ZHANG Feng-qing,DUAN Shu-kai,WANG Li-dan and HU Xiao-fang
Computer Science. 2013, 40 (Z6): 58-60. 
Abstract PDF(802KB) ( 834 )   
References | RelatedCitation | Metrics
Memristive cellular neural network(MCNN) was proposed in this paper,which combines novel nano-scale circuit device-memristor with cellular neural network(CNN).It has smaller size,lower power consumption and faster computation speed than that of traditional CNN.Then the MCNN was employed for preprocessing of car license plate location.The corresponding computer simulation results demonstrate the effectiveness of the proposed system.This proposed MCNN is expected to be easier for the hardware implementation,useful for improving the speed and efficiency of the car license plate recognition.
Novel Algorithm for Single Channel Blind Separation
ZHAO Wen-hong and WANG Wei
Computer Science. 2013, 40 (Z6): 61-63. 
Abstract PDF(478KB) ( 698 )   
References | RelatedCitation | Metrics
As an important branch of signal processing,single channel blind separation has received more and more attention in recent years.Particle filtering and evolutionary algorithm can both use a population of particles approximate optimal solutions sets,and each method has its own advantages.In this paper,combining the two methods,we proposed an algorithm for single channel blind separation.Not only does it exploit the accuracy of the particle filtering,but it takes advantage of the good convergence of the evolutionary algorithm.For co-frequency signals,we used the frame of particle filtering,do important sampling with roulette wheel selection,and estimate current state by Maximum Likelihood sequences estimation(MLSE).
Novel Genetic Algorithm for Multi-objective Optimization Problem
HAN Li-xia
Computer Science. 2013, 40 (Z6): 64-66. 
Abstract PDF(310KB) ( 1632 )   
References | RelatedCitation | Metrics
For multi-objective optimization problems(MOP),a new algorithm was proposed.The nondominated direction was firstly defined.Then,a new crossover operator and a mutation operator were presented based on the definition.Finally,the computer simulations on benchmark problems demonstrate that the proposed algorithm is effective and can find high quality solution set in terms of convergence,diversity,and the distribution of the obtained Pareto optimal solutions.
Quantum Genetic Evolutionary Algorithm for Bin Packing Problem
GUO Jing and CHEN Xian-fu
Computer Science. 2013, 40 (Z6): 67-69. 
Abstract PDF(332KB) ( 1064 )   
References | RelatedCitation | Metrics
Aiming at the problem of the genetic algorithm’s system maintenance ability,the paper presented a quantum-inspired evolutionary algorithm for layout and optimization of bin packing problem.This algorithm adopts quantum bit coding and quantum improving mutation.According to the specific situation of bin packing problem,the corresponding rotation gate updating strategy was devised and genetic operation was introduced.Furthermore a new repair strategy called modified complete and best fit algorithm were proposed.Finally,the eight testing sets were tested.The experimental results show this algorithm has a higher performance in maintaining the population diversity of genetic gene and improving the quality of optimization.
Research on Applications of Modern Modal Logic in Computer Science
CHEN Zhi-yuan,HUANG Shao-bin and HAN Li-li
Computer Science. 2013, 40 (Z6): 70-76. 
Abstract PDF(681KB) ( 2487 )   
References | RelatedCitation | Metrics
Modern modal logic is set up on the basis of classical mathematical logic,and mainly includes narrow modal logic,deontic logic,epistemic logic,belief logic,temporal logic and dynamic logic.With the emergence of the Kripke semantic model,modal logic has become one of the most important branches of logics,and has been successfully applied to many fields such as mathematics,economics,social science,computer science and quantum mechanics.This paper introduced the main contents of modern modal logic,and mainly overviewed the following three application aspects of modern modal logic which include programming language,knowledge representation,multi-agent system,model checking,mechanical theorem proving and no monotonic logic.At the same time,this paper presented the research targets,the research advances and the development trend of modern modal logic.At last,the paper pointed out the problems in research on modern modal logic and suggested the trend of future development and research.
Survey of State Explosion Problem in Model Checking
HOU Gang,ZHOU Kuan-jiu,YONG Jia-wei,REN Long-tao and WANG Xiao-long
Computer Science. 2013, 40 (Z6): 77-86. 
Abstract PDF(1014KB) ( 3370 )   
References | RelatedCitation | Metrics
Model checking has become an important approach to ensure the correctness and reliability software systems.However,with the increasingly powerful software functionality,system scale and complexity are also growing.Then it is easy to produce state explosion problem in model checking process.How to solve the state explosion in model checking has become an important issue that can not be avoided by the industry and theorists.In this paper,we overviewed the key technology and main methods of solving state explosion problem,and proposed the latest research progress and direction in this field of model checking.
Improved Geese Swarm Optimization Algorithm Based on Gaussian Weighted Sum
ZHUANG Pei-xian and DAI Sheng-kui
Computer Science. 2013, 40 (Z6): 87-89. 
Abstract PDF(596KB) ( 703 )   
References | RelatedCitation | Metrics
In order to improve the optimization performance for PSO,through observation and analysis of the natural phenomenon of formation flight of geese,researchers at home proposed the geese swarm optimization algorithm(GPSO).Although this algorithm has improved performance for PSO in some extent,the mechanism of average-weighted for GPSO is unreasonable,namely the defect of minimum optimization.For this issue,this paper proposed the geese swarm optimization algorithm based on gaussian-weighted(GWGPSO) through reasonable improvements of GPSO.The experimental results show that the new algorithm has improved these indicators,such as convergence precision,convergence rate and robustness,which proves that the gaussian-weighted method is reasonable and correct.
Construction Principles and Algorithms of Concept Lattice Generated by Random Decision Formal Context
LIU Bao-xiang and LI Yan
Computer Science. 2013, 40 (Z6): 90-92. 
Abstract PDF(327KB) ( 728 )   
References | RelatedCitation | Metrics
The concept lattice was proposed based on binary relations concept hierarchy for data analysis and rule extraction.For random decision formal context,this paper discussed the mathematical concept of random decision formal context random,and proved the existence of random concept Galois connection,proposed the construction algorithm of random concept lattice.Finally,the case proves its effectiveness.
New Algorithm for Sparse Signals Reconstruction
QI Ping
Computer Science. 2013, 40 (Z6): 93-95. 
Abstract PDF(201KB) ( 793 )   
References | RelatedCitation | Metrics
The class of 1 norm regularization problems has received much attention recently because of the introduction of “compressed sensing” which allows signals to be reconstructed from small amounts of data.With an equivalent form of least squares problem and some techniques of Bregman iterative methods,we induced a derivation of A+ linear Bregman iteration method that is equivalent to the one that exits.
High Order Matrix Multiplication by MapReduce Algorithm Based on Hadoop Platform
XIANG Lin-hong,CHEN Yu-wen and ZHANG Yu-lin
Computer Science. 2013, 40 (Z6): 96-98. 
Abstract PDF(245KB) ( 1404 )   
References | RelatedCitation | Metrics
Currently,high-order matrix multiplication using single-node computer causes computational bottlenecks and even leads the computer to crash for memory overflow.Taking advantage of distributed processing and virtualization technology from cloud computing,this paper presented a new method of high-order matrix multiplication by MapReduce based on Hadoop platform.The experimental results show that this algorithm can solve the computational bottlenecks with respect to high order matrix multiplication matrix and improve computational efficiency accordingly.
Improved Bounded Model Checking on Verification of Valid ACTL Properties
XU Liang and YU Jian-ping
Computer Science. 2013, 40 (Z6): 99-102. 
Abstract PDF(305KB) ( 804 )   
References | RelatedCitation | Metrics
SAT-based bounded model checking has been introduced as a complementary technique to BDD-based symbolic model checking in recent years,and a lot of successful work has been done with this approach.The success is mostly due to the efficiency of error-detection.Verification of valid properties depends on a completeness threshold that could be too large to be practical.In order to check the valid ACTL properties,the encodings in traditional bounded model checking should be changed.Also,some improvements have been done for this method to improve its efficiency and enlarge its application fields.
Application of Optimization Algorithm of Vague Sets in Transmission Scheme Optimum Seeking
WANG Hai-feng,WANG Hong-xu and ZHANG Kun
Computer Science. 2013, 40 (Z6): 103-104. 
Abstract PDF(246KB) ( 612 )   
References | RelatedCitation | Metrics
For transmission design schemes to main structure of Tapered Roller Screen for Thermal Power Plant,we propose the intact optimization algorithm of Vague sets for transmission decision schemes.Applying similarity measures analysis of vague sets,we come up with more than two ways that was transformed from interval data to vague data that based on a set of new similarity measure formula for vague sets(value).Two kinds of proposed formulas are two technical supports for optimization algorithm of vague scheme.Experimental results show that the proposed formulas and optimization algorithm of vague scheme can provide a useful way for the application examples.
Segmented Quantum-simplex Evolutionary Algorithm and Function Optimization
ZHANG Wei-feng
Computer Science. 2013, 40 (Z6): 105-107. 
