
Supervised and Sponsored by Chongqing Southwest Information Co., Ltd.
CODEN JKIEBK


-
Survey of Model Checking
王蓁蓁. 模型检验综述[J]. 计算机科学, 2013, 40(Z6): 1-14.
WANG Zhen-zhen. Survey of Model Checking[J]. Computer Science, 2013, 40(Z6): 1-14. - WANG Zhen-zhen
- Computer Science. 2013, 40 (Z6): 1-14.
-
Abstract
PDF(1387KB) ( 2210 )
- RelatedCitation | Metrics
-
Model checking is an important technique in software/hardware verification,and it has become an enormous system of methodologies.Now we investigated the contents of model checking from three categories which are standard methods,abstract interpretation methods and integrate methods respectively.The aim of this survey is making one to have a complete impression about model checking.In this way one may fully understand and grasp the spirits and concrete contents of every method in model checking.The studies help in applying these methods to the piratical software/hardware verification,and furthermore,inspired of this,one may develop new model checking theories or new methods or tools of model checking.
-
Improved Differential Evolution Algorithm Based on Mutation Strategy of Tournament Selection for Function Optimization
傅嗣鹏,乔俊飞,韩红桂. 基于锦标赛选择变异策略的改进差分进化算法及函数优化[J]. 计算机科学, 2013, 40(Z6): 15-18.
FU Si-peng,QIAO Jun-fei and HAN Hong-gui. Improved Differential Evolution Algorithm Based on Mutation Strategy of Tournament Selection for Function Optimization[J]. Computer Science, 2013, 40(Z6): 15-18. - FU Si-peng,QIAO Jun-fei and HAN Hong-gui
- Computer Science. 2013, 40 (Z6): 15-18.
-
Abstract
PDF(438KB) ( 1117 )
- References | RelatedCitation | Metrics
-
The traditional mutation strategy of differential evolution algorithm can not reach a good tradeoff between robustness in global convergence and the search efficiency.The operators are constants,and the differential evolution algorithm leads to many problems,such as the low search efficiency and the premature convergence.Based on analysis of performance of the mutation strategies,a new mutation strategy with tournament selection rule taking the best individual vector from the random individual vectors as the base vector was proposed in this paper.Meanwhile,selecting the direction for the difference vector beneficial to search and making strengthen on the difference vectors is to improve the convergence rate and maintain the diversity of population.The random normal scaling factor F and the time-varying crossover probability factor CR are used synchronously to advance the local search and global search.Finally,the improved differential evolution algorithm was tested on four benchmark functions.The simulation results show that the improved algorithm can effectively avoid the premature convergence,as well as improve the global convergence ability and the search efficiency remarkably.
-
QoS Aggregation for End-to-End QoS Requirement in Service Composition
刘志忠,王勇,贺毅辉,彭辉. 服务组合中面向端到端用户QoS需求的QoS聚合机制研究[J]. 计算机科学, 2013, 40(Z6): 19-21.
LIU Zhi-zhong,WANG Yong,HE Yi-hui and PENG Hui. QoS Aggregation for End-to-End QoS Requirement in Service Composition[J]. Computer Science, 2013, 40(Z6): 19-21. - LIU Zhi-zhong,WANG Yong,HE Yi-hui and PENG Hui
- Computer Science. 2013, 40 (Z6): 19-21.
-
Abstract
PDF(336KB) ( 762 )
- References | RelatedCitation | Metrics
-
While service individual’s QoS description is from its own viewpoint,there is a semantic gap between these services’ description.Based on a hierarchical ontology model,a QoS ontology model was proposed,which establishes the relationship between user QoS and service QoS.And the QoS aggregation mechanism was studied for several basic structures.A QoS aggregation algorithm was proposed to aggregate the QoS of whole composite service.Further,A QoS translation algorithm was discussed to translate service QoSs to user QoSs,and it satisfies the end-to-end QoS requirements.
-
Hierarchical Agent in Military Analysis Simulation for On-line Decision Support System
杨妹,杨山亮,赵鑫业,杨政军,周云. 基于分层Agent的军事分析仿真在线辅助决策系统研究[J]. 计算机科学, 2013, 40(Z6): 22-26.
YANG Mei,YANG Shan-liang,ZHAO Xin-ye,YANG Zheng-jun and ZHOU Yun. Hierarchical Agent in Military Analysis Simulation for On-line Decision Support System[J]. Computer Science, 2013, 40(Z6): 22-26. - YANG Mei,YANG Shan-liang,ZHAO Xin-ye,YANG Zheng-jun and ZHOU Yun
- Computer Science. 2013, 40 (Z6): 22-26.
-
Abstract
PDF(443KB) ( 1512 )
- References | RelatedCitation | Metrics
-
Command and Control(C2) are one of the major objects in Military analysis simulation for on-line decision support system.Hierarchical Agent-based framework was proposed to modeling C2and the relationship between them with three layers which are strategic level,tactical level and execution level.The implementation of the models was complied with the simulation engine of BOM-based HPC-RTI.The example of Air-Ground system illustrates the application of the proposed approach.
-
Optimization of Weights of LVQ Clustering Algorithm Based on Immune Clonal Algorithm
张晓丹,黄海燕. 基于免疫克隆算法的LVQ聚类算法权值优化[J]. 计算机科学, 2013, 40(Z6): 27-28.
ZHANG Xiao-dan and HUANG Hai-yan. Optimization of Weights of LVQ Clustering Algorithm Based on Immune Clonal Algorithm[J]. Computer Science, 2013, 40(Z6): 27-28. - ZHANG Xiao-dan and HUANG Hai-yan
- Computer Science. 2013, 40 (Z6): 27-28.
-
Abstract
PDF(232KB) ( 708 )
- References | RelatedCitation | Metrics
-
A major problem of learning vector quantization(LVQ) clustering algorithm is its sensitivity to the initialization,affecting the clustering precision.This paper fist introduced the theory of LVQ clustering algorithm,then used immune clonal algorithm to optimize the initial values of LVQ.And the paper used IRIS data to test this new method.Comparing the evolving LVQ with the standard LVQ,the experiment results indicate that the approach of LVQ based on immune clonal algorithm has obvious stability to initial weights.
-
Research on Representation Arithmetic of Radar Detection Range in Complicated Terrain Environment
白玉兵,余小游,陈寿辙,殷玲,陈铁军. 复杂地形影响下雷达探测范围表现算法研究[J]. 计算机科学, 2013, 40(Z6): 29-32.
BAI Yu-bing,YU Xiao-you,CHEN Shou-zhe,YIN Ling and CHEN Tie-jun. Research on Representation Arithmetic of Radar Detection Range in Complicated Terrain Environment[J]. Computer Science, 2013, 40(Z6): 29-32. - BAI Yu-bing,YU Xiao-you,CHEN Shou-zhe,YIN Ling and CHEN Tie-jun
- Computer Science. 2013, 40 (Z6): 29-32.
-
Abstract
PDF(582KB) ( 1016 )
- References | RelatedCitation | Metrics
-
Through analysis of the relative position between the borderline of radar coverage and the height of digital terrain,the correction arithmetic of radar coverage influenced by complicated terrain was proposed,which is based on the principle of geometrics optics.Finally,the correction of radar coverage in complicated terrain was realized,which uses the propagation attenuation theory of the radar electromagnetic wave,the method of mixed sampling and the correction arithmetic.The result of experiment shows that this method not only is efficient for the complicated terrain,but also can make the visualization lifelike.
-
Particle Swarm Optimized Particle Filter Based on Metropolis-Hastings Mutation
路威,张邦宁. 基于Metropolis-Hastings变异的粒子群优化粒子滤波器[J]. 计算机科学, 2013, 40(Z6): 33-36.
LU Wei and ZHANG Bang-ning. Particle Swarm Optimized Particle Filter Based on Metropolis-Hastings Mutation[J]. Computer Science, 2013, 40(Z6): 33-36. - LU Wei and ZHANG Bang-ning
- Computer Science. 2013, 40 (Z6): 33-36.
-
Abstract
PDF(335KB) ( 1019 )
- References | RelatedCitation | Metrics
-
A particle swarm optimized resampling method for particle filter based on Metropolis-Hastings(MH) mutation was proposed for improving estimation performance and particle impoverishment problem in the particle filter.The new algorithm chooses the MH moving as a mutation operator of particle swarm optimized,combines the mutation operator with velocity-position searching progress,and generates the particles so that their stationary distribution is a target posterior density.The new algorithm solves the problem of particle divergence effectively,speeds up the convergence rate,and improves the estimation precision.The simulation results show that the PSO resampling based on MH mutation can remove the degeneracy phenomenon and improve the tracking estimating effects in non-line system.
-
Research on Architecture of Intelligent Manufacturing Based on Cyber-physical System
张彩霞,程良伦,王向东. 基于信息物理融合系统的智能制造架构研究[J]. 计算机科学, 2013, 40(Z6): 37-40.
ZHANG Cai-xia,CHENG Liang-lun and WANG Xiang-dong. Research on Architecture of Intelligent Manufacturing Based on Cyber-physical System[J]. Computer Science, 2013, 40(Z6): 37-40. - ZHANG Cai-xia,CHENG Liang-lun and WANG Xiang-dong
- Computer Science. 2013, 40 (Z6): 37-40.
-
Abstract
PDF(422KB) ( 1940 )
- References | RelatedCitation | Metrics
-
The characteristics and functions of cyber-physical system provide effective thinking and approach for discrete manufacturing intelligent production and competitiveness.Based on the existing networking and the concept of CPS and combining the existing discrete manufacturing industry structure characteristics,we constructed a discrete manufacturing physical system basic framework based on the CPS,at the same time,the framework and the corresponding function module were analyzed.Finally,several important research problems associated with the existing discrete manufactu-ring of CPS,including the discrete manufacturing CPS basic theory and system model,system optimization scheduling and autonomous mechanism,safety,reliability,system verification and so on,were elaborated.
-
Application of PSOEM-LSSVM in Medium and Long Term Power Load Forecasting
段其昌,周华鑫,曾勇,张广峰. 带扩展记忆的粒子群优化最小二乘支持向量机在中长期电力负荷预测中的应用[J]. 计算机科学, 2013, 40(Z6): 41-43.
DUAN Qi-chang,ZHOU Hua-xin,ZENG Yong and ZHANG Guang-feng. Application of PSOEM-LSSVM in Medium and Long Term Power Load Forecasting[J]. Computer Science, 2013, 40(Z6): 41-43. - DUAN Qi-chang,ZHOU Hua-xin,ZENG Yong and ZHANG Guang-feng
- Computer Science. 2013, 40 (Z6): 41-43.
-
Abstract
PDF(247KB) ( 721 )
- References | RelatedCitation | Metrics
-
For medium and long term power load forecasting,considering the factors affecting medium and long-term power load,a method based on the particle swarm optimization with Extended Memory(PSOEM) and Least squares support vector machines(LSSVM) was proposed for medium and long -term load forecasting.PSOEM has more extensive capability of global optimization than PSO owing to higher accuracy and convergence rate,so it is used to optimize the parameters of the LSSVM,and obtains an optimum PSOEM-LSSVM model to forecast the load.An example simulation shows that this method can offer a higher precision and speed of forcasting than several other methods.