Abstract PDF(249KB) ( 636 )   
References | RelatedCitation | Metrics
In high-dimensional complex function optimization,quantum evolutionary algorithm is easy to fall into local optimal solution and convergence speed slower in the later stage of evolution,in order to improve its search performance further,this paper proposes a segmented quantum evolutionary algorithm which introduces simplex search operator,the search process is divided into three stages,first,use quantum evolutionary algorithm to search a certain times,then divided the population into a number of sub-populations,each individual of sub-populations as the initial vertex of the simplex method and parallel search using the simplex method,merge the sub-populations after search,use quantum evolutionary algorithm continue to the last searching.The simulation results of several typical high-dimensional function show that this algorithm has faster convergence speed and higher accuracy.
Design and Implementation of Buffered Crossbar Scheduling Algorithm with Round Robin Scheduling
LIU Fei,LI Bing and ZHANG Lei-lei
Computer Science. 2013, 40 (Z6): 108-111. 
Abstract PDF(302KB) ( 992 )   
References | RelatedCitation | Metrics
In this paper a low complexity,high-performance scheduling algorithm-Round Robin scheduling algorithm and its hardware implementation is given.It is based on buffered crossbar switch fabric.Compared to the bufferless crossbar switch fabric,buffered crossbar switch fabric only requires simple schedulers that operate independently for each output crosspoint queue column and independently for each VOQ queue.This greatly simplifies the scheduling complexity of hardware and reduces system latency.So by combinating the advantage of Round Robin scheduling algorithm and buffered crossbar,a high performance switch can be implemented.
Based on the Semantic Information of the Stored Energy Efficiency Research
YOU Hong-tao,ZHANG Yan-yuan,LIN Yi and LIU Sheng
Computer Science. 2013, 40 (Z6): 112-114. 
Abstract PDF(358KB) ( 754 )   
References | RelatedCitation | Metrics
With the digital information explosive growth,storage technology has become a new impetus to the development of IT industry,constantly expanding the size of the storage system,energy efficiency problem is becoming more and more serious,main show is increase of system operation and maintenance cost,reduces the system operation reliability and expansibility,exacerbated by the storage system to environmental pollution,so the study of stored energy efficiency has great economic value and practical significance.The article elaborated the storage system disk energy current situation and research progress,and from the semantic information of design and realization,based on the semantic information of the driver.Experimental results show that the driver can effectively reduced the energy consumption of the disk storage system,improved the I/O performance,optimized the energy efficiency of storage.
Research on Conflict Detection of Business Architecture Requirements Based on Semantics
ZHU Ling and GUO Shu-hang
Computer Science. 2013, 40 (Z6): 115-119. 
Abstract PDF(447KB) ( 724 )   
References | RelatedCitation | Metrics
To solve the problem that enterprises often come across conflicts in different kinds of requirements,a method to solve the conflict detection problem of business architecture requirements based on Semantics is proposed.First,this paper discusses the concepts of enterprise architecture and business architecture.Second,the definition and influence of conflicts of business architecture requirements are discussed.Then,a detection method on conflicts of project grouping is put forward based on conventional Semantic Model in the perspective of business architecture.Besides that,a case study is set to verify the feasibility of the method.Finally,the TOGAF requirements and their conflict detection method are discussed.
Dynamic Scheduling and Real-time Rendering Method for Large-Scale Terrain
LIU Hao,CAO Wei,ZHAO Wen-ji,NING Fang-xin and PAN Li-liang
Computer Science. 2013, 40 (Z6): 120-124. 
Abstract PDF(1399KB) ( 677 )   
References | RelatedCitation | Metrics
Along with the development of the graphics hardware,the transmission of large-scale data has replaced the lack of rendering capacity as the new bottleneck of large scale terrain rendering.Aiming at this problem,we present a new approach for dynamic scheduling and real-time rendering for large-scale terrain.Terrain data are stored as tile-pyramid in hard disk,in real-time rendering phase,only a few of tiles are streamed into the video memory every frame.First,GPU computes and transfers geographic coordinates of the current scene into CPU in real time,CPU analyses and calculates the visible region through these coordinates,and then selects the optimum combination of visible tiles(visible tiles set) among all the layers by quad-tree generating,tiles regularization and tiles merging.The visible tiles set are streamed into CPU,managed and updated in a fix-sized buffer,and finally transferred into GPU as a texture for sampling and rendering.Experiments show that this algorithm saves a large amount of video memory bandwidth,improves the efficiency of data transmission effectively,and obtaines a good result in the large scale terrain scheduling and rendering.
Evolutionary Gene Selection Based on Tolerance Rough Set Theory
JIAO Na
Computer Science. 2013, 40 (Z6): 125-128. 
Abstract PDF(370KB) ( 614 )   
References | RelatedCitation | Metrics
Gene selection is to select the most informative genes from the whole gene set,which is a key step of the discriminant analysis of microarray data.Rough set theory is an efficient mathematical tool for further reducing redundancy.The main limitation of traditional rough set theory is the lack of effective methods for dealing with real-valued data.However,gene expression data sets are always continuous.This has been addressed by employing discretization methods,which may result in information loss.This paper investigates one approach combining feature ranking together with features selection based on tolerance rough set theory.Moreover,this paper explores the other method which can utilize the information contained within the boundary region to improve classification accuracy in gene expression data.Compared with gene selection algorithm based on rough set theory,the proposed methods are more effective for selecting high discriminative genes in cancer classification task.
Analysis of User’s Interacting Behavior in BBS Forum Based on Subject Tree
HU Xue-jiao,LI Hui and MA Guo-dong
Computer Science. 2013, 40 (Z6): 129-132. 
Abstract PDF(826KB) ( 638 )   
References | RelatedCitation | Metrics
The interactions between users have great significance for studying BBS forum.The subject tree is introduced to accurately describe the process of interaction between users of BBS tree forum,at the same time the theme breadth coefficient W and the theme depth coefficient D are introduced in the paper to detailed describe the user interaction in the subject.The results show that the total number of posts does not fully describe the user interaction,and the post which has frequent user interaction does not necessarily have a higher total topic posts.Therefore,the user interaction is divided into five results according to the theme breadth coefficient W and the theme depth coefficient D.
Discretization Algorithm Based on Granular Computing and its Application
SHI Zhi-cai,XIA Yong-xiang and ZHOU Jin-zu
Computer Science. 2013, 40 (Z6): 133-135. 
Abstract PDF(277KB) ( 929 )   
References | RelatedCitation | Metrics
The discretization of continuous numerical attributes is an important step for the application of granular computing.Some current discretization algorithms are classified and discussed.The concept of section granular is proposed.Entropy theory is introduced to define the granularity of section granular.The discretization algorithm based on granular computing is proposed.This algorithm is applied to intrusion detection.The experimental results show that this algorithm is simple and effective,It can assure the accuracy of intrusion detection.
Research on Propagation Model and Algorithm for Influence Maximization in Social Network Based on PageRank
GONG Xiu-wen and ZHANG Pei-yun
Computer Science. 2013, 40 (Z6): 136-140. 
Abstract PDF(440KB) ( 1633 )   
References | RelatedCitation | Metrics
The influence maximization problem in social network is to find top-k influential nodes in graph that maximize the number of influenced nodes.Some basic propagation models have been proposed to solve the influence maximization problem.But those models do not consider the relativity and importance of the node which we consider as an important measurement of influence.Thus,we propose a new PageRank-based propagation model,and employ the Greedy Algorithm to solve the influence maximization problem.The experimental results show that our proposed model is more effective than traditional Linear Threshold Model,Weighted Cascade Model and Independent Cascade Model in solving the influence maximization problem.
Automatic Web Structured Data Extraction Based on Tag Path
LI Gui,CHEN Cheng,LI Zheng-yu,HAN Zi-yang,SUN Ping and SUN Huan-liang
Computer Science. 2013, 40 (Z6): 141-144. 
Abstract PDF(662KB) ( 778 )   
References | RelatedCitation | Metrics
This paper introduces a method based on tag path to extract Web structured data.The method gets complete tag path collection by parsing the DOM tree of the Web document.Clustering of tag paths is performed based on introduced similarity measure and the data area can be targeted,then taking advantage of features of tag position,we can separate and filter record,finally complete data extraction.Experiments show that this method achieves higher precision and recall than the MDR when dealing with the page containing the structured data.
Discussion of the Characters of Social Network and the Application of Spam Filtering
LI Yuan,LIAO Wen-jian,PENG Yan-bing and CHENG Guang
Computer Science. 2013, 40 (Z6): 145-148. 
Abstract PDF(329KB) ( 605 )   
References | RelatedCitation | Metrics
Based on the network theory’s capability to describe both the power-law distribution and the small-world effect in the social networks,the societal computing can measure the complex behavior in the society.Firstly the statistical method is proposed to distinguish two types of nodes with different active degrees through the character of the power-law distribution,which can be deployed as spam filter.Considering the small-world effect,the average distance between any two nodes changed lightly while the number of nodes varied significantly.The characters of different active nodes were validated in the spam filtering procedure from the original electrical mail records at last.