-
Study on Finer-Grained Privilege Model for MIS Based on Domain-driven
张忠捷,喻昕,王高才. 基于领域驱动的MIS系统细粒度权限模型研究[J]. 计算机科学, 2013, 40(Z6): 44-49.
ZHANG Zhong-jie,YU Xin and WANG Gao-cai. Study on Finer-Grained Privilege Model for MIS Based on Domain-driven[J]. Computer Science, 2013, 40(Z6): 44-49. - ZHANG Zhong-jie,YU Xin and WANG Gao-cai
- Computer Science. 2013, 40 (Z6): 44-49.
-
Abstract
PDF(559KB) ( 1179 )
- References | RelatedCitation | Metrics
-
Privilege management is an very important part for management information system(MIS).Nowadays,the existing privilege management methods are coarse or confused,and they can’t implement integrated and elaborate privilege management.On the other hand,others privilege management schemes maybe good,but they can’t match current mainstream software development models and frameworks,and can’t provide better exercisablility.Therefore,this paper improved and refined traditional RBAC model based on domain-driven to construct and implement a finer-grained privilege model for MIS.The paper also showed the whole privilege management process for constructing,and provided a whole solvable project for developing privilege management.
-
Partition Algorithm of Animal Foci Distribution Based on Spatial Clustering Analysis
郭茂耘,潘丽娟,江红旗,柴毅. 基于空间聚类的动物疫点分布划分算法研究[J]. 计算机科学, 2013, 40(Z6): 50-53.
GUO Mao-yun,PAN Li-juan,JIANG Hong-qi and CHAI Yi. Partition Algorithm of Animal Foci Distribution Based on Spatial Clustering Analysis[J]. Computer Science, 2013, 40(Z6): 50-53. - GUO Mao-yun,PAN Li-juan,JIANG Hong-qi and CHAI Yi
- Computer Science. 2013, 40 (Z6): 50-53.
-
Abstract
PDF(360KB) ( 723 )
- References | RelatedCitation | Metrics
-
The reasonable effective configuration of epidemic prevention and management resources(personnel and equipment,etc.) is one of the main concerns about animal epidemic prevention system.This paper proposed a method to classify and divide foci based on a spatial clustering method and a principle of maximum included angles.Firstly,the K-Means clustering analysis method was applied to the foci distribution and realized the classification of foci by intimate or distant relationship.Secondly,based on the principle of maximum angle,determined the boundary line of each classification.By above methods,realized the foci classification division according to the spatial relationship and got divided area,so that epidemic management personnel could get decision support to effectively monitoring and analyzing epidemic spatial distribution model,controlling and preventing the spread of the animal epidemic information.
-
Research on Optimal Test Selection Based on Fused Algorithm
刘刚,黎放,狄鹏. 基于融合算法的测试优化选择问题研究[J]. 计算机科学, 2013, 40(Z6): 54-57.
LIU Gang,LI Fang and DI Peng. Research on Optimal Test Selection Based on Fused Algorithm[J]. Computer Science, 2013, 40(Z6): 54-57. - LIU Gang,LI Fang and DI Peng
- Computer Science. 2013, 40 (Z6): 54-57.
-
Abstract
PDF(352KB) ( 684 )
- References | RelatedCitation | Metrics
-
Test optimization selection is a set cover problem,and heuristic algorithm for set covering problem is effective method.A genetic simulated annealing neural network fused algorithm was proposed by fusing the genetic algorithm,BP neural network and the simulated annealing algorithm,the genetic algorithm global search ability,strong ability of BP neural network training algorithm and fast search ability of simulated annealing algorithm were made full use of in this algorithm,the phenomenon falling into local optimum was avoided,and also the search efficiency and accuracy wad improved,the algorithm is applied to solve the test optimization selection problem.Example proves,this algorithm can effectively and quickly obtain test the optimal solution of optimization problems.
-
Applications of Memristive Cellular Neural Network in Car License Plate Location
张凤清,段书凯,王丽丹,胡小方. 忆阻细胞神经网络在车牌定位中的应用[J]. 计算机科学, 2013, 40(Z6): 58-60.
ZHANG Feng-qing,DUAN Shu-kai,WANG Li-dan and HU Xiao-fang. Applications of Memristive Cellular Neural Network in Car License Plate Location[J]. Computer Science, 2013, 40(Z6): 58-60. - ZHANG Feng-qing,DUAN Shu-kai,WANG Li-dan and HU Xiao-fang
- Computer Science. 2013, 40 (Z6): 58-60.
-
Abstract
PDF(802KB) ( 834 )
- References | RelatedCitation | Metrics
-
Memristive cellular neural network(MCNN) was proposed in this paper,which combines novel nano-scale circuit device-memristor with cellular neural network(CNN).It has smaller size,lower power consumption and faster computation speed than that of traditional CNN.Then the MCNN was employed for preprocessing of car license plate location.The corresponding computer simulation results demonstrate the effectiveness of the proposed system.This proposed MCNN is expected to be easier for the hardware implementation,useful for improving the speed and efficiency of the car license plate recognition.
-
Novel Algorithm for Single Channel Blind Separation
赵文红,王巍. 求解单通道盲分离问题的一种新方法[J]. 计算机科学, 2013, 40(Z6): 61-63.
ZHAO Wen-hong and WANG Wei. Novel Algorithm for Single Channel Blind Separation[J]. Computer Science, 2013, 40(Z6): 61-63. - ZHAO Wen-hong and WANG Wei
- Computer Science. 2013, 40 (Z6): 61-63.
-
Abstract
PDF(478KB) ( 698 )
- References | RelatedCitation | Metrics
-
As an important branch of signal processing,single channel blind separation has received more and more attention in recent years.Particle filtering and evolutionary algorithm can both use a population of particles approximate optimal solutions sets,and each method has its own advantages.In this paper,combining the two methods,we proposed an algorithm for single channel blind separation.Not only does it exploit the accuracy of the particle filtering,but it takes advantage of the good convergence of the evolutionary algorithm.For co-frequency signals,we used the frame of particle filtering,do important sampling with roulette wheel selection,and estimate current state by Maximum Likelihood sequences estimation(MLSE).
-
Novel Genetic Algorithm for Multi-objective Optimization Problem
韩丽霞. 求解多目标优化问题的新遗传算法[J]. 计算机科学, 2013, 40(Z6): 64-66.
HAN Li-xia. Novel Genetic Algorithm for Multi-objective Optimization Problem[J]. Computer Science, 2013, 40(Z6): 64-66. - HAN Li-xia
- Computer Science. 2013, 40 (Z6): 64-66.
-
Abstract
PDF(310KB) ( 1632 )
- References | RelatedCitation | Metrics
-
For multi-objective optimization problems(MOP),a new algorithm was proposed.The nondominated direction was firstly defined.Then,a new crossover operator and a mutation operator were presented based on the definition.Finally,the computer simulations on benchmark problems demonstrate that the proposed algorithm is effective and can find high quality solution set in terms of convergence,diversity,and the distribution of the obtained Pareto optimal solutions.
-
Quantum Genetic Evolutionary Algorithm for Bin Packing Problem
郭晶,陈贤富. 面向装箱问题的量子遗传优化算法[J]. 计算机科学, 2013, 40(Z6): 67-69.
GUO Jing and CHEN Xian-fu. Quantum Genetic Evolutionary Algorithm for Bin Packing Problem[J]. Computer Science, 2013, 40(Z6): 67-69. - GUO Jing and CHEN Xian-fu
- Computer Science. 2013, 40 (Z6): 67-69.
-
Abstract
PDF(332KB) ( 1064 )
- References | RelatedCitation | Metrics
-
Aiming at the problem of the genetic algorithm’s system maintenance ability,the paper presented a quantum-inspired evolutionary algorithm for layout and optimization of bin packing problem.This algorithm adopts quantum bit coding and quantum improving mutation.According to the specific situation of bin packing problem,the corresponding rotation gate updating strategy was devised and genetic operation was introduced.Furthermore a new repair strategy called modified complete and best fit algorithm were proposed.Finally,the eight testing sets were tested.The experimental results show this algorithm has a higher performance in maintaining the population diversity of genetic gene and improving the quality of optimization.
-
Research on Applications of Modern Modal Logic in Computer Science
陈志远,黄少滨,韩丽丽. 现代模态逻辑在计算机科学中的应用研究[J]. 计算机科学, 2013, 40(Z6): 70-76.
CHEN Zhi-yuan,HUANG Shao-bin and HAN Li-li. Research on Applications of Modern Modal Logic in Computer Science[J]. Computer Science, 2013, 40(Z6): 70-76. - CHEN Zhi-yuan,HUANG Shao-bin and HAN Li-li
- Computer Science. 2013, 40 (Z6): 70-76.
-
Abstract
PDF(681KB) ( 2487 )
- References | RelatedCitation | Metrics
-
Modern modal logic is set up on the basis of classical mathematical logic,and mainly includes narrow modal logic,deontic logic,epistemic logic,belief logic,temporal logic and dynamic logic.With the emergence of the Kripke semantic model,modal logic has become one of the most important branches of logics,and has been successfully applied to many fields such as mathematics,economics,social science,computer science and quantum mechanics.This paper introduced the main contents of modern modal logic,and mainly overviewed the following three application aspects of modern modal logic which include programming language,knowledge representation,multi-agent system,model checking,mechanical theorem proving and no monotonic logic.At the same time,this paper presented the research targets,the research advances and the development trend of modern modal logic.At last,the paper pointed out the problems in research on modern modal logic and suggested the trend of future development and research.
-
Survey of State Explosion Problem in Model Checking
侯刚,周宽久,勇嘉伟,任龙涛,王小龙. 模型检测中状态爆炸问题研究综述[J]. 计算机科学, 2013, 40(Z6): 77-86.
HOU Gang,ZHOU Kuan-jiu,YONG Jia-wei,REN Long-tao and WANG Xiao-long. Survey of State Explosion Problem in Model Checking[J]. Computer Science, 2013, 40(Z6): 77-86. - HOU Gang,ZHOU Kuan-jiu,YONG Jia-wei,REN Long-tao and WANG Xiao-long
- Computer Science. 2013, 40 (Z6): 77-86.
-
Abstract
PDF(1014KB) ( 3370 )
- References | RelatedCitation | Metrics
-
Model checking has become an important approach to ensure the correctness and reliability software systems.However,with the increasingly powerful software functionality,system scale and complexity are also growing.Then it is easy to produce state explosion problem in model checking process.How to solve the state explosion in model checking has become an important issue that can not be avoided by the industry and theorists.In this paper,we overviewed the key technology and main methods of solving state explosion problem,and proposed the latest research progress and direction in this field of model checking.
-
Improved Geese Swarm Optimization Algorithm Based on Gaussian Weighted Sum
庄培显,戴声奎. 基于高斯加权的GeesePSO改进算法[J]. 计算机科学, 2013, 40(Z6): 87-89.
ZHUANG Pei-xian and DAI Sheng-kui. Improved Geese Swarm Optimization Algorithm Based on Gaussian Weighted Sum[J]. Computer Science, 2013, 40(Z6): 87-89. - ZHUANG Pei-xian and DAI Sheng-kui
- Computer Science. 2013, 40 (Z6): 87-89.