Slice-based Method for Dynamic Inference Control in OLAP
ZHOU Cai-xia and CHEN Qi-mai
Computer Science. 2013, 40 (Z6): 149-152. 
Abstract PDF(337KB) ( 667 )   
References | RelatedCitation | Metrics
Aiming at the problem of sensitive information leakage in data warehouse and OLAP system,and the existing inference control methods are based on date cube ignoring the fine-grained slice reasoning.This paper presents an inference control method based on slice.This method refines inference granularity to slice and deals with each query corresponding to slice grid,which can prevent a single slice of reasoning and increases efforts to the protection of sensitive information according to the judgment of the slice grid dependencies’ inference channel.
Operator Theory Frontier of Spectral Clustering
GUAN Tao and WANG Jie
Computer Science. 2013, 40 (Z6): 153-156. 
Abstract PDF(362KB) ( 731 )   
References | RelatedCitation | Metrics
Spectral clustering comes from operator theory and is able to efficiently decrease data dimension and classify data.However,current domestic researches pay more attention to applied algorithm design,and there is lack of theoretical outcome.In order to make up the shortcomings in theory,this paper systematically summaries the theory of spectral clustering,pays more attention to study the newest foreign operator theory research achievements.Besides,we briefly discuss and analyze some specific spectral clustering algorithms.We introduce and analyze the principle,convergence,current status of spectral clustering and its inherent association with manifold learning in terms of integral operator,spectral graph theory and manifold learning.At last,we suggest some possible directions.
Web Data Extraction and Integration in Domain
LI Gui,LI Zheng-yu,CHEN Shao-gang,HAN Zi-yang,SUN Ping and SUN Huan-liang
Computer Science. 2013, 40 (Z6): 157-159. 
Abstract PDF(585KB) ( 603 )   
References | RelatedCitation | Metrics
Web data mining in a domain includes Web data extraction and Web data integration.In the phase of Web data extraction,the paper proposes a Web structural data model and a Web table schema,and puts forward the Web table positioning and records extracting algorithm.In the phase of Web data integration,a Web data integration algorithm based on the domain model is presented.The experiment results are given to show effectiveness of the proposed algorithms.
Research on Data Integration Based on ERP in Electric Power Enterprise
ZHANG De-gang,LUO Xue-li,SHENG Jun,XU Shu-zhen and TIAN Lei
Computer Science. 2013, 40 (Z6): 160-162. 
Abstract PDF(395KB) ( 700 )   
References | RelatedCitation | Metrics
Integration of heterogeneous data sources is the necessary method to improve the level of informatization for power enterprises,this paper describes a data exchange and sharing platform model of power enterprise based on Enterprise Resource Planning(ERP),XML and Web Service.The enterprise achieves exchange and sharing data between ERP and legacy heterogeneous system by this platform within the enterprise.Applications result shows that the platform developing achieves the goal and places a solid foundation for the power enterprise informatization.
Improved Randomized Hough Method of Circle Detection
CHEN Hao,MA Yue,CHEN Shuai and LI Zhao-yue
Computer Science. 2013, 40 (Z6): 163-165. 
Abstract PDF(263KB) ( 746 )   
References | RelatedCitation | Metrics
Proposes an improved algorithm for detecting circles which is based on randomized Hough transform.It use gradient direction information to determine whether the parameter should be accumulated or not.And after obtaining the real circle,update the fringe points muster with deleting parameter λ.The problem of useless accumulation in traditional RHT is well is well solved and improved the probability of the best according circles appearance.Tests on normal images had been taken,and this algorithm has been proved an efficient method.
SVM-based Method and System for Recognition of Human Movement
YU Lei,XIN Xiao-yue,LU Zhi-yong,CHEN Zhi-peng and LIU Ning
Computer Science. 2013, 40 (Z6): 166-168. 
Abstract PDF(328KB) ( 1522 )   
References | RelatedCitation | Metrics
We propose to use the sensors in mobile devices to recognize the state of users movement by small data set.We suggest a mechanism,based the support vector machine(SVM),to model and classify the movement of mobile clients.Since the mobile devices will handle different sensor data in use,we suggest two coordinate system for the data set,called device coordinate and the standard coordinate.After the sensor data in device coordinate being mapped to the standard coordinate,they will be put into support vector machine and produce classification results with high accuracy.A realistic study have been conducted to prove that the mechanism is practical and accurate.
Video Codec Based on Compressed Sensing
YANG Xin-cheng and HE Bin
Computer Science. 2013, 40 (Z6): 169-172. 
Abstract PDF(349KB) ( 1601 )   
References | RelatedCitation | Metrics
Compressed sensing theory is a new information processing,recent popular research direction,and has a good prospect of application in signal processing and other fields.In this paper compressed sensing theory and traditional video codec technology,design a theory based on compressed sensing video codec program.The results show that the algorithm is able to achieve better results.
Based on the Improved Mathematical Morphology OCT Image Quick Edge Detection Algorithm
ZHANG Bo-wen,TIAN Xiao-lin and SUN Yan-kui
Computer Science. 2013, 40 (Z6): 173-175. 
Abstract PDF(732KB) ( 722 )   
References | RelatedCitation | Metrics
A new edge detection algorithm based on improved mathematics morphologic method is proposed.By using erosion and dilation basic operators,the structure elements suitable for the image edge detection are chosen,then use Canny edge detector to extraction edge.The improved mathematics morphologic method is helpful to reveal distinct characteristics for some edge features,efficiently with high speed processing.Compared with the classical edge detection operators and traditional mathematics morphology edge detection algorithm,the improved algorithm is more advantage,the quality and speed of the picture edge extraction significantly improved.
Effective Way of Improving the Recognition Rate of License Plate’s First Character
LV Wen-qiang and YANG Jian
Computer Science. 2013, 40 (Z6): 176-179. 
Abstract PDF(326KB) ( 809 )   
References | RelatedCitation | Metrics
This paper offers a new method of extracting feature for solving the problem of the low Chinese character recognition rate resulted from the poor quality of the Chinese character image in the license plate recognition system.Firstly,the binary Chinese character image that has been segmented is divided into many blocks.Secondly,this paper extracts three stroke pixel’s feature components that include the proportion of stroke pixels in the block,the divergence and the centroid for each block.Thirdly,this paper combines the new feature extraction method with the SVM classifier.At last,a group of robust classifiers are obtained.The experimental results show that the Chinese character recognition rate can be improved greatly.
Color Image Segmentation Approach Based on LLE in Kernel Space
LIU Yue,PENG Hong-jing and QIAN Su-jing
Computer Science. 2013, 40 (Z6): 180-183. 
Abstract PDF(703KB) ( 762 )   
References | RelatedCitation | Metrics
Recently,Laplacian eigenmaps has been used in the color image segmentation based on cluster algorithm as an improving means.The graph weight matrix which is learned from Gaussian method may not characterize the locally geometric structure of the data points.As a result this method can’t tell the fuzzy edges sufficiently.To overcome this problem,the locally linear embedding in kernel space algorithm is proposed.Firstly,the simple pixel’s eight-nearest neighbor method is introduced to get weighted graph.Secondly,With the kernel trick,Laplacian reconstruction coefficients used to reflect the similarity between data points in the high dimension space can be achieved,as well as the subspace of feature vector.Finally,Fuzzy C-means clustering algorithm is used in the subspace to distribute labels for each pixel and achieve the segmentation of color images.The result of experiments compared with the results of the Laplacian eigenmaps segmentation method provided shows the encouraging improvements of the new algorithm.
GUI Event Interaction Graph Generation Method Based on Model
FENG Kai and GAO Jian-hua
Computer Science. 2013, 40 (Z6): 184-187. 
Abstract PDF(412KB) ( 919 )   
References | RelatedCitation | Metrics
The test of GUI is a veritable challenge.One of the concernful reasons is that there are many context events which would cause determinate influences over the results of testing.This problem can be solved by the technologies of model-based GUI testing.Two of the frequently used graphical user interface(GUI) model in model-based GUI testing technologies are the event flow graph(EFG) and the event interaction graph(EIG).Both of the two kinds of models give a certain presentation of the events interacting relationships,and the EIG makes significant improvements form the EFG.Our paper provides the GUI events with a specific division through a simple GUI instance and also improves the MX algorithm for the sake of adaptation to the new division of the events.Finally,according to the property of event-driven in GUI and the divided GUI events in this paper,the paper proposes a new method:driven algorithm.Some examples show that the method makes the EFG converted into EIG more easier.
Improved Automatic Segmentation Method of sEMG Based on Signals’ Energy Value
LI Lin,WANG Jian-hui and GU Shu-sheng
Computer Science. 2013, 40 (Z6): 188-191. 