-
Abstract
PDF(596KB) ( 703 )
- References | RelatedCitation | Metrics
-
In order to improve the optimization performance for PSO,through observation and analysis of the natural phenomenon of formation flight of geese,researchers at home proposed the geese swarm optimization algorithm(GPSO).Although this algorithm has improved performance for PSO in some extent,the mechanism of average-weighted for GPSO is unreasonable,namely the defect of minimum optimization.For this issue,this paper proposed the geese swarm optimization algorithm based on gaussian-weighted(GWGPSO) through reasonable improvements of GPSO.The experimental results show that the new algorithm has improved these indicators,such as convergence precision,convergence rate and robustness,which proves that the gaussian-weighted method is reasonable and correct.
-
Construction Principles and Algorithms of Concept Lattice Generated by Random Decision Formal Context
刘保相,李言. 随机决策形式背景下的概念格构建原理与算法[J]. 计算机科学, 2013, 40(Z6): 90-92.
LIU Bao-xiang and LI Yan. Construction Principles and Algorithms of Concept Lattice Generated by Random Decision Formal Context[J]. Computer Science, 2013, 40(Z6): 90-92. - LIU Bao-xiang and LI Yan
- Computer Science. 2013, 40 (Z6): 90-92.
-
Abstract
PDF(327KB) ( 728 )
- References | RelatedCitation | Metrics
-
The concept lattice was proposed based on binary relations concept hierarchy for data analysis and rule extraction.For random decision formal context,this paper discussed the mathematical concept of random decision formal context random,and proved the existence of random concept Galois connection,proposed the construction algorithm of random concept lattice.Finally,the case proves its effectiveness.
-
New Algorithm for Sparse Signals Reconstruction
戚平. 一种求解稀疏信号重构的新算法[J]. 计算机科学, 2013, 40(Z6): 93-95.
QI Ping. New Algorithm for Sparse Signals Reconstruction[J]. Computer Science, 2013, 40(Z6): 93-95. - QI Ping
- Computer Science. 2013, 40 (Z6): 93-95.
-
Abstract
PDF(201KB) ( 793 )
- References | RelatedCitation | Metrics
-
The class of 1 norm regularization problems has received much attention recently because of the introduction of “compressed sensing” which allows signals to be reconstructed from small amounts of data.With an equivalent form of least squares problem and some techniques of Bregman iterative methods,we induced a derivation of A+ linear Bregman iteration method that is equivalent to the one that exits.
-
High Order Matrix Multiplication by MapReduce Algorithm Based on Hadoop Platform
向林泓,陈芋文,张昱琳. 基于Hadoop平台的高阶矩阵相乘MapReduce算法研究[J]. 计算机科学, 2013, 40(Z6): 96-98.
XIANG Lin-hong,CHEN Yu-wen and ZHANG Yu-lin. High Order Matrix Multiplication by MapReduce Algorithm Based on Hadoop Platform[J]. Computer Science, 2013, 40(Z6): 96-98. - XIANG Lin-hong,CHEN Yu-wen and ZHANG Yu-lin
- Computer Science. 2013, 40 (Z6): 96-98.
-
Abstract
PDF(245KB) ( 1404 )
- References | RelatedCitation | Metrics
-
Currently,high-order matrix multiplication using single-node computer causes computational bottlenecks and even leads the computer to crash for memory overflow.Taking advantage of distributed processing and virtualization technology from cloud computing,this paper presented a new method of high-order matrix multiplication by MapReduce based on Hadoop platform.The experimental results show that this algorithm can solve the computational bottlenecks with respect to high order matrix multiplication matrix and improve computational efficiency accordingly.
-
Improved Bounded Model Checking on Verification of Valid ACTL Properties
徐亮,余建平. 改进的验证正确性ACTL性质的限界模型检测方法[J]. 计算机科学, 2013, 40(Z6): 99-102.
XU Liang and YU Jian-ping. Improved Bounded Model Checking on Verification of Valid ACTL Properties[J]. Computer Science, 2013, 40(Z6): 99-102. - XU Liang and YU Jian-ping
- Computer Science. 2013, 40 (Z6): 99-102.
-
Abstract
PDF(305KB) ( 804 )
- References | RelatedCitation | Metrics
-
SAT-based bounded model checking has been introduced as a complementary technique to BDD-based symbolic model checking in recent years,and a lot of successful work has been done with this approach.The success is mostly due to the efficiency of error-detection.Verification of valid properties depends on a completeness threshold that could be too large to be practical.In order to check the valid ACTL properties,the encodings in traditional bounded model checking should be changed.Also,some improvements have been done for this method to improve its efficiency and enlarge its application fields.
-
Application of Optimization Algorithm of Vague Sets in Transmission Scheme Optimum Seeking
王海丰,王鸿绪,张鲲. Vague集方案优选算法在传动方案优选中的应用[J]. 计算机科学, 2013, 40(Z6): 103-104.
WANG Hai-feng,WANG Hong-xu and ZHANG Kun. Application of Optimization Algorithm of Vague Sets in Transmission Scheme Optimum Seeking[J]. Computer Science, 2013, 40(Z6): 103-104. - WANG Hai-feng,WANG Hong-xu and ZHANG Kun
- Computer Science. 2013, 40 (Z6): 103-104.
-
Abstract
PDF(246KB) ( 612 )
- References | RelatedCitation | Metrics
-
For transmission design schemes to main structure of Tapered Roller Screen for Thermal Power Plant,we propose the intact optimization algorithm of Vague sets for transmission decision schemes.Applying similarity measures analysis of vague sets,we come up with more than two ways that was transformed from interval data to vague data that based on a set of new similarity measure formula for vague sets(value).Two kinds of proposed formulas are two technical supports for optimization algorithm of vague scheme.Experimental results show that the proposed formulas and optimization algorithm of vague scheme can provide a useful way for the application examples.
-
Segmented Quantum-simplex Evolutionary Algorithm and Function Optimization
张伟丰. 分段式量子-单纯形进化算法及函数优化[J]. 计算机科学, 2013, 40(Z6): 105-107.
ZHANG Wei-feng. Segmented Quantum-simplex Evolutionary Algorithm and Function Optimization[J]. Computer Science, 2013, 40(Z6): 105-107. - ZHANG Wei-feng
- Computer Science. 2013, 40 (Z6): 105-107.
-
Abstract
PDF(249KB) ( 636 )
- References | RelatedCitation | Metrics
-
In high-dimensional complex function optimization,quantum evolutionary algorithm is easy to fall into local optimal solution and convergence speed slower in the later stage of evolution,in order to improve its search performance further,this paper proposes a segmented quantum evolutionary algorithm which introduces simplex search operator,the search process is divided into three stages,first,use quantum evolutionary algorithm to search a certain times,then divided the population into a number of sub-populations,each individual of sub-populations as the initial vertex of the simplex method and parallel search using the simplex method,merge the sub-populations after search,use quantum evolutionary algorithm continue to the last searching.The simulation results of several typical high-dimensional function show that this algorithm has faster convergence speed and higher accuracy.
-
Design and Implementation of Buffered Crossbar Scheduling Algorithm with Round Robin Scheduling
刘飞,李冰,张磊磊. 基于轮转算法的缓冲交叉开关调度算法的设计与实现[J]. 计算机科学, 2013, 40(Z6): 108-111.
LIU Fei,LI Bing and ZHANG Lei-lei. Design and Implementation of Buffered Crossbar Scheduling Algorithm with Round Robin Scheduling[J]. Computer Science, 2013, 40(Z6): 108-111. - LIU Fei,LI Bing and ZHANG Lei-lei
- Computer Science. 2013, 40 (Z6): 108-111.
-
Abstract
PDF(302KB) ( 992 )
- References | RelatedCitation | Metrics
-
In this paper a low complexity,high-performance scheduling algorithm-Round Robin scheduling algorithm and its hardware implementation is given.It is based on buffered crossbar switch fabric.Compared to the bufferless crossbar switch fabric,buffered crossbar switch fabric only requires simple schedulers that operate independently for each output crosspoint queue column and independently for each VOQ queue.This greatly simplifies the scheduling complexity of hardware and reduces system latency.So by combinating the advantage of Round Robin scheduling algorithm and buffered crossbar,a high performance switch can be implemented.
-
Based on the Semantic Information of the Stored Energy Efficiency Research
尤红桃,张延园,林奕,刘胜. 基于语义信息的存储能效的研究[J]. 计算机科学, 2013, 40(Z6): 112-114.
YOU Hong-tao,ZHANG Yan-yuan,LIN Yi and LIU Sheng. Based on the Semantic Information of the Stored Energy Efficiency Research[J]. Computer Science, 2013, 40(Z6): 112-114. - YOU Hong-tao,ZHANG Yan-yuan,LIN Yi and LIU Sheng
- Computer Science. 2013, 40 (Z6): 112-114.
-
Abstract
PDF(358KB) ( 754 )
- References | RelatedCitation | Metrics
-
With the digital information explosive growth,storage technology has become a new impetus to the development of IT industry,constantly expanding the size of the storage system,energy efficiency problem is becoming more and more serious,main show is increase of system operation and maintenance cost,reduces the system operation reliability and expansibility,exacerbated by the storage system to environmental pollution,so the study of stored energy efficiency has great economic value and practical significance.The article elaborated the storage system disk energy current situation and research progress,and from the semantic information of design and realization,based on the semantic information of the driver.Experimental results show that the driver can effectively reduced the energy consumption of the disk storage system,improved the I/O performance,optimized the energy efficiency of storage.
-
Research on Conflict Detection of Business Architecture Requirements Based on Semantics
朱岭,郭树行. 基于语义的业务架构需求冲突验证研究[J]. 计算机科学, 2013, 40(Z6): 115-119.
ZHU Ling and GUO Shu-hang. Research on Conflict Detection of Business Architecture Requirements Based on Semantics[J]. Computer Science, 2013, 40(Z6): 115-119. - ZHU Ling and GUO Shu-hang
- Computer Science. 2013, 40 (Z6): 115-119.
-
Abstract
PDF(447KB) ( 724 )
- References | RelatedCitation | Metrics
-
To solve the problem that enterprises often come across conflicts in different kinds of requirements,a method to solve the conflict detection problem of business architecture requirements based on Semantics is proposed.First,this paper discusses the concepts of enterprise architecture and business architecture.Second,the definition and influence of conflicts of business architecture requirements are discussed.Then,a detection method on conflicts of project grouping is put forward based on conventional Semantic Model in the perspective of business architecture.Besides that,a case study is set to verify the feasibility of the method.Finally,the TOGAF requirements and their conflict detection method are discussed.
-
Dynamic Scheduling and Real-time Rendering Method for Large-Scale Terrain
刘浩,曹巍,赵文吉,宁方馨,潘李亮. 面向大规模地形的瓦片调度与实时绘制算法[J]. 计算机科学, 2013, 40(Z6): 120-124.
LIU Hao,CAO Wei,ZHAO Wen-ji,NING Fang-xin and PAN Li-liang. Dynamic Scheduling and Real-time Rendering Method for Large-Scale Terrain[J]. Computer Science, 2013, 40(Z6): 120-124. - LIU Hao,CAO Wei,ZHAO Wen-ji,NING Fang-xin and PAN Li-liang
- Computer Science. 2013, 40 (Z6): 120-124.