Abstract PDF(339KB) ( 1351 )   
References | RelatedCitation | Metrics
As effective stage extraction of surface electromyography (sEMG) is the premise of signals analysis and processing,an improved method has been proposed to realize sEMG segmented automatically which could lay a foundation for full automatic analysis of rehabilitation robot.In this paper the value of window energy has been taken as the judgment standard for the start-stop point of muscle action,and the formula of initial threshold has been given.The wavelet transform technique has been applied to filter the non-action signals,and the segmentation value has been adjusted automatically according to the characteristics of the split point.The experiments results show that this method can segment sEMG signals automatically,without regarding as the artificial factors of conner,without initialization,and the results are more accurate and the precision is higher.
Frame Recognition and Sort of Comic Pages Based on Split Line
JIAO Li-min,HE Zhong-shi and LI Jia
Computer Science. 2013, 40 (Z6): 192-195. 
Abstract PDF(669KB) ( 822 )   
References | RelatedCitation | Metrics
After analyzing comic grammar,this paper presented one kind of definition for comic structure.According to the relevance between features of frames layout and Divide-and-Conquer,iterative segmentation algorithm based on binary tree was proposed.After analyzing comic split line,split line choosing algorithm based on split ratio was proposed.The proposed method could decompose one comic page into multiple comic frames and sort them in order automatically,so it can reduce the amount of manual segmentation work.Comic frames after division can be placed on the smaller screen of cell phone screen or PDA,one by one in order to allow simple and vivid reading even through screen with very limited size.Experiments show that for most comics this method can identify each frame and then arranged them in chronological order according to the story and that it has better performance in both accuracy and real time.
Research on Visual Features Based on Image Retrieval
SUN Si,ZHAO Shan and WEI Cong-gang
Computer Science. 2013, 40 (Z6): 196-198. 
Abstract PDF(288KB) ( 685 )   
References | RelatedCitation | Metrics
At present,Content Based points Retrieval is a subset of the CBIR.It tries to inquiry the trademarks similar to the sample image,based on the comprehension of image contents.CBIR in trademark has wide prospect in the stage of similar or same trademarks examination,even in the field of trademarks inquiry.This paper does mainly research on the extracting of the points characters and counting the similarity in images.Firstly,the image shape is extracted by Canny algorithm,then,the moments are introduced to image retrieval.Experiments show that the proved method has effective performance.
Research of Pedestrian Tracking Based on HOG Feature and Haar Feature
LU Xing-jia,CHEN Zhi-rong,YIN Tian-he and YANG Fan
Computer Science. 2013, 40 (Z6): 199-203. 
Abstract PDF(1147KB) ( 888 )   
References | RelatedCitation | Metrics
The detection and tracking of pedestrians in the real scene is one of the most concerned questions in the multi-people detection and tracking,especially under the condition that the occlusion,congestion and varied backgrounds of people have greatly challenged the research of multi-people detection and tracking.Haar and HOG features are applied in this research.The Haar-Like feature detector is used to detect the face when people come face to face with the camera,while the Part-Based Template is used to detect and track people in people’s sideway movement.After that,the maximum weight independent set is used to accomplish the relationship between the frames.The result of the detection and tracking from the ETH,TUD and local sample library attests that the hybrid algorithm has much higher accuracy and precision in detecting pedestrian’s front and side face.
Survey of Visual Tracking Algorithm
YAN Qing-sen,LI Lin-sheng,XU Xiao-feng and WANG Can
Computer Science. 2013, 40 (Z6): 204-209. 
Abstract PDF(760KB) ( 944 )   
References | RelatedCitation | Metrics
Visual tracking is a fundamental task in many computer vision applications,and the robustness problem is still a challenge in spite of the numerous existing visual tracking algorithms.Besides,several circumstance,as the abrupt object motion,the variation of the target or the background,the object-to-object and object-to-scene occlusions,the non-rigid object structures and camera jiggle,can reduce the effectiveness of the designed visual tracking algorithm.This survey described the visual tracking algorithm and its research advance.The existing target tracking algorithms were overviewed,and described each of these algorithms in detail,then,the advantage and disadvantage of each algorithm were analyzed respectively.Furthermore,the important issues related to tracking were discussed,including detection of objects,feature selection,Bayesian tracking,and online learning tracking.
Low-power Design Techniques for GPU
TIAN Ze,ZHANG Jun,XU Hong-jie,GUO Liang and LI Xiao-yu
Computer Science. 2013, 40 (Z6): 210-216. 
Abstract PDF(874KB) ( 1291 )   
References | RelatedCitation | Metrics
Graphic Processing Unit(GPU) is extensively used to accelerate the graphic processing and general purpose computing.But unfortunately,along with the increasing of chip scale and density,power consumption of single GPU reaches 376W,which is two or three times higher than a typical high-end general purpose CPU.Stability,reliability and cost problems brought by high power consumption had already made the “Power Wall” be a key obstacle which must be broken through.On architecture level,and combined with the structure characteristics of GPU rendering pipeline,this paper demonstrates the GPU low-power design techniques,such as depth test and elimination,shader data path,texture mapping and compression,rendering strategy,register file and Cache,and then indicates the further research content for GPU low-power design.
Application of Blind Source Separation to AIS
ZHAO Wen-hong and WANG Wei
Computer Science. 2013, 40 (Z6): 217-219. 
Abstract PDF(248KB) ( 710 )   
References | RelatedCitation | Metrics
The Automatic Identification System(AIS),which is imposed by the International Maritime Organization(IMO),is a maritime safety and vessel traffic system.For security,the AIS-equipped ships broadcast position reports and short messages with information about the ship and the voyage that could be received by other ships and shore-based stations.AIS uses self-organizing TDMA(SOTDMA)for scheduled repetitive transmissions from an autonomous station.But the conflicts are difficult to escape.In the paper,once the conflicts appear,the technology of blind source separation will be introduced into AIS.It could separate each message from the coinciding transmissions,avoid messages losing,and improve the detection probability.
Based on Network on Chip of Multiprocessor QoS Mechanism Research and Design
HENG Xia,ZHI Ya-jun and HAN Jun-gang
Computer Science. 2013, 40 (Z6): 220-222. 
Abstract PDF(231KB) ( 1228 )   
References | RelatedCitation | Metrics
Based on researching network on chip quality of service,the thesis is proposed network on chip structure for multi-processor 64-Core.IP module produces different types of data packet,the network provides priority services to ensure that high priority packets and low-latency needs.Performance result shows that the model which for multiple processors communication with different types of data packets meets the Quality of Service requirements.
Research and Exploration of Olfactory Network Transmission-based Mobile Phone Platform
LI Lian-ning
Computer Science. 2013, 40 (Z6): 223-227. 
Abstract PDF(498KB) ( 1326 )   
References | RelatedCitation | Metrics
By semiconductor gas sensor array to feel all kinds of substances nature odor,we use the sensor array and the neural network software interface and conversion BP neural network algorithm for data processing and information fusion.On the basis of the multimedia transmission via the Internet or 3G mobile communication network,we will not use traditional methods of odor synthesis generator,to achieve the purpose of ultra-long-range olfactory transmission.It is posible to research ultrasonic direct conduction to the center of the human brain olfactory sensing mode,to achieve olfactory transmission direct transmission mode.Explore and experiment to prove the feasibility of the olfactory transmission on mobile phones(mobile terminal) and reproduction mechanism to elucidate the smell,will reveal the significance of machine olfactory law,will provide ideas to human sense of smell,taste,touch on worldwide Internet and mobile communication network conduction.
Research on Uplink Ranging Technique in IEEE 802.16e Network
LV Hai-kun and LI Hai-tao
Computer Science. 2013, 40 (Z6): 228-231. 
Abstract PDF(620KB) ( 633 )   
References | RelatedCitation | Metrics
Efficient ranging technique is utilized to achieve the uplink time slot synchronization and power control in WiMAX/IEEE802.16e network.The principle of ranging which is involved in the generation,transmission and detection of ranging codes is analyzed firstly.Then,the key techniques of uplink ranging processing which includes the power detection and time delay estimation is investigated.Finally,the DSP implementation of ranging processing is given in detail,the test results show that the proposed ranging scheme is feasible.
Construction of Port Logistics Service Platform Based on Cloud Computing and Internet of Things
HAN Hai-wen,QI De-yu and FENG Bin
Computer Science. 2013, 40 (Z6): 232-235. 
Abstract PDF(476KB) ( 836 )   
References | RelatedCitation | Metrics
The dramatically increase of international trade goes with the new development to port logistics and its rela-ted business in user amount,user business complexity and users business types.New IT technology including things technology,cloud computing and SOA architecture,would bring advantages to meet these increasing requirements and upgrade the port logistic platform from information provider to services provider.Under the consideration of deficiencies of urgent port logistic platform,this paper proposes a full architecture for a new type of port logistics services platform and discusses the construction of its six composed layers coming with the detail utilization of things technology,cloud computing and SOA.
Design and Research of Embedded Thin Web Server
CUI Li-qun and ZHANG Ming-jie
Computer Science. 2013, 40 (Z6): 236-238. 
Abstract PDF(372KB) ( 833 )   
References | RelatedCitation | Metrics
To design and research of an Embedded Thin Web Server in the environment of low-end microcontroller,streamlining the TCP/IP protocol stack,particularly,puting forward an accelerated open mechanism for TCP streamli-ning to avoid a three-way handshake process and has improved the technology of CGI.Using the Javascript to make part of the work of the serve shifted to the client to process,using XMLHttpRequest inplements Asynchronous communication between the server and the browser,so the performance of the server can be improvedt effectively.Through the test of performance shows that the server can meet the requirements of the embedded environment and this embedded Web server has a high practical value in the low-end platforms.
Carrier Synchronization Algorithm Research for High-order Modulated APSK Signal
HU Jing-ming,GUO Dao-sheng and WANG Hui
Computer Science. 2013, 40 (Z6): 239-242. 
Abstract PDF(707KB) ( 1160 )   
References | RelatedCitation | Metrics
With the development of satellite communication services,satellite broadband high-speed data communication is becoming more and more important,higher order modulation technology is increasingly used in satellite communications,but the carrier frequency offset the impact of higher order modulation signals,such as APSK.its various amplitudes also make carrier synchronization more complicated.Review carrier synchronization algorithm theory based on the carrier frequency and phase deviation APSK signal system,and to study the carrier frequency and phase offset estimation algorithm,analysis shows that the algorithm can effectively solve the APSK signal multi-amplitude and phase Fuzzy large problems,and can be preferably applicable to the the APSK signal carrier frequency and phase synchronization.
Prediction of Periodic Weighting Based on Optimized Functional Networks
CUI Tie-jun and MA Yun-dong
Computer Science. 2013, 40 (Z6): 243-246. 
Abstract PDF(355KB) ( 719 )   
References | RelatedCitation | Metrics
In order to improve the prediction the periodic weighting load,this paper proposed a new periodic weighting prediction method based on Functional networks(FN) optimized wavelet analysis and chaos.In the method,selected sample set data is decomposed using wavelet decomposition technique to obtain the different frequency components.The phase space of the components is reconstructed by chaos theory.The reconstructed components are respectively transmitted into FN model to carry on prediction.Finally,all the predicted components got by FN models are reconstructed by wavelet to get complete prediction waveform.The result of the calculation in the reconstruction shows that in a certain period,the load temporal sequence has some chaotic property.Through the comparison between the result of the method and three other models,the final load ware of the method is higher accuracy and convergence,but the cost of time is large.
Designation and Realization of Mobile Commerce Interaction Model Under Cloud Computing Platform
YE Shui-sheng and XIAO Lei
Computer Science. 2013, 40 (Z6): 247-250. 
Abstract PDF(595KB) ( 802 )   
References | RelatedCitation | Metrics
This paper designs and realizes a model of mobile commerce under cloud computing platform.Realizes the resources unified scheduling and distribution of front-end cluster’s desire.The server’s computing power enhances obviously,realize the purpose of slight-client.Realize the information interaction base on cloud computing,server-side and client-side become independent units,which can finish the trade process only to use browser,to ensure the flexibility of designation.The experiment demonstrate that using this interaction model of mobile commerce can distribute the service resources excellently,improve means of exchange and user experience.
Research of Structure and Architecture for Underwater Sensor Networks
ZHENG Jun-jie,LI Yan-bin,YIN Lu,MA Jin-gang and WANG Hong-tao
Computer Science. 2013, 40 (Z6): 251-254. 
Abstract PDF(605KB) ( 1235 )   
References | RelatedCitation | Metrics
The requirement objectives of underwater sensor networks(UWSN) was firstly analyzed,then the application scene of UWSN was constructed.Based on the architecture of WSN,a new kind of architecture for UWSN was designed and the function of every layer was explained in datail.In order to overcome the shortcoming of existing research of routing protocol for UWSN,a new routing protocol based on depth and residual energy was designed which does not require full-dimensional location information,instead,it need only local depth information.The routing arithmetic was designed and the solving method for inanition was presented.
Survey on Remote Code Update for Wireless Sensor Networks
KUANG Xiao-hui,XU Fei and LIU Li
Computer Science. 2013, 40 (Z6): 255-261. 
Abstract PDF(853KB) ( 661 )   
References | RelatedCitation | Metrics
Remote Code Update in wireless sensor networks is an important means of remote task reallocation,software update of nodes and network function reconfiguration after a wireless sensor network is deployed.It’s very important to improve the availability of wireless sensor networks.This paper summarizes and concludes the existing research of remote code update in wireless sensors,some main mechanism of remote code update are introduced in this paper and their defects are pointed out.At last,the problem in future research is discussed,furthermore,the keystone and difficulty of research in wireless sensors networks are indicated.
Delay Evaluation and Simulation of TDMA Through M/M/1/K Queue Model in Low-energy Wireless Communication Environment
FENG Yong,YAO Long-hai and ZHANG Liang
Computer Science. 2013, 40 (Z6): 262-264. 
Abstract PDF(308KB) ( 1081 )   
References | RelatedCitation | Metrics
Evaluate the delay charistiristic of TDMA in low-energy wireless communication environmen t based on M/M/1/K queue model,and simulate it by QualNet with two interfaces in single-hop network topology,the simulation data is compared with the evaluation one.It shows that,this evaluation scheme is nearly equal to the simulation outcome.Meantime,the slection of hardware interface lays more influence on the delay of TDMA protocol.
Some New Cartesian Product Interconnection Networks
SHI Hai-zhong
Computer Science. 2013, 40 (Z6): 265-270. 
Abstract PDF(462KB) ( 802 )   
References | RelatedCitation | Metrics
Star network,pancake network,bubble sort network,modified bubble sort network,wheel network,etc,are not only Cayley graphs but also important interconnection networks.In this paper,we develop many new networks,called Cartesian product networks of the ring network,the barrell shifter network,the ILLIAC networks,the n-cube and the Star network,the pancake network,the bubble sort network,the modified bubble sort net works,the wheel network,respectively.These networks are shown to have better performance,as measured by some parameters(such as,dia-meter,etc.)than the n-cubes or the Star networks.
Study of Methods for the Cloud to Migrate Application Systems
ZHANG Liang,FAN Bing-bing and ZHENG Wei-ping
Computer Science. 2013, 40 (Z6): 271-275. 
Abstract PDF(672KB) ( 607 )   
References | RelatedCitation | Metrics
Regarding the problem of selecting target physical servers when migrating multi-component application systems to the cloud,a migration method based on the inter-component communication amount was proposed.According to the formalization of the application system logical architecture and cloud platform physical resources organizational structure,the method is to select target physical server for each system component by calculating the communication amount and virtual resource requirements of them.By the experiment of migrating multi-tenancy excellent course websites system to Bingo Cloud,the result shows that the migration method can reduce the traffic between physical servers of the cloud platform.
Performance Analysis of Detector for MFSK-signals Based on First-order Cyclic Moment in the Cycle Frequency
LI Xiao-qiang,SHEN Yue-hong,LI Ying,DING Hao-jie and WANG Li-feng
Computer Science. 2013, 40 (Z6): 276-279. 
Abstract PDF(375KB) ( 631 )   
References | RelatedCitation | Metrics
Cognitive Radios represent a powerful technology for improving the utilization of radio spectrum resources.Detection of low signal-to-noise ratio(SNR) signals with relaxed a priori information on the signal parameters is very important for cognitive radios.In this paper,an in-depth theoretical analysis is performed for the detector which can detect MFSK signals with noise based on first-order cyclic moment.For this detector,when the sampling length is limited,we derive a first-order cyclic moment amplitude probability density function formula for MFSK signals with noise and noise in the cycle frequency.Then this paper proposes a calculation method of this detector Receiver Operating Characteristic(ROC) curve.Theoretical analysis shows that with the increase of sampling length,the performance of detector based on first-order cyclic moment is improved obviously;under the same conditions,with MFSK signals dimension M increasing,the detector performance decline somewhat.
Node Selection Strategy Based on Intuitionistic Fuzzy Sets in P2P Streaming Media System
LI Yan and WANG Li-na
Computer Science. 2013, 40 (Z6): 280-282. 
Abstract PDF(343KB) ( 626 )   
References | RelatedCitation | Metrics
Through studying random node selection algorithm of unstructured P2P networks,By applying the theory of intuitionistic fuzzy set and put forward a node selection strategy which based on the score function,in order to overcome the randomness and blindness in the traditional strategy.This paper adopt scoring method of nodes reliability,make full use of good nodes,It has good adaptability,and can reflect the node and resources dynamic in P2P network,Meanwhile it improve the overall efficiency of the system.
Research on the QoS Control of the Real-time Data Transmission Based on the Tactical Data Link
DONG Chang-cheng,WU Wei,LI Jun-lin and ZHAO Heng
Computer Science. 2013, 40 (Z6): 283-286. 