-
Abstract
PDF(1399KB) ( 677 )
- References | RelatedCitation | Metrics
-
Along with the development of the graphics hardware,the transmission of large-scale data has replaced the lack of rendering capacity as the new bottleneck of large scale terrain rendering.Aiming at this problem,we present a new approach for dynamic scheduling and real-time rendering for large-scale terrain.Terrain data are stored as tile-pyramid in hard disk,in real-time rendering phase,only a few of tiles are streamed into the video memory every frame.First,GPU computes and transfers geographic coordinates of the current scene into CPU in real time,CPU analyses and calculates the visible region through these coordinates,and then selects the optimum combination of visible tiles(visible tiles set) among all the layers by quad-tree generating,tiles regularization and tiles merging.The visible tiles set are streamed into CPU,managed and updated in a fix-sized buffer,and finally transferred into GPU as a texture for sampling and rendering.Experiments show that this algorithm saves a large amount of video memory bandwidth,improves the efficiency of data transmission effectively,and obtaines a good result in the large scale terrain scheduling and rendering.
-
Evolutionary Gene Selection Based on Tolerance Rough Set Theory
焦娜. 基于相容粗糙集的改进的基因特征选择方法[J]. 计算机科学, 2013, 40(Z6): 125-128.
JIAO Na. Evolutionary Gene Selection Based on Tolerance Rough Set Theory[J]. Computer Science, 2013, 40(Z6): 125-128. - JIAO Na
- Computer Science. 2013, 40 (Z6): 125-128.
-
Abstract
PDF(370KB) ( 614 )
- References | RelatedCitation | Metrics
-
Gene selection is to select the most informative genes from the whole gene set,which is a key step of the discriminant analysis of microarray data.Rough set theory is an efficient mathematical tool for further reducing redundancy.The main limitation of traditional rough set theory is the lack of effective methods for dealing with real-valued data.However,gene expression data sets are always continuous.This has been addressed by employing discretization methods,which may result in information loss.This paper investigates one approach combining feature ranking together with features selection based on tolerance rough set theory.Moreover,this paper explores the other method which can utilize the information contained within the boundary region to improve classification accuracy in gene expression data.Compared with gene selection algorithm based on rough set theory,the proposed methods are more effective for selecting high discriminative genes in cancer classification task.
-
Analysis of User’s Interacting Behavior in BBS Forum Based on Subject Tree
胡雪娇,李慧,马国栋. 基于主题树的BBS论坛用户互动行为分析[J]. 计算机科学, 2013, 40(Z6): 129-132.
HU Xue-jiao,LI Hui and MA Guo-dong. Analysis of User’s Interacting Behavior in BBS Forum Based on Subject Tree[J]. Computer Science, 2013, 40(Z6): 129-132. - HU Xue-jiao,LI Hui and MA Guo-dong
- Computer Science. 2013, 40 (Z6): 129-132.
-
Abstract
PDF(826KB) ( 638 )
- References | RelatedCitation | Metrics
-
The interactions between users have great significance for studying BBS forum.The subject tree is introduced to accurately describe the process of interaction between users of BBS tree forum,at the same time the theme breadth coefficient W and the theme depth coefficient D are introduced in the paper to detailed describe the user interaction in the subject.The results show that the total number of posts does not fully describe the user interaction,and the post which has frequent user interaction does not necessarily have a higher total topic posts.Therefore,the user interaction is divided into five results according to the theme breadth coefficient W and the theme depth coefficient D.
-
Discretization Algorithm Based on Granular Computing and its Application
史志才,夏永祥,周金祖. 基于粒计算的离散化算法及其应用[J]. 计算机科学, 2013, 40(Z6): 133-135.
SHI Zhi-cai,XIA Yong-xiang and ZHOU Jin-zu. Discretization Algorithm Based on Granular Computing and its Application[J]. Computer Science, 2013, 40(Z6): 133-135. - SHI Zhi-cai,XIA Yong-xiang and ZHOU Jin-zu
- Computer Science. 2013, 40 (Z6): 133-135.
-
Abstract
PDF(277KB) ( 929 )
- References | RelatedCitation | Metrics
-
The discretization of continuous numerical attributes is an important step for the application of granular computing.Some current discretization algorithms are classified and discussed.The concept of section granular is proposed.Entropy theory is introduced to define the granularity of section granular.The discretization algorithm based on granular computing is proposed.This algorithm is applied to intrusion detection.The experimental results show that this algorithm is simple and effective,It can assure the accuracy of intrusion detection.
-
Research on Propagation Model and Algorithm for Influence Maximization in Social Network Based on PageRank
宫秀文,张佩云. 基于PageRank的社交网络影响最大化传播模型与算法研究[J]. 计算机科学, 2013, 40(Z6): 136-140.
GONG Xiu-wen and ZHANG Pei-yun. Research on Propagation Model and Algorithm for Influence Maximization in Social Network Based on PageRank[J]. Computer Science, 2013, 40(Z6): 136-140. - GONG Xiu-wen and ZHANG Pei-yun
- Computer Science. 2013, 40 (Z6): 136-140.
-
Abstract
PDF(440KB) ( 1633 )
- References | RelatedCitation | Metrics
-
The influence maximization problem in social network is to find top-k influential nodes in graph that maximize the number of influenced nodes.Some basic propagation models have been proposed to solve the influence maximization problem.But those models do not consider the relativity and importance of the node which we consider as an important measurement of influence.Thus,we propose a new PageRank-based propagation model,and employ the Greedy Algorithm to solve the influence maximization problem.The experimental results show that our proposed model is more effective than traditional Linear Threshold Model,Weighted Cascade Model and Independent Cascade Model in solving the influence maximization problem.
-
Automatic Web Structured Data Extraction Based on Tag Path
李贵,陈成,李征宇,韩子扬,孙平,孙焕 良. 基于标签路径的Web结构化数据自动抽取[J]. 计算机科学, 2013, 40(Z6): 141-144.
LI Gui,CHEN Cheng,LI Zheng-yu,HAN Zi-yang,SUN Ping and SUN Huan-liang. Automatic Web Structured Data Extraction Based on Tag Path[J]. Computer Science, 2013, 40(Z6): 141-144. - LI Gui,CHEN Cheng,LI Zheng-yu,HAN Zi-yang,SUN Ping and SUN Huan-liang
- Computer Science. 2013, 40 (Z6): 141-144.
-
Abstract
PDF(662KB) ( 778 )
- References | RelatedCitation | Metrics
-
This paper introduces a method based on tag path to extract Web structured data.The method gets complete tag path collection by parsing the DOM tree of the Web document.Clustering of tag paths is performed based on introduced similarity measure and the data area can be targeted,then taking advantage of features of tag position,we can separate and filter record,finally complete data extraction.Experiments show that this method achieves higher precision and recall than the MDR when dealing with the page containing the structured data.
-
Discussion of the Characters of Social Network and the Application of Spam Filtering
李渊,廖闻剑,彭艳兵,程光. 复杂网络性质探讨及在垃圾邮件过滤中的运用[J]. 计算机科学, 2013, 40(Z6): 145-148.
LI Yuan,LIAO Wen-jian,PENG Yan-bing and CHENG Guang. Discussion of the Characters of Social Network and the Application of Spam Filtering[J]. Computer Science, 2013, 40(Z6): 145-148. - LI Yuan,LIAO Wen-jian,PENG Yan-bing and CHENG Guang
- Computer Science. 2013, 40 (Z6): 145-148.
-
Abstract
PDF(329KB) ( 605 )
- References | RelatedCitation | Metrics
-
Based on the network theory’s capability to describe both the power-law distribution and the small-world effect in the social networks,the societal computing can measure the complex behavior in the society.Firstly the statistical method is proposed to distinguish two types of nodes with different active degrees through the character of the power-law distribution,which can be deployed as spam filter.Considering the small-world effect,the average distance between any two nodes changed lightly while the number of nodes varied significantly.The characters of different active nodes were validated in the spam filtering procedure from the original electrical mail records at last.
-
Slice-based Method for Dynamic Inference Control in OLAP
周彩霞,陈启买. 基于切片的OLAP动态推理控制研究[J]. 计算机科学, 2013, 40(Z6): 149-152.
ZHOU Cai-xia and CHEN Qi-mai. Slice-based Method for Dynamic Inference Control in OLAP[J]. Computer Science, 2013, 40(Z6): 149-152. - ZHOU Cai-xia and CHEN Qi-mai
- Computer Science. 2013, 40 (Z6): 149-152.
-
Abstract
PDF(337KB) ( 667 )
- References | RelatedCitation | Metrics
-
Aiming at the problem of sensitive information leakage in data warehouse and OLAP system,and the existing inference control methods are based on date cube ignoring the fine-grained slice reasoning.This paper presents an inference control method based on slice.This method refines inference granularity to slice and deals with each query corresponding to slice grid,which can prevent a single slice of reasoning and increases efforts to the protection of sensitive information according to the judgment of the slice grid dependencies’ inference channel.
-
Operator Theory Frontier of Spectral Clustering
管涛,王杰. 谱聚类的算子理论研究进展[J]. 计算机科学, 2013, 40(Z6): 153-156.
GUAN Tao and WANG Jie. Operator Theory Frontier of Spectral Clustering[J]. Computer Science, 2013, 40(Z6): 153-156. - GUAN Tao and WANG Jie
- Computer Science. 2013, 40 (Z6): 153-156.
-
Abstract
PDF(362KB) ( 731 )
- References | RelatedCitation | Metrics
-
Spectral clustering comes from operator theory and is able to efficiently decrease data dimension and classify data.However,current domestic researches pay more attention to applied algorithm design,and there is lack of theoretical outcome.In order to make up the shortcomings in theory,this paper systematically summaries the theory of spectral clustering,pays more attention to study the newest foreign operator theory research achievements.Besides,we briefly discuss and analyze some specific spectral clustering algorithms.We introduce and analyze the principle,convergence,current status of spectral clustering and its inherent association with manifold learning in terms of integral operator,spectral graph theory and manifold learning.At last,we suggest some possible directions.
-
Web Data Extraction and Integration in Domain
李贵,李征宇,陈韶刚,韩子扬,孙平,孙焕良. 面向领域的Web数据抽取与集成[J]. 计算机科学, 2013, 40(Z6): 157-159.
LI Gui,LI Zheng-yu,CHEN Shao-gang,HAN Zi-yang,SUN Ping and SUN Huan-liang. Web Data Extraction and Integration in Domain[J]. Computer Science, 2013, 40(Z6): 157-159. - LI Gui,LI Zheng-yu,CHEN Shao-gang,HAN Zi-yang,SUN Ping and SUN Huan-liang
- Computer Science. 2013, 40 (Z6): 157-159.
-
Abstract
PDF(585KB) ( 603 )
- References | RelatedCitation | Metrics
-
Web data mining in a domain includes Web data extraction and Web data integration.In the phase of Web data extraction,the paper proposes a Web structural data model and a Web table schema,and puts forward the Web table positioning and records extracting algorithm.In the phase of Web data integration,a Web data integration algorithm based on the domain model is presented.The experiment results are given to show effectiveness of the proposed algorithms.
-
Research on Data Integration Based on ERP in Electric Power Enterprise
张德刚,罗学礼,盛俊,徐树振,田雷. 基于ERP的电力企业数据集成研究[J]. 计算机科学, 2013, 40(Z6): 160-162.