Abstract PDF(349KB) ( 715 )   
References | RelatedCitation | Metrics
In the Tactical Data Link the real-time data are translated based of the FCFS module,which is not considering about the priority and QoS control of the real-time data.QoS control of the real-time data translating based on the Tactical Data Link method was proposed.A QoS classification of the real-time data and the priority controlled earliest deadline first algorithm were provided in the application layer,which could guarantee the network end to end delay and reliability in the restricted bandwidth condition.Experimental results show that it’s efficient.
Analysis to Connectivity of Wireless Ad hoc Simulating Networks with Random Mobility Models
LIU Yan-tao,WANG Bo,AN Jian-ping and LIU Heng
Computer Science. 2013, 40 (Z6): 287-290. 
Abstract PDF(401KB) ( 817 )   
References | RelatedCitation | Metrics
The connectivity of wireless ad hoc networks were studied,including uniform networks,Poisson networks,networks using random waypoint model,and networks using random direction model.The analysis was based on the minimum degree theorem in geometric random graphs.The node degree was calculated by using the probability density function of node distribution.The quantitative relationship among 1-connectivity,node number and communication range was illustrated.It was shown that the connectivity decreased by the sequence of uniform networks,networks using random direction model,and networks using random waypoint model.
Designing and Realizing Distance Support Terminal Systerm Bases Wiki
MA Li,ZHENG Guo-ning and SUN Yu
Computer Science. 2013, 40 (Z6): 291-295. 
Abstract PDF(652KB) ( 548 )   
References | RelatedCitation | Metrics
Crewman is the key points and targets of the distance support system in warship.Because far away from mainland,the system should work normally off line.The whole wiki support system,include requirement design alternative and system composition,is described in the paper,and the core codes are listed in the thesis.
Design and Development of Basic Functions of JTAPI-based Dispatching Server
TIAN Wen-feng and BU Xian-de
Computer Science. 2013, 40 (Z6): 296-298. 
Abstract PDF(246KB) ( 867 )   
References | RelatedCitation | Metrics
With the development of IP technology and update of dispatching equipment,multimedia dispatching system is more intuitive and user-friendly than traditional dispatching system.So the power dispatching system introduces soft-switch technology to develop multi-media dispatching system.On the basis of in-depth study of CTI technology and its JTAPI standard protocol interface,according to the requirements of power communication dispatching system,this paper proposes a multimedia dispatching system architecture based on Cisco Unified Communications platform.For the basic functions of dispatching server in the framework -such as outside call,conference,force in,force break etc.,this paper gives a Java develop specific method based on JTAPI standard interface.
Improved Construction Algorithm for K-Reach Index
LIU Kai-yang
Computer Science. 2013, 40 (Z6): 299-301. 
Abstract PDF(284KB) ( 711 )   
References | RelatedCitation | Metrics
The k-rechability problem is of great importance for newly emerged wireless and social network.The.latest proposed index K-Reach can quickly answer the problem of whether there exists a path of length less or equal than k between any pair of vertices.Notice that during the construction of the index,all vertices which are reachable by a computed vertex have been traversed,and the path information is recorded in the index.Therefore,an improved construction algorithm is proposed to avoid the repeated visiting of a large amount of vertices by making fully use of the path information of the computed vertices.Experiments based on a set of real-life data have demonstrated that the time complexity of the improved algorithm is significantly lower than the original construction algorithm.
Fault Location Technology Based on the Distributed Event Processing System
DU Cui-lan,TAN Jian-long,WANG Xiao-yan,ZHANG Yu,LIU Ping and FAN Dong-jin
Computer Science. 2013, 40 (Z6): 302-306. 
Abstract PDF(431KB) ( 749 )   
References | RelatedCitation | Metrics
In recent years,distributed computing systems become larger and more complex to control.System faults are growing exponentially,resulting in a very serious harm and loss,and problems on trouble shooting and positioning difficulty further enlarges.Traditional ways by tracking program to judge the running and correct method,using excessive consumption of the target program and invasive in distributed monitoring information interaction,has been difficult to meet the demand of software behavior analysis.Through the complex event processing in time to find and locate the fault,this need in events in a large,rapid,uninterrupted occurrence of distributed monitoring environment appears especially urgent.It can use the meaningful information state change events to analyze system behaviors,and then judge the system operating conditions,to detect fault and positioning system,ensure the healthy operation.The complex event description language is based on the SQL method to describe the complex events.This data stream query language is complex for ordinary users and difficult to master.By constructing a set based event flow model,we can use the set of events to conduct a formal definition.The user only needs to master a few simple assembly operations in order to define complex fault rule.
Research on Cooperative Spectrum Sensing and SSDF Attacks
CAO Long,ZHAO Hang-sheng,BAO Li-na and ZHAO Xiao-long
Computer Science. 2013, 40 (Z6): 307-310. 
Abstract PDF(312KB) ( 597 )   
References | RelatedCitation | Metrics
In cognitive radio network,cooperative spectrum sensing technology overcomes the problems of multipath effects,shadow effects and such constraints by using local sensing results of cognitive users,hence improves the detection performance.This paper introduces the normal model of cooperative spectrum sensing,analyzes the local spectrum sensing and fusion decision these two key elements,shows the differences of ROC between local spectrum sensing and cooperative sensing.Then presents the concept,classification and state-of-the-art of research of spectrum sensing data falsification attack,we also analyzes and simulates for the possible case,simulation results show that the detection performance decline since be attacked.Finally,we summarize this paper.
Complex Number-based Privacy Data Aggregation
CAO Xiao-mei and LIU Da-wei
Computer Science. 2013, 40 (Z6): 311-314. 
Abstract PDF(349KB) ( 717 )   
References | RelatedCitation | Metrics
The scheme is committed to realize the security of data aggregation,and we proposed an secure data aggregation scheme CNPD based on in wireless sensor networks.CNPD scheme applies its own private data to form a plural custom data to hide sensitive data.Even if the private data being eavesdropped or decrypted by the attacker,this method can prevent them to resuming the sensitive information,so there is an effective protection of user privacy data security.The theoretical analysis and simulation experiments finally show that CNPD is more efficient than PDA in terms of communication overhead and security.
Recognition of Indirect Jump Targets Based on Trace Constraint
LI Dan,WANG Zhen-yu,JING Jing and WANG Guo-hao
Computer Science. 2013, 40 (Z6): 315-319. 
Abstract PDF(445KB) ( 1084 )   
References | RelatedCitation | Metrics
The recognition of indirect jump targets is one of the most difficult problems for control flow reconstruction from binary all the time.Due to dependency for runtime information,traditional solutions of indirect jump cannot meet the demand of precision.Through research of control flow reconstruction technical,we presented a new method for recognition of indirect jump targets based on trace constraint.For an indirect jump,a trace set from entry point to indirect jump can be constructed from a given initial control flow graph.Then for every element of the trace set,a target address can be determined through trace constraint resolve and target address expression which is constructed with relevant control flow analysis technical.By this means,a set of jump targets can be determined for every indirect jump.
Research on Secure Access Control Mechanism Based on Secure Domain Separation for Embedded Systems
NIU Wen-sheng,LI Ya-hui and ZHANG Ya-di
Computer Science. 2013, 40 (Z6): 320-322. 
Abstract PDF(363KB) ( 883 )   
References | RelatedCitation | Metrics
Based on secure domain separation model,the research in secure architectures of embedded systems proposed a method of the secure access control,which supports multi-level secure separation of information stream with the message router between partions and messages authority based on the secure partition kernels.In order to implement the multi-level security embedded operating system,the structure of the secure access control mechanism was presented according to the secure domain separation model.The security analysis results prove that the proposed method can keep from security threats includeing illegal resource accessing,identity personation,information revealing and cover channel etc.The perfangmance analysis results show that the synthetical comsuming is about 10% with importing the security access control mechannism.
Design and Implementation of High-definition Video Conference System in Complex and Confidential Network
MA Shao-liang,LI Feng-bao and LU Hai
Computer Science. 2013, 40 (Z6): 323-326. 
Abstract PDF(618KB) ( 766 )   
References | RelatedCitation | Metrics
This paper surveyed recent development of classified video conference system,introduced a design method of high-definition video conference in complex and confidential network.Combining typical confidential and secure network infrastructure,described in detail a high-definition video conference’s structure,automatic video track and control technology and deployment.Through research on key technologies such as related audio and video encoding,boundary defense,service quality guarantee and security policy configuration,proposed a practical and feasible design method which is successfully applied in projects.
Research on Fault Diagnosis of Wireless Sensor Nodes
SHANG Xing-hong,SHANG Xi-yue,ZHANG Jing and QIAN Huan-yan
Computer Science. 2013, 40 (Z6): 327-329. 