ZHANG De-gang,LUO Xue-li,SHENG Jun,XU Shu-zhen and TIAN Lei. Research on Data Integration Based on ERP in Electric Power Enterprise[J]. Computer Science, 2013, 40(Z6): 160-162. - ZHANG De-gang,LUO Xue-li,SHENG Jun,XU Shu-zhen and TIAN Lei
- Computer Science. 2013, 40 (Z6): 160-162.
-
Abstract
PDF(395KB) ( 700 )
- References | RelatedCitation | Metrics
-
Integration of heterogeneous data sources is the necessary method to improve the level of informatization for power enterprises,this paper describes a data exchange and sharing platform model of power enterprise based on Enterprise Resource Planning(ERP),XML and Web Service.The enterprise achieves exchange and sharing data between ERP and legacy heterogeneous system by this platform within the enterprise.Applications result shows that the platform developing achieves the goal and places a solid foundation for the power enterprise informatization.
-
Improved Randomized Hough Method of Circle Detection
陈昊,马钺,陈帅,李昭月. 改进的随机Hough变换的头部区域检测算法[J]. 计算机科学, 2013, 40(Z6): 163-165.
CHEN Hao,MA Yue,CHEN Shuai and LI Zhao-yue. Improved Randomized Hough Method of Circle Detection[J]. Computer Science, 2013, 40(Z6): 163-165. - CHEN Hao,MA Yue,CHEN Shuai and LI Zhao-yue
- Computer Science. 2013, 40 (Z6): 163-165.
-
Abstract
PDF(263KB) ( 746 )
- References | RelatedCitation | Metrics
-
Proposes an improved algorithm for detecting circles which is based on randomized Hough transform.It use gradient direction information to determine whether the parameter should be accumulated or not.And after obtaining the real circle,update the fringe points muster with deleting parameter λ.The problem of useless accumulation in traditional RHT is well is well solved and improved the probability of the best according circles appearance.Tests on normal images had been taken,and this algorithm has been proved an efficient method.
-
SVM-based Method and System for Recognition of Human Movement
于雷,辛晓越,卢志泳,陈志鹏,刘宁. 基于SVM的人体运动状态检测[J]. 计算机科学, 2013, 40(Z6): 166-168.
YU Lei,XIN Xiao-yue,LU Zhi-yong,CHEN Zhi-peng and LIU Ning. SVM-based Method and System for Recognition of Human Movement[J]. Computer Science, 2013, 40(Z6): 166-168. - YU Lei,XIN Xiao-yue,LU Zhi-yong,CHEN Zhi-peng and LIU Ning
- Computer Science. 2013, 40 (Z6): 166-168.
-
Abstract
PDF(328KB) ( 1522 )
- References | RelatedCitation | Metrics
-
We propose to use the sensors in mobile devices to recognize the state of users movement by small data set.We suggest a mechanism,based the support vector machine(SVM),to model and classify the movement of mobile clients.Since the mobile devices will handle different sensor data in use,we suggest two coordinate system for the data set,called device coordinate and the standard coordinate.After the sensor data in device coordinate being mapped to the standard coordinate,they will be put into support vector machine and produce classification results with high accuracy.A realistic study have been conducted to prove that the mechanism is practical and accurate.
-
Video Codec Based on Compressed Sensing
杨鑫诚,何斌. 基于压缩感知理论的视频编解码方法[J]. 计算机科学, 2013, 40(Z6): 169-172.
YANG Xin-cheng and HE Bin. Video Codec Based on Compressed Sensing[J]. Computer Science, 2013, 40(Z6): 169-172. - YANG Xin-cheng and HE Bin
- Computer Science. 2013, 40 (Z6): 169-172.
-
Abstract
PDF(349KB) ( 1601 )
- References | RelatedCitation | Metrics
-
Compressed sensing theory is a new information processing,recent popular research direction,and has a good prospect of application in signal processing and other fields.In this paper compressed sensing theory and traditional video codec technology,design a theory based on compressed sensing video codec program.The results show that the algorithm is able to achieve better results.
-
Based on the Improved Mathematical Morphology OCT Image Quick Edge Detection Algorithm
张博闻,田小林,孙延奎. 基于改进的数学形态学的OCT图像快速边缘提取算法[J]. 计算机科学, 2013, 40(Z6): 173-175.
ZHANG Bo-wen,TIAN Xiao-lin and SUN Yan-kui. Based on the Improved Mathematical Morphology OCT Image Quick Edge Detection Algorithm[J]. Computer Science, 2013, 40(Z6): 173-175. - ZHANG Bo-wen,TIAN Xiao-lin and SUN Yan-kui
- Computer Science. 2013, 40 (Z6): 173-175.
-
Abstract
PDF(732KB) ( 722 )
- References | RelatedCitation | Metrics
-
A new edge detection algorithm based on improved mathematics morphologic method is proposed.By using erosion and dilation basic operators,the structure elements suitable for the image edge detection are chosen,then use Canny edge detector to extraction edge.The improved mathematics morphologic method is helpful to reveal distinct characteristics for some edge features,efficiently with high speed processing.Compared with the classical edge detection operators and traditional mathematics morphology edge detection algorithm,the improved algorithm is more advantage,the quality and speed of the picture edge extraction significantly improved.
-
Effective Way of Improving the Recognition Rate of License Plate’s First Character
吕文强,杨健. 一种有效的提高车牌首字符识别率的方法[J]. 计算机科学, 2013, 40(Z6): 176-179.
LV Wen-qiang and YANG Jian. Effective Way of Improving the Recognition Rate of License Plate’s First Character[J]. Computer Science, 2013, 40(Z6): 176-179. - LV Wen-qiang and YANG Jian
- Computer Science. 2013, 40 (Z6): 176-179.
-
Abstract
PDF(326KB) ( 809 )
- References | RelatedCitation | Metrics
-
This paper offers a new method of extracting feature for solving the problem of the low Chinese character recognition rate resulted from the poor quality of the Chinese character image in the license plate recognition system.Firstly,the binary Chinese character image that has been segmented is divided into many blocks.Secondly,this paper extracts three stroke pixel’s feature components that include the proportion of stroke pixels in the block,the divergence and the centroid for each block.Thirdly,this paper combines the new feature extraction method with the SVM classifier.At last,a group of robust classifiers are obtained.The experimental results show that the Chinese character recognition rate can be improved greatly.
-
Color Image Segmentation Approach Based on LLE in Kernel Space
刘越,彭宏京,钱素静. 基于核空间LLE的彩色图像分割方法[J]. 计算机科学, 2013, 40(Z6): 180-183.
LIU Yue,PENG Hong-jing and QIAN Su-jing. Color Image Segmentation Approach Based on LLE in Kernel Space[J]. Computer Science, 2013, 40(Z6): 180-183. - LIU Yue,PENG Hong-jing and QIAN Su-jing
- Computer Science. 2013, 40 (Z6): 180-183.
-
Abstract
PDF(703KB) ( 762 )
- References | RelatedCitation | Metrics
-
Recently,Laplacian eigenmaps has been used in the color image segmentation based on cluster algorithm as an improving means.The graph weight matrix which is learned from Gaussian method may not characterize the locally geometric structure of the data points.As a result this method can’t tell the fuzzy edges sufficiently.To overcome this problem,the locally linear embedding in kernel space algorithm is proposed.Firstly,the simple pixel’s eight-nearest neighbor method is introduced to get weighted graph.Secondly,With the kernel trick,Laplacian reconstruction coefficients used to reflect the similarity between data points in the high dimension space can be achieved,as well as the subspace of feature vector.Finally,Fuzzy C-means clustering algorithm is used in the subspace to distribute labels for each pixel and achieve the segmentation of color images.The result of experiments compared with the results of the Laplacian eigenmaps segmentation method provided shows the encouraging improvements of the new algorithm.
-
GUI Event Interaction Graph Generation Method Based on Model
丰凯,高建华. 基于模型的图形用户界面事件交互图生成方法[J]. 计算机科学, 2013, 40(Z6): 184-187.
FENG Kai and GAO Jian-hua. GUI Event Interaction Graph Generation Method Based on Model[J]. Computer Science, 2013, 40(Z6): 184-187. - FENG Kai and GAO Jian-hua
- Computer Science. 2013, 40 (Z6): 184-187.
-
Abstract
PDF(412KB) ( 919 )
- References | RelatedCitation | Metrics
-
The test of GUI is a veritable challenge.One of the concernful reasons is that there are many context events which would cause determinate influences over the results of testing.This problem can be solved by the technologies of model-based GUI testing.Two of the frequently used graphical user interface(GUI) model in model-based GUI testing technologies are the event flow graph(EFG) and the event interaction graph(EIG).Both of the two kinds of models give a certain presentation of the events interacting relationships,and the EIG makes significant improvements form the EFG.Our paper provides the GUI events with a specific division through a simple GUI instance and also improves the MX algorithm for the sake of adaptation to the new division of the events.Finally,according to the property of event-driven in GUI and the divided GUI events in this paper,the paper proposes a new method:driven algorithm.Some examples show that the method makes the EFG converted into EIG more easier.
-
Improved Automatic Segmentation Method of sEMG Based on Signals’ Energy Value
李琳,王建辉,顾树生. 一种改进的基于信号能量阈值的表面肌电信号自动分割方法[J]. 计算机科学, 2013, 40(Z6): 188-191.
LI Lin,WANG Jian-hui and GU Shu-sheng. Improved Automatic Segmentation Method of sEMG Based on Signals’ Energy Value[J]. Computer Science, 2013, 40(Z6): 188-191. - LI Lin,WANG Jian-hui and GU Shu-sheng
- Computer Science. 2013, 40 (Z6): 188-191.
-
Abstract
PDF(339KB) ( 1351 )
- References | RelatedCitation | Metrics
-
As effective stage extraction of surface electromyography (sEMG) is the premise of signals analysis and processing,an improved method has been proposed to realize sEMG segmented automatically which could lay a foundation for full automatic analysis of rehabilitation robot.In this paper the value of window energy has been taken as the judgment standard for the start-stop point of muscle action,and the formula of initial threshold has been given.The wavelet transform technique has been applied to filter the non-action signals,and the segmentation value has been adjusted automatically according to the characteristics of the split point.The experiments results show that this method can segment sEMG signals automatically,without regarding as the artificial factors of conner,without initialization,and the results are more accurate and the precision is higher.
-
Frame Recognition and Sort of Comic Pages Based on Split Line
焦利敏,何中市,李佳. 基于分割线的漫画帧识别与自动排序[J]. 计算机科学, 2013, 40(Z6): 192-195.
JIAO Li-min,HE Zhong-shi and LI Jia. Frame Recognition and Sort of Comic Pages Based on Split Line[J]. Computer Science, 2013, 40(Z6): 192-195. - JIAO Li-min,HE Zhong-shi and LI Jia
- Computer Science. 2013, 40 (Z6): 192-195.
-
Abstract
PDF(669KB) ( 822 )
- References | RelatedCitation | Metrics
-
After analyzing comic grammar,this paper presented one kind of definition for comic structure.According to the relevance between features of frames layout and Divide-and-Conquer,iterative segmentation algorithm based on binary tree was proposed.After analyzing comic split line,split line choosing algorithm based on split ratio was proposed.The proposed method could decompose one comic page into multiple comic frames and sort them in order automatically,so it can reduce the amount of manual segmentation work.Comic frames after division can be placed on the smaller screen of cell phone screen or PDA,one by one in order to allow simple and vivid reading even through screen with very limited size.Experiments show that for most comics this method can identify each frame and then arranged them in chronological order according to the story and that it has better performance in both accuracy and real time.
-
Research on Visual Features Based on Image Retrieval
孙思,赵珊,魏从刚. 基于视觉点特征的图像检索技术研究[J]. 计算机科学, 2013, 40(Z6): 196-198.
SUN Si,ZHAO Shan and WEI Cong-gang. Research on Visual Features Based on Image Retrieval[J]. Computer Science, 2013, 40(Z6): 196-198. - SUN Si,ZHAO Shan and WEI Cong-gang
- Computer Science. 2013, 40 (Z6): 196-198.
-
Abstract
PDF(288KB) ( 685 )
- References | RelatedCitation | Metrics
-
At present,Content Based points Retrieval is a subset of the CBIR.It tries to inquiry the trademarks similar to the sample image,based on the comprehension of image contents.CBIR in trademark has wide prospect in the stage of similar or same trademarks examination,even in the field of trademarks inquiry.This paper does mainly research on the extracting of the points characters and counting the similarity in images.Firstly,the image shape is extracted by Canny algorithm,then,the moments are introduced to image retrieval.Experiments show that the proved method has effective performance.
-
Research of Pedestrian Tracking Based on HOG Feature and Haar Feature
陆星家,陈志荣,尹天鹤,杨帆. 基于HOG和Haar特征的行人追踪算法研究[J]. 计算机科学, 2013, 40(Z6): 199-203.
LU Xing-jia,CHEN Zhi-rong,YIN Tian-he and YANG Fan. Research of Pedestrian Tracking Based on HOG Feature and Haar Feature[J]. Computer Science, 2013, 40(Z6): 199-203. - LU Xing-jia,CHEN Zhi-rong,YIN Tian-he and YANG Fan
- Computer Science. 2013, 40 (Z6): 199-203.
-
Abstract
PDF(1147KB) ( 888 )
- References | RelatedCitation | Metrics
-
The detection and tracking of pedestrians in the real scene is one of the most concerned questions in the multi-people detection and tracking,especially under the condition that the occlusion,congestion and varied backgrounds of people have greatly challenged the research of multi-people detection and tracking.Haar and HOG features are applied in this research.The Haar-Like feature detector is used to detect the face when people come face to face with the camera,while the Part-Based Template is used to detect and track people in people’s sideway movement.After that,the maximum weight independent set is used to accomplish the relationship between the frames.The result of the detection and tracking from the ETH,TUD and local sample library attests that the hybrid algorithm has much higher accuracy and precision in detecting pedestrian’s front and side face.
-
Survey of Visual Tracking Algorithm
闫庆森,李临生,徐晓峰,王灿. 视频跟踪算法研究综述[J]. 计算机科学, 2013, 40(Z6): 204-209.
YAN Qing-sen,LI Lin-sheng,XU Xiao-feng and WANG Can. Survey of Visual Tracking Algorithm[J]. Computer Science, 2013, 40(Z6): 204-209. - YAN Qing-sen,LI Lin-sheng,XU Xiao-feng and WANG Can
- Computer Science. 2013, 40 (Z6): 204-209.
-
Abstract
PDF(760KB) ( 944 )
- References | RelatedCitation | Metrics
-
Visual tracking is a fundamental task in many computer vision applications,and the robustness problem is still a challenge in spite of the numerous existing visual tracking algorithms.Besides,several circumstance,as the abrupt object motion,the variation of the target or the background,the object-to-object and object-to-scene occlusions,the non-rigid object structures and camera jiggle,can reduce the effectiveness of the designed visual tracking algorithm.This survey described the visual tracking algorithm and its research advance.The existing target tracking algorithms were overviewed,and described each of these algorithms in detail,then,the advantage and disadvantage of each algorithm were analyzed respectively.Furthermore,the important issues related to tracking were discussed,including detection of objects,feature selection,Bayesian tracking,and online learning tracking.
-
Low-power Design Techniques for GPU
田泽,张骏,许宏杰,郭亮,黎小玉. 图形处理器低功耗设计技术研究[J]. 计算机科学, 2013, 40(Z6): 210-216.
TIAN Ze,ZHANG Jun,XU Hong-jie,GUO Liang and LI Xiao-yu. Low-power Design Techniques for GPU[J]. Computer Science, 2013, 40(Z6): 210-216. - TIAN Ze,ZHANG Jun,XU Hong-jie,GUO Liang and LI Xiao-yu
- Computer Science. 2013, 40 (Z6): 210-216.
-
Abstract
PDF(874KB) ( 1291 )
- References | RelatedCitation | Metrics
-
Graphic Processing Unit(GPU) is extensively used to accelerate the graphic processing and general purpose computing.But unfortunately,along with the increasing of chip scale and density,power consumption of single GPU reaches 376W,which is two or three times higher than a typical high-end general purpose CPU.Stability,reliability and cost problems brought by high power consumption had already made the “Power Wall” be a key obstacle which must be broken through.On architecture level,and combined with the structure characteristics of GPU rendering pipeline,this paper demonstrates the GPU low-power design techniques,such as depth test and elimination,shader data path,texture mapping and compression,rendering strategy,register file and Cache,and then indicates the further research content for GPU low-power design.
-
Application of Blind Source Separation to AIS
赵文红,王巍. 盲源分离技术在AIS中的应用[J]. 计算机科学, 2013, 40(Z6): 217-219.
ZHAO Wen-hong and WANG Wei. Application of Blind Source Separation to AIS[J]. Computer Science, 2013, 40(Z6): 217-219. - ZHAO Wen-hong and WANG Wei
- Computer Science. 2013, 40 (Z6): 217-219.
-
Abstract
PDF(248KB) ( 710 )
- References | RelatedCitation | Metrics
-
The Automatic Identification System(AIS),which is imposed by the International Maritime Organization(IMO),is a maritime safety and vessel traffic system.For security,the AIS-equipped ships broadcast position reports and short messages with information about the ship and the voyage that could be received by other ships and shore-based stations.AIS uses self-organizing TDMA(SOTDMA)for scheduled repetitive transmissions from an autonomous station.But the conflicts are difficult to escape.In the paper,once the conflicts appear,the technology of blind source separation will be introduced into AIS.It could separate each message from the coinciding transmissions,avoid messages losing,and improve the detection probability.
-
Based on Network on Chip of Multiprocessor QoS Mechanism Research and Design
衡霞,支亚军,韩俊刚. 基于片上网络多处理器QoS研究与设计[J]. 计算机科学, 2013, 40(Z6): 220-222.
HENG Xia,ZHI Ya-jun and HAN Jun-gang. Based on Network on Chip of Multiprocessor QoS Mechanism Research and Design[J]. Computer Science, 2013, 40(Z6): 220-222. - HENG Xia,ZHI Ya-jun and HAN Jun-gang
- Computer Science. 2013, 40 (Z6): 220-222.
-
Abstract
PDF(231KB) ( 1228 )
- References | RelatedCitation | Metrics
-
Based on researching network on chip quality of service,the thesis is proposed network on chip structure for multi-processor 64-Core.IP module produces different types of data packet,the network provides priority services to ensure that high priority packets and low-latency needs.Performance result shows that the model which for multiple processors communication with different types of data packets meets the Quality of Service requirements.
-
Research and Exploration of Olfactory Network Transmission-based Mobile Phone Platform
李联宁. 基于手机平台的嗅觉网络传输研究与探索[J]. 计算机科学, 2013, 40(Z6): 223-227.
LI Lian-ning. Research and Exploration of Olfactory Network Transmission-based Mobile Phone Platform[J]. Computer Science, 2013, 40(Z6): 223-227. - LI Lian-ning
- Computer Science. 2013, 40 (Z6): 223-227.
-
Abstract
PDF(498KB) ( 1326 )
- References | RelatedCitation | Metrics
-
By semiconductor gas sensor array to feel all kinds of substances nature odor,we use the sensor array and the neural network software interface and conversion BP neural network algorithm for data processing and information fusion.On the basis of the multimedia transmission via the Internet or 3G mobile communication network,we will not use traditional methods of odor synthesis generator,to achieve the purpose of ultra-long-range olfactory transmission.It is posible to research ultrasonic direct conduction to the center of the human brain olfactory sensing mode,to achieve olfactory transmission direct transmission mode.Explore and experiment to prove the feasibility of the olfactory transmission on mobile phones(mobile terminal) and reproduction mechanism to elucidate the smell,will reveal the significance of machine olfactory law,will provide ideas to human sense of smell,taste,touch on worldwide Internet and mobile communication network conduction.
-
Research on Uplink Ranging Technique in IEEE 802.16e Network
吕海坤,黎海涛. IEEE 802.16e上行测距研究[J]. 计算机科学, 2013, 40(Z6): 228-231.
LV Hai-kun and LI Hai-tao. Research on Uplink Ranging Technique in IEEE 802.16e Network[J]. Computer Science, 2013, 40(Z6): 228-231. - LV Hai-kun and LI Hai-tao
- Computer Science. 2013, 40 (Z6): 228-231.
-
Abstract
PDF(620KB) ( 633 )
- References | RelatedCitation | Metrics
-
Efficient ranging technique is utilized to achieve the uplink time slot synchronization and power control in WiMAX/IEEE802.16e network.The principle of ranging which is involved in the generation,transmission and detection of ranging codes is analyzed firstly.Then,the key techniques of uplink ranging processing which includes the power detection and time delay estimation is investigated.Finally,the DSP implementation of ranging processing is given in detail,the test results show that the proposed ranging scheme is feasible.
-
Construction of Port Logistics Service Platform Based on Cloud Computing and Internet of Things
韩海雯,齐德昱,封斌. 基于云计算与物联网技术的港口物流综合服务平台架构研究[J]. 计算机科学, 2013, 40(Z6): 232-235.
HAN Hai-wen,QI De-yu and FENG Bin. Construction of Port Logistics Service Platform Based on Cloud Computing and Internet of Things[J]. Computer Science, 2013, 40(Z6): 232-235. - HAN Hai-wen,QI De-yu and FENG Bin
- Computer Science. 2013, 40 (Z6): 232-235.
-
Abstract
PDF(476KB) ( 836 )
- References | RelatedCitation | Metrics
-
The dramatically increase of international trade goes with the new development to port logistics and its rela-ted business in user amount,user business complexity and users business types.New IT technology including things technology,cloud computing and SOA architecture,would bring advantages to meet these increasing requirements and upgrade the port logistic platform from information provider to services provider.Under the consideration of deficiencies of urgent port logistic platform,this paper proposes a full architecture for a new type of port logistics services platform and discusses the construction of its six composed layers coming with the detail utilization of things technology,cloud computing and SOA.
-
Design and Research of Embedded Thin Web Server
崔丽群,张明杰. 嵌入式瘦Web服务器的设计与研究[J]. 计算机科学, 2013, 40(Z6): 236-238.
CUI Li-qun and ZHANG Ming-jie. Design and Research of Embedded Thin Web Server[J]. Computer Science, 2013, 40(Z6): 236-238. - CUI Li-qun and ZHANG Ming-jie
- Computer Science. 2013, 40 (Z6): 236-238.