Abstract PDF(311KB) ( 660 )   
References | RelatedCitation | Metrics
In Wireless Sensor Networks(WSNs),faulty sensor nodes may consume the limited energy and bandwidth of network.Furthermore,they will produce the paralysis of entire systems.In this paper,RVM and SVM algorithm was applied to fault diagnosis for sensor nodes based on the analysis of fault type of WSNs nodes,and then the values of the features and the corresponding fault types of wireless sensor nodes were used to train RVM and SVM classifier.Simulation results show that the diagnosis results of the RVM model for wireless sensor are better than those of SVM and ANN.
System Calls Based Intrusion Detection Method with Frequency Feature Vector
ZHANG Li-ping,LEI Da-jiang and ZENG Xian-hua
Computer Science. 2013, 40 (Z6): 330-333. 
Abstract PDF(459KB) ( 779 )   
References | RelatedCitation | Metrics
In order to solve the problem of extracting feature library and detecting anomaly system calls slowly in intrusion detection methods,this paper proposed a novel two phrase intrusion detection method.In the first phrase,we extracted subsequences from normal system calls and calculated the frequency of the subsequences,and transformed the frequency feature into the frequency feature vector including continue numeric number.In order to improve the accuracy and speed of detecting anomaly system calls,the paper adopted one-class classification support vector machine(SVM) to build the detecting model,which uses the feature vector library to build the model.Finally,we conducted extensive experiment to evaluate the performance of our proposed method.The results show that our proposed method is superior to the existing methods in many evaluation metrics.
Privacy Preserving Reputation Protocol for P2P Environment
SUN Bo,DING Xue-feng,SI Cheng-xiang and ZHANG Wei
Computer Science. 2013, 40 (Z6): 334-336. 
Abstract PDF(332KB) ( 770 )   
References | RelatedCitation | Metrics
Reputation protocol is used to compute feedback by summing up the individual reputations of other system users.The feedback is then used to make a decision.It is always the case that the entities in a reputation system will provide dishonest feedback due to fear of exposing their privacy which would lead to retaliatory acts from opponents.In this paper,a privacy preserving reputation protocol enable an entity to acquire fair reputation from other entities.In this protocol Shamir Secret Sharing and Verifiable Secret Sharing with homomorphic property are employed to enable the dealer and secret holders to verify the correctness of the shared secret.Moreover a random selection of the participating secret holders is achieved.And using the shared secret key,the secret reputation feedback is attained by decryption.Further more,the nice privacy preserving properties of the semantically secure ElGamal and Cramer Shoup Cryptosystem are used to enable the secret holders to submit their secret reputation feedback in a privacy preserving way and securely access a database of current reputation feedback maintained by a reputation engine.
Trojans Control Behavior Detection Approach Based on Timing Analysis
CHEN Li,ZHANG Li,YAO Yi-zhan and HU Wei-hua
Computer Science. 2013, 40 (Z6): 337-339. 
Abstract PDF(257KB) ( 694 )   
References | RelatedCitation | Metrics
Traditional detection approach based on fingerprint has a higher rate of false negatives.To this end,this paper put forward a detection approach of Trojans control behavior based on timing analysis of network sessions.Firstly,it calculats the weighted Euclidean distance between clustering dataflow,then the Trojans control behavior can be detected by ti-ming relationships of clustering data.Experiments show that the approach did not need fingerprint database,and can achieve higher correct detection rate,less consumption of resource real-time detection and processing.
Analysis and Design of ICS Information Security Audit System
CHEN Zhuang,HUANG Yong and ZOU Hang
Computer Science. 2013, 40 (Z6): 340-343. 
Abstract PDF(364KB) ( 770 )   
References | RelatedCitation | Metrics
At present,Industrial control system(ICS) is widely used in electric power,transportation,water conservancy,large manufacturing industry and national critical infrastructure.ICS has become the important part of the national security strategy.However,the traditional information security technology(such as firewall technology,intrusion detection technology,etc.) has the different technical principle and the different network protocol,and doesn’t have a good protection effect in ICS.In order to effectively improve the Industrial control system information security(ICSIS) protection,based on the specific data and protocol and the highly real-time requirement,this paper designed an ICSIS audit system,which mainly includes data acquisition module,content detection mo-dule,abnormal behavior judgment module,behavior handling module,audit response module.The testing results show that the ICSIS audit system can comprehensive audit the ICS,and the use of ICSIS audit system can greatly improve the ICS safety protection ability.
Use Combination of Detection Systems to Reduce Errors of Judgment on Malicious Request
LIN Jie
Computer Science. 2013, 40 (Z6): 344-348. 
Abstract PDF(583KB) ( 582 )   
References | RelatedCitation | Metrics
Today’s Web application customization technology is widely used.Anomaly detection in early warning and real-time blocking the attack site of application-level program is a very suitable method.However,anomaly detection techniques are easier to detect problems of false positives and false negatives.The use of an integrated system can solve the problem.This integrated system includs the anomaly detection system based anomaly detection system,the Web and a database.Anomaly detection system and the SQL query of a Web serial structure of the anomaly detection system will be able to improve the efficiency of the detection system.The algorithm was evaluated for its applicability on several existing Web application.It is showed that the algorithm is feasible and effective to reduce false positives and false negatives.
Personalized Privacy Preserving Method Based on Lossy Join
LIU Ying-hua
Computer Science. 2013, 40 (Z6): 349-353. 
Abstract PDF(453KB) ( 626 )   
References | RelatedCitation | Metrics
Recently,anonymity model is one of the hot topic techniques in privacy preserving research.The mainly research is how to avoid leakage of sensitive data in data publishing,but also ensures the efficient use of data.This paper proposed a personalized(α[s],k) - lossy decomposition anonymity model.This method publishes the personalized data though generalization technology and personalizedα restriction for different code of the generalization tree.Based on the idea of lossy decomposition in database,data is projected into the sensitive information table and non sensitive information table,and then the redundant information can be realized privacy protection.Experimental results show that the model can provide better privacy.
Research on Best Fraction of Decimal
XUE Dan,LI Shun-dong and YANG Chen
Computer Science. 2013, 40 (Z6): 354-355. 
Abstract PDF(236KB) ( 1503 )   
References | RelatedCitation | Metrics
In scientific computing,irrational operation is considerably intractable.Transform irrational into integer will greatly convenient in scientific computing.To achieve integer representation to irrational,the first step is to achieve rational representation to irrational.We first transform irrational into continued fraction by utilizing continued fractions technique.Secondly,it is possible and reasonable to choose the most concise expression of the fraction according to the accuracy demand,so that we can achieve the rational approximation of irrational number.A list of the simplest form and the approximation error of some commonly used computing constants under various accuracy requirements is given,which has guiding significance for scientific computing.
Fair MAC Protocol Based RTS Injection Attack and Defense
YE Jin,WANG Zheng-fei,NIE Dong-ju and ZHANG Xiang-li
Computer Science. 2013, 40 (Z6): 356-360. 
Abstract PDF(427KB) ( 831 )   
References | RelatedCitation | Metrics
This paper focused on RTS injection attacks to access point in WLAN.A solution based on fair MAC protocol was proposed,which utilizes virtual queue management.Compared with the existed schemes,our solution is of simplicity and feasibility to be deployed at AP.Simulation results show that our solution can defense against RTS attacks effectively.The proposed fair MAC protocol can also help to defense against other types of DoS attacks.
Software Safety Test Analysis for Fire Control System of Remote Multi-barrel Rocket
PANG Hong-biao,LI Zhi-bo and GAO Xiao-ya
Computer Science. 2013, 40 (Z6): 361-364. 
Abstract PDF(380KB) ( 798 )   
References | RelatedCitation | Metrics
The fire control system’s software composition,function and typical task profile of remote multi-barrel rocket were introduced briefly.And the basic connotation of the software safety test was introduced briefly.Then according to the typical task profile of the fire control system,the software safety test in the various stages was analyzed,and the "difficult" " Miscellaneous " " multiple " problems in the course of the fire control system’s software safety test were solved systematically.The test efficiency and quality are improved effectively,and the fire control system’s safty of remote multi-barrel rocket is ensured further.
Encryption Algorithm of Color Video Image Based on Lorenz Chaos
HE Ye,WANG Lei,XIA Hui and ZHANG Xue-feng
Computer Science. 2013, 40 (Z6): 365-367. 
Abstract PDF(494KB) ( 600 )   
References | RelatedCitation | Metrics
Because chaotic encryption is a new area of research,most video encryption algorithms are based on low dimensional maps,and their securities need to be improved.Although the capability of encryption of high-dimensional chao-tic system is much more better,the generation process of chaotic sequences are also much more complex.It conflicts with the characteristics of large amount of data and the high real-time requirement of video encryption.Thus the high-dimensional chaotic system is less used in the encryption of video.In light of this,combining with ideas of diffusion of pixels,this dissertation proposed a color video image encryption algorithm based on chaotic Lorenz system.The system follows mechanism of confusion and diffusion proposed by Shannon’s information theory.Any pixel in the image which is decrypted incorrectly will affect the whole decryption of the video.The algorithm has a high security,besides it also has the advantage of fast encryption.The algorithm can satisfy the characteristics of video encryption which have a large quantity of data and demand a high real-time.