-
Abstract
PDF(372KB) ( 833 )
- References | RelatedCitation | Metrics
-
To design and research of an Embedded Thin Web Server in the environment of low-end microcontroller,streamlining the TCP/IP protocol stack,particularly,puting forward an accelerated open mechanism for TCP streamli-ning to avoid a three-way handshake process and has improved the technology of CGI.Using the Javascript to make part of the work of the serve shifted to the client to process,using XMLHttpRequest inplements Asynchronous communication between the server and the browser,so the performance of the server can be improvedt effectively.Through the test of performance shows that the server can meet the requirements of the embedded environment and this embedded Web server has a high practical value in the low-end platforms.
-
Carrier Synchronization Algorithm Research for High-order Modulated APSK Signal
胡景明,郭道省,王辉. 高阶调制APSK信号载波同步算法研究[J]. 计算机科学, 2013, 40(Z6): 239-242.
HU Jing-ming,GUO Dao-sheng and WANG Hui. Carrier Synchronization Algorithm Research for High-order Modulated APSK Signal[J]. Computer Science, 2013, 40(Z6): 239-242. - HU Jing-ming,GUO Dao-sheng and WANG Hui
- Computer Science. 2013, 40 (Z6): 239-242.
-
Abstract
PDF(707KB) ( 1160 )
- References | RelatedCitation | Metrics
-
With the development of satellite communication services,satellite broadband high-speed data communication is becoming more and more important,higher order modulation technology is increasingly used in satellite communications,but the carrier frequency offset the impact of higher order modulation signals,such as APSK.its various amplitudes also make carrier synchronization more complicated.Review carrier synchronization algorithm theory based on the carrier frequency and phase deviation APSK signal system,and to study the carrier frequency and phase offset estimation algorithm,analysis shows that the algorithm can effectively solve the APSK signal multi-amplitude and phase Fuzzy large problems,and can be preferably applicable to the the APSK signal carrier frequency and phase synchronization.
-
Prediction of Periodic Weighting Based on Optimized Functional Networks
崔铁军,马云东. 基于泛函网络的周期来压预测方法研究[J]. 计算机科学, 2013, 40(Z6): 243-246.
CUI Tie-jun and MA Yun-dong. Prediction of Periodic Weighting Based on Optimized Functional Networks[J]. Computer Science, 2013, 40(Z6): 243-246. - CUI Tie-jun and MA Yun-dong
- Computer Science. 2013, 40 (Z6): 243-246.
-
Abstract
PDF(355KB) ( 719 )
- References | RelatedCitation | Metrics
-
In order to improve the prediction the periodic weighting load,this paper proposed a new periodic weighting prediction method based on Functional networks(FN) optimized wavelet analysis and chaos.In the method,selected sample set data is decomposed using wavelet decomposition technique to obtain the different frequency components.The phase space of the components is reconstructed by chaos theory.The reconstructed components are respectively transmitted into FN model to carry on prediction.Finally,all the predicted components got by FN models are reconstructed by wavelet to get complete prediction waveform.The result of the calculation in the reconstruction shows that in a certain period,the load temporal sequence has some chaotic property.Through the comparison between the result of the method and three other models,the final load ware of the method is higher accuracy and convergence,but the cost of time is large.
-
Designation and Realization of Mobile Commerce Interaction Model Under Cloud Computing Platform
叶水生,肖磊. 云计算平台下移动商务交互模型设计与实现[J]. 计算机科学, 2013, 40(Z6): 247-250.
YE Shui-sheng and XIAO Lei. Designation and Realization of Mobile Commerce Interaction Model Under Cloud Computing Platform[J]. Computer Science, 2013, 40(Z6): 247-250. - YE Shui-sheng and XIAO Lei
- Computer Science. 2013, 40 (Z6): 247-250.
-
Abstract
PDF(595KB) ( 802 )
- References | RelatedCitation | Metrics
-
This paper designs and realizes a model of mobile commerce under cloud computing platform.Realizes the resources unified scheduling and distribution of front-end cluster’s desire.The server’s computing power enhances obviously,realize the purpose of slight-client.Realize the information interaction base on cloud computing,server-side and client-side become independent units,which can finish the trade process only to use browser,to ensure the flexibility of designation.The experiment demonstrate that using this interaction model of mobile commerce can distribute the service resources excellently,improve means of exchange and user experience.
-
Research of Structure and Architecture for Underwater Sensor Networks
郑君杰,李延斌,尹路,马金钢,王洪涛. 水下传感器网络系统架构与体系结构研究[J]. 计算机科学, 2013, 40(Z6): 251-254.
ZHENG Jun-jie,LI Yan-bin,YIN Lu,MA Jin-gang and WANG Hong-tao. Research of Structure and Architecture for Underwater Sensor Networks[J]. Computer Science, 2013, 40(Z6): 251-254. - ZHENG Jun-jie,LI Yan-bin,YIN Lu,MA Jin-gang and WANG Hong-tao
- Computer Science. 2013, 40 (Z6): 251-254.
-
Abstract
PDF(605KB) ( 1235 )
- References | RelatedCitation | Metrics
-
The requirement objectives of underwater sensor networks(UWSN) was firstly analyzed,then the application scene of UWSN was constructed.Based on the architecture of WSN,a new kind of architecture for UWSN was designed and the function of every layer was explained in datail.In order to overcome the shortcoming of existing research of routing protocol for UWSN,a new routing protocol based on depth and residual energy was designed which does not require full-dimensional location information,instead,it need only local depth information.The routing arithmetic was designed and the solving method for inanition was presented.
-
Survey on Remote Code Update for Wireless Sensor Networks
况晓辉,许飞,刘丽. 无线传感器网络远程代码更新技术研究进展[J]. 计算机科学, 2013, 40(Z6): 255-261.
KUANG Xiao-hui,XU Fei and LIU Li. Survey on Remote Code Update for Wireless Sensor Networks[J]. Computer Science, 2013, 40(Z6): 255-261. - KUANG Xiao-hui,XU Fei and LIU Li
- Computer Science. 2013, 40 (Z6): 255-261.
-
Abstract
PDF(853KB) ( 661 )
- References | RelatedCitation | Metrics
-
Remote Code Update in wireless sensor networks is an important means of remote task reallocation,software update of nodes and network function reconfiguration after a wireless sensor network is deployed.It’s very important to improve the availability of wireless sensor networks.This paper summarizes and concludes the existing research of remote code update in wireless sensors,some main mechanism of remote code update are introduced in this paper and their defects are pointed out.At last,the problem in future research is discussed,furthermore,the keystone and difficulty of research in wireless sensors networks are indicated.
-
Delay Evaluation and Simulation of TDMA Through M/M/1/K Queue Model in Low-energy Wireless Communication Environment
冯永,姚龙海,张亮. 基于M/M/1/K排队模型的低功耗无线通信网络TDMA协议延迟评估及仿真[J]. 计算机科学, 2013, 40(Z6): 262-264.
FENG Yong,YAO Long-hai and ZHANG Liang. Delay Evaluation and Simulation of TDMA Through M/M/1/K Queue Model in Low-energy Wireless Communication Environment[J]. Computer Science, 2013, 40(Z6): 262-264. - FENG Yong,YAO Long-hai and ZHANG Liang
- Computer Science. 2013, 40 (Z6): 262-264.
-
Abstract
PDF(308KB) ( 1081 )
- References | RelatedCitation | Metrics
-
Evaluate the delay charistiristic of TDMA in low-energy wireless communication environmen t based on M/M/1/K queue model,and simulate it by QualNet with two interfaces in single-hop network topology,the simulation data is compared with the evaluation one.It shows that,this evaluation scheme is nearly equal to the simulation outcome.Meantime,the slection of hardware interface lays more influence on the delay of TDMA protocol.
-
Some New Cartesian Product Interconnection Networks
师海忠. 几类新的笛卡尔乘积互连网络[J]. 计算机科学, 2013, 40(Z6): 265-270.
SHI Hai-zhong. Some New Cartesian Product Interconnection Networks[J]. Computer Science, 2013, 40(Z6): 265-270. - SHI Hai-zhong
- Computer Science. 2013, 40 (Z6): 265-270.
-
Abstract
PDF(462KB) ( 802 )
- References | RelatedCitation | Metrics
-
Star network,pancake network,bubble sort network,modified bubble sort network,wheel network,etc,are not only Cayley graphs but also important interconnection networks.In this paper,we develop many new networks,called Cartesian product networks of the ring network,the barrell shifter network,the ILLIAC networks,the n-cube and the Star network,the pancake network,the bubble sort network,the modified bubble sort net works,the wheel network,respectively.These networks are shown to have better performance,as measured by some parameters(such as,dia-meter,etc.)than the n-cubes or the Star networks.
-
Study of Methods for the Cloud to Migrate Application Systems
张靓,范冰冰,郑伟平. 云平台应用系统迁移方法的研究[J]. 计算机科学, 2013, 40(Z6): 271-275.
ZHANG Liang,FAN Bing-bing and ZHENG Wei-ping. Study of Methods for the Cloud to Migrate Application Systems[J]. Computer Science, 2013, 40(Z6): 271-275. - ZHANG Liang,FAN Bing-bing and ZHENG Wei-ping
- Computer Science. 2013, 40 (Z6): 271-275.
-
Abstract
PDF(672KB) ( 607 )
- References | RelatedCitation | Metrics
-
Regarding the problem of selecting target physical servers when migrating multi-component application systems to the cloud,a migration method based on the inter-component communication amount was proposed.According to the formalization of the application system logical architecture and cloud platform physical resources organizational structure,the method is to select target physical server for each system component by calculating the communication amount and virtual resource requirements of them.By the experiment of migrating multi-tenancy excellent course websites system to Bingo Cloud,the result shows that the migration method can reduce the traffic between physical servers of the cloud platform.
-
Performance Analysis of Detector for MFSK-signals Based on First-order Cyclic Moment in the Cycle Frequency
李小强,沈越泓,李颖,丁豪杰,汪李峰. MFSK信号在循环频率处基于一阶循环矩检测器的性能分析[J]. 计算机科学, 2013, 40(Z6): 276-279.
LI Xiao-qiang,SHEN Yue-hong,LI Ying,DING Hao-jie and WANG Li-feng. Performance Analysis of Detector for MFSK-signals Based on First-order Cyclic Moment in the Cycle Frequency[J]. Computer Science, 2013, 40(Z6): 276-279. - LI Xiao-qiang,SHEN Yue-hong,LI Ying,DING Hao-jie and WANG Li-feng
- Computer Science. 2013, 40 (Z6): 276-279.
-
Abstract
PDF(375KB) ( 631 )
- References | RelatedCitation | Metrics
-
Cognitive Radios represent a powerful technology for improving the utilization of radio spectrum resources.Detection of low signal-to-noise ratio(SNR) signals with relaxed a priori information on the signal parameters is very important for cognitive radios.In this paper,an in-depth theoretical analysis is performed for the detector which can detect MFSK signals with noise based on first-order cyclic moment.For this detector,when the sampling length is limited,we derive a first-order cyclic moment amplitude probability density function formula for MFSK signals with noise and noise in the cycle frequency.Then this paper proposes a calculation method of this detector Receiver Operating Characteristic(ROC) curve.Theoretical analysis shows that with the increase of sampling length,the performance of detector based on first-order cyclic moment is improved obviously;under the same conditions,with MFSK signals dimension M increasing,the detector performance decline somewhat.