Gas Turbine Power Prediction Based on Support Vector Regression
WANG Wen-chao,MIAO Duo-qian and CHEN Ji-yuan
Computer Science. 2013, 40 (Z6): 368-371. 
Abstract PDF(321KB) ( 966 )   
References | RelatedCitation | Metrics
Forecasting for the next few hours of the gas turbine power is the key to predict trips,while the domestic related researches are still few.Though using support vector regression(SVR) model,and integration of multivariate forecasting,it improves the accuracy of the forecasts.These experimental data from the real data of a power plant,through some comparative experiments,describes the experimental procedure and selection methods of important parameters in detail.The results verify the effectiveness of the support vector regression techniques applied to practical power prediction.
Cloud Resources Management Method in Medical Institutions Deployment
WEI Zhen-gang,SUN Wei-cheng,YANG Jie and CHEN Chao
Computer Science. 2013, 40 (Z6): 372-373. 
Abstract PDF(518KB) ( 803 )   
References | RelatedCitation | Metrics
Applying the cloud computing to medical mechanism information construction can bring exciting results to medical institutions information management.From the point of view of cloud computing in the deployment of medical institutions,this paper presented a cloud resource management method by the resource database,and described database design and use in the cloud resources management.
Embedded Reliability Modeling of Assembly-line Production Oriented MANET
ZHAO Zhi-feng,TIAN Li-xin,ZHAO Xi-bin and ZHONG Cheng
Computer Science. 2013, 40 (Z6): 374-376. 
Abstract PDF(347KB) ( 592 )   
References | RelatedCitation | Metrics
Since the market competition of manufacturing becomes intense,improving the productive efficient is of importance.Manufacturing Execution System(MES) is considered to be good solution,but the communication network is basic of MES.With the serious environment of the shop in manufacturing,MANET(mobile ad hoc network) is introduced into our scheme.MANET is a kind of dynamic wireless communication network that does not rely on a fixed infrastructure and is lack of any centralized control.Based on a deep analysis of the application and real work environment,this paper proposed a ERMWT(Embedded Reliability Model on Working Table)for a work table production oriented MANET.
Application of Virtual Reality Technique in Tunnel Excavation Engineering
HUANG Di-long,DENG Fei and TANG Yun
Computer Science. 2013, 40 (Z6): 377-380. 
Abstract PDF(391KB) ( 869 )   
References | RelatedCitation | Metrics
We proposed an approach to simulate the tunneling process to ensure the safety of the underground-tunnel construction under complicated geological structure and risks of multiple geo-hazards.We first constructed the 3D geologi-cal model from the geological exploration data using intelligent deduction and human-computer interaction approaches.Then we simulated the tunneling process to show the geological structure changes of the tunnel surrounding rock.In this way,we can predict the potential geo-hazards in the tunneling process.This approach has been successfully applied to several rail way tunneling projects.It is proved that it can effectively predict the changes of the surrounding rock,the location,type and magnitude of the geo-hazards.This approach could provide accurate information for tunnel construction.
Discussion on Application of Technology of Network Isolation in Mobile Office Based on 3G Network
SUN Qing-he and LIU Dao-qun
Computer Science. 2013, 40 (Z6): 381-383. 
Abstract PDF(260KB) ( 742 )   
References | RelatedCitation | Metrics
Network isolation technology is taken to increase importance to the system and network security in more companies.In order to slove the security problems in mobile office based on 3G network,network isolation is imported.This article pays more attention to technical theories,main functions and characteristics of network isolation.Finally we proposed the solution of security problem of mobile office in 3G based on network isolation technology.The practical application proves that the security solution has the advantages of simple design,fully separation and high security characteristics.
Management System of Web Map Based on NewMap API for Recognising Traffic Congestion
MIAO De-wen,QIU Man,XU Zhong-qi,XI Xue-feng and Fu Bao-chuan
Computer Science. 2013, 40 (Z6): 384-386. 
Abstract PDF(268KB) ( 679 )   
References | RelatedCitation | Metrics
With China’s rapid economic development,China’s transportation infrastructure is greatly improved.Howe-ver,the growth of the road is behind the vehicle and traffic growth.At the same time driving directions become more complex,indirectly increasing the complexity of the road network.These are some obstacles for smooth driving.And now the road regulatory measures,camera surveillance,which needs almost 24-hour care,and blur images is inefficient.The congestion has become extremely difficult to control and resolve in a timely manner,so people’s travel has become a headache.If,on existing roads and vehicles,people can travel timely according to the current vehicles on the road,it will greatly reduce the complaints of the people travel difficult.The system uses the specific public vehicle traffic running real-time mobile information based on map of the NewMap API,combined with clogging recognition model.It is a real-time reaction to urban road traffic congestion,provides the preconditions for dynamic optimization travel routes.
Study of Parallel Network File System
ZHANG Yuan,YU Guan-long and KAN Yun-he
Computer Science. 2013, 40 (Z6): 387-391. 
Abstract PDF(679KB) ( 912 )   
References | RelatedCitation | Metrics
Beginning with the problems of solving the I/O bottleneck of high performance computer.First,this paper mainly analyzed and designed the architecture,access mechanism,management mechanism and operating mechanism of parallel network file system-PNFS.Second,we made the test of PNFS,and the results show that PNFS can resolve the problems of traditional file systems about scalability,availability and performance and provides an effective method for building high performance file system.
Study on Reuse of TT&C Application Software System
CHEN Xiao,SUN Jun and LIU Zhi-fang
Computer Science. 2013, 40 (Z6): 392-394. 
Abstract PDF(279KB) ( 601 )   
References | RelatedCitation | Metrics
As China launches more space missions with a higher frequency,the efficiency of its TT&C software in space mission preparation is being put to test.How to shorten the preparation cycle while ensuring high-quality output is an issue that urgently needs to be tackled.Based on the framework of “software reuse technology” which currently is a hot research topic,this paper takes into consideration the demand features of TT&C tasks and proposes to ensure spacecraft flight control by retrieving reusable components from TT&C application software system and putting them into reuse in order to relieve software burden and improve quality.
Research of Cloud Computing Resource Pricing Based on Stackelberg Leadership Model
FENG Yun and LI Hao
Computer Science. 2013, 40 (Z6): 395-397. 
Abstract PDF(332KB) ( 682 )   
References | RelatedCitation | Metrics
The resource management is the bottleneck of the cloud computing management.This paper delivered a new idea based on the lifecycle of the Cloud Bank,at the same time,this paper also provided a suitable pricing strategy.According to the different period of the resource characteristics,this paper mechanized corresponding pricing mechanisms.This paper tried to set up an automatic update pricing cloud resources mechanism to maximize the interests of all participants.
Spring of Smart Home is Coming
ZHANG Gui-qing,LU Man,WANG Ming,LI Cheng-dong,PENG Wei,DUAN Xin-mei and JI Xiang-he
Computer Science. 2013, 40 (Z6): 398-402. 
Abstract PDF(514KB) ( 1140 )   
References | RelatedCitation | Metrics
Firstly,the concept of the smart home was briefly introduced in this paper.And,the course of the development of smart home and its core technologies were summarized and discussed in detail.Then,from the multiple views of technology,production factory,the size of the market,and consciousness of consumers,this paper demonstrated that the spring of smart home is coming.At last,we looked into the future development of smart home.
Exam System Modelling Research Based on MVC
SI Biao
Computer Science. 2013, 40 (Z6): 403-406. 
Abstract PDF(355KB) ( 739 )   
References | RelatedCitation | Metrics
The network has become the main characteristics of the information technology and the application of the important means.In university,as the computer application technology is expanded,networked test is used as a highly efficient and accurate,serious examination form,an alternative to traditional written examination examination of a kind of trend,and the universities is an important means of professional course appraisal reform.This paper proposed a MVC mode based on the campus network exam system modeling solutions,and discussed the Struts framework of some methods of practical application.Practice proves that the use of a mature technology application development,can effectively guaran-tee the project reliability and stability.
Study of Semantic Sharing Scheme for Household Electrical Appliance Design Knowledge
CHANG Wan-jun,YANG Ya-nan and GUO Zu-hua
Computer Science. 2013, 40 (Z6): 407-409. 
Abstract PDF(493KB) ( 618 )   
References | RelatedCitation | Metrics
In life cycle management practice of the household electrical appliance enterprises,it still has some insufficient that the product design needs manual archiving and it is difficulty for query and cooperative.The ontology theory was introduced into the field of home appliances.The functional semantic extending method for is-a was presented and used to construct a function body based on studying the top-level ontology construction method of home appliances and extension method of ontology semantic.The index knowledge repository model of user demand-oriented was constructed.The home appliance product design knowledge is expressed by using OWL language.The user needs and ontology knowledge index were transformed to realize the sharing of semantic based on the method of ontology mapping and matching.Final,to verify the correct of the index knowledge model,the semantic sharing plat of refrigerator enterprise design knowledge was established.