-
Node Selection Strategy Based on Intuitionistic Fuzzy Sets in P2P Streaming Media System
李彦,王丽娜. P2P流媒体系统中基于直觉模糊集的节点选择策略[J]. 计算机科学, 2013, 40(Z6): 280-282.
LI Yan and WANG Li-na. Node Selection Strategy Based on Intuitionistic Fuzzy Sets in P2P Streaming Media System[J]. Computer Science, 2013, 40(Z6): 280-282. - LI Yan and WANG Li-na
- Computer Science. 2013, 40 (Z6): 280-282.
-
Abstract
PDF(343KB) ( 626 )
- References | RelatedCitation | Metrics
-
Through studying random node selection algorithm of unstructured P2P networks,By applying the theory of intuitionistic fuzzy set and put forward a node selection strategy which based on the score function,in order to overcome the randomness and blindness in the traditional strategy.This paper adopt scoring method of nodes reliability,make full use of good nodes,It has good adaptability,and can reflect the node and resources dynamic in P2P network,Meanwhile it improve the overall efficiency of the system.
-
Research on the QoS Control of the Real-time Data Transmission Based on the Tactical Data Link
董长城,吴炜,李峻林,赵恒. 数据链通信实时数据传输QoS控制研究[J]. 计算机科学, 2013, 40(Z6): 283-286.
DONG Chang-cheng,WU Wei,LI Jun-lin and ZHAO Heng. Research on the QoS Control of the Real-time Data Transmission Based on the Tactical Data Link[J]. Computer Science, 2013, 40(Z6): 283-286. - DONG Chang-cheng,WU Wei,LI Jun-lin and ZHAO Heng
- Computer Science. 2013, 40 (Z6): 283-286.
-
Abstract
PDF(349KB) ( 715 )
- References | RelatedCitation | Metrics
-
In the Tactical Data Link the real-time data are translated based of the FCFS module,which is not considering about the priority and QoS control of the real-time data.QoS control of the real-time data translating based on the Tactical Data Link method was proposed.A QoS classification of the real-time data and the priority controlled earliest deadline first algorithm were provided in the application layer,which could guarantee the network end to end delay and reliability in the restricted bandwidth condition.Experimental results show that it’s efficient.
-
Analysis to Connectivity of Wireless Ad hoc Simulating Networks with Random Mobility Models
刘宴涛,汪博,安建平,刘珩. 采用随机移动模型的无线自组织仿真网络连通性分析[J]. 计算机科学, 2013, 40(Z6): 287-290.
LIU Yan-tao,WANG Bo,AN Jian-ping and LIU Heng. Analysis to Connectivity of Wireless Ad hoc Simulating Networks with Random Mobility Models[J]. Computer Science, 2013, 40(Z6): 287-290. - LIU Yan-tao,WANG Bo,AN Jian-ping and LIU Heng
- Computer Science. 2013, 40 (Z6): 287-290.
-
Abstract
PDF(401KB) ( 817 )
- References | RelatedCitation | Metrics
-
The connectivity of wireless ad hoc networks were studied,including uniform networks,Poisson networks,networks using random waypoint model,and networks using random direction model.The analysis was based on the minimum degree theorem in geometric random graphs.The node degree was calculated by using the probability density function of node distribution.The quantitative relationship among 1-connectivity,node number and communication range was illustrated.It was shown that the connectivity decreased by the sequence of uniform networks,networks using random direction model,and networks using random waypoint model.
-
Designing and Realizing Distance Support Terminal Systerm Bases Wiki
马力,郑国宁,孙煜. Wiki远程支援终端系统的设计与实现[J]. 计算机科学, 2013, 40(Z6): 291-295.
MA Li,ZHENG Guo-ning and SUN Yu. Designing and Realizing Distance Support Terminal Systerm Bases Wiki[J]. Computer Science, 2013, 40(Z6): 291-295. - MA Li,ZHENG Guo-ning and SUN Yu
- Computer Science. 2013, 40 (Z6): 291-295.
-
Abstract
PDF(652KB) ( 548 )
- References | RelatedCitation | Metrics
-
Crewman is the key points and targets of the distance support system in warship.Because far away from mainland,the system should work normally off line.The whole wiki support system,include requirement design alternative and system composition,is described in the paper,and the core codes are listed in the thesis.
-
Design and Development of Basic Functions of JTAPI-based Dispatching Server
田文锋,卜宪德. 基于JTAPI的调度服务器基本功能的设计与开发[J]. 计算机科学, 2013, 40(Z6): 296-298.
TIAN Wen-feng and BU Xian-de. Design and Development of Basic Functions of JTAPI-based Dispatching Server[J]. Computer Science, 2013, 40(Z6): 296-298. - TIAN Wen-feng and BU Xian-de
- Computer Science. 2013, 40 (Z6): 296-298.
-
Abstract
PDF(246KB) ( 867 )
- References | RelatedCitation | Metrics
-
With the development of IP technology and update of dispatching equipment,multimedia dispatching system is more intuitive and user-friendly than traditional dispatching system.So the power dispatching system introduces soft-switch technology to develop multi-media dispatching system.On the basis of in-depth study of CTI technology and its JTAPI standard protocol interface,according to the requirements of power communication dispatching system,this paper proposes a multimedia dispatching system architecture based on Cisco Unified Communications platform.For the basic functions of dispatching server in the framework -such as outside call,conference,force in,force break etc.,this paper gives a Java develop specific method based on JTAPI standard interface.
-
Improved Construction Algorithm for K-Reach Index
刘凯洋. 一种改进的K-Reach索引的快速创建算法[J]. 计算机科学, 2013, 40(Z6): 299-301.
LIU Kai-yang. Improved Construction Algorithm for K-Reach Index[J]. Computer Science, 2013, 40(Z6): 299-301. - LIU Kai-yang
- Computer Science. 2013, 40 (Z6): 299-301.
-
Abstract
PDF(284KB) ( 711 )
- References | RelatedCitation | Metrics
-
The k-rechability problem is of great importance for newly emerged wireless and social network.The.latest proposed index K-Reach can quickly answer the problem of whether there exists a path of length less or equal than k between any pair of vertices.Notice that during the construction of the index,all vertices which are reachable by a computed vertex have been traversed,and the path information is recorded in the index.Therefore,an improved construction algorithm is proposed to avoid the repeated visiting of a large amount of vertices by making fully use of the path information of the computed vertices.Experiments based on a set of real-life data have demonstrated that the time complexity of the improved algorithm is significantly lower than the original construction algorithm.
-
Fault Location Technology Based on the Distributed Event Processing System
杜翠兰,谭建龙,王晓岩,张宇,刘萍,樊冬进. 基于事件处理的分布式系统故障定位技术[J]. 计算机科学, 2013, 40(Z6): 302-306.
DU Cui-lan,TAN Jian-long,WANG Xiao-yan,ZHANG Yu,LIU Ping and FAN Dong-jin. Fault Location Technology Based on the Distributed Event Processing System[J]. Computer Science, 2013, 40(Z6): 302-306. - DU Cui-lan,TAN Jian-long,WANG Xiao-yan,ZHANG Yu,LIU Ping and FAN Dong-jin
- Computer Science. 2013, 40 (Z6): 302-306.
-
Abstract
PDF(431KB) ( 749 )
- References | RelatedCitation | Metrics
-
In recent years,distributed computing systems become larger and more complex to control.System faults are growing exponentially,resulting in a very serious harm and loss,and problems on trouble shooting and positioning difficulty further enlarges.Traditional ways by tracking program to judge the running and correct method,using excessive consumption of the target program and invasive in distributed monitoring information interaction,has been difficult to meet the demand of software behavior analysis.Through the complex event processing in time to find and locate the fault,this need in events in a large,rapid,uninterrupted occurrence of distributed monitoring environment appears especially urgent.It can use the meaningful information state change events to analyze system behaviors,and then judge the system operating conditions,to detect fault and positioning system,ensure the healthy operation.The complex event description language is based on the SQL method to describe the complex events.This data stream query language is complex for ordinary users and difficult to master.By constructing a set based event flow model,we can use the set of events to conduct a formal definition.The user only needs to master a few simple assembly operations in order to define complex fault rule.
-
Research on Cooperative Spectrum Sensing and SSDF Attacks
曹龙,赵杭生,鲍丽娜,赵小龙. 协作频谱感知及SSDF攻击研究[J]. 计算机科学, 2013, 40(Z6): 307-310.
CAO Long,ZHAO Hang-sheng,BAO Li-na and ZHAO Xiao-long. Research on Cooperative Spectrum Sensing and SSDF Attacks[J]. Computer Science, 2013, 40(Z6): 307-310. - CAO Long,ZHAO Hang-sheng,BAO Li-na and ZHAO Xiao-long
- Computer Science. 2013, 40 (Z6): 307-310.
-
Abstract
PDF(312KB) ( 597 )
- References | RelatedCitation | Metrics
-
In cognitive radio network,cooperative spectrum sensing technology overcomes the problems of multipath effects,shadow effects and such constraints by using local sensing results of cognitive users,hence improves the detection performance.This paper introduces the normal model of cooperative spectrum sensing,analyzes the local spectrum sensing and fusion decision these two key elements,shows the differences of ROC between local spectrum sensing and cooperative sensing.Then presents the concept,classification and state-of-the-art of research of spectrum sensing data falsification attack,we also analyzes and simulates for the possible case,simulation results show that the detection performance decline since be attacked.Finally,we summarize this paper.
-
Complex Number-based Privacy Data Aggregation
曹晓梅,刘大伟. 基于复数的隐私保护数据融合方案[J]. 计算机科学, 2013, 40(Z6): 311-314.
CAO Xiao-mei and LIU Da-wei. Complex Number-based Privacy Data Aggregation[J]. Computer Science, 2013, 40(Z6): 311-314. - CAO Xiao-mei and LIU Da-wei
- Computer Science. 2013, 40 (Z6): 311-314.
-
Abstract
PDF(349KB) ( 717 )
- References | RelatedCitation | Metrics
-
The scheme is committed to realize the security of data aggregation,and we proposed an secure data aggregation scheme CNPD based on in wireless sensor networks.CNPD scheme applies its own private data to form a plural custom data to hide sensitive data.Even if the private data being eavesdropped or decrypted by the attacker,this method can prevent them to resuming the sensitive information,so there is an effective protection of user privacy data security.The theoretical analysis and simulation experiments finally show that CNPD is more efficient than PDA in terms of communication overhead and security.
-
Recognition of Indirect Jump Targets Based on Trace Constraint
李丹,王震宇,井靖,王国好. 基于路径约束的间接跳转目标地址识别[J]. 计算机科学, 2013, 40(Z6): 315-319.
LI Dan,WANG Zhen-yu,JING Jing and WANG Guo-hao. Recognition of Indirect Jump Targets Based on Trace Constraint[J]. Computer Science, 2013, 40(Z6): 315-319. - LI Dan,WANG Zhen-yu,JING Jing and WANG Guo-hao
- Computer Science. 2013, 40 (Z6): 315-319.
-
Abstract
PDF(445KB) ( 1084 )
- References | RelatedCitation | Metrics
-
The recognition of indirect jump targets is one of the most difficult problems for control flow reconstruction from binary all the time.Due to dependency for runtime information,traditional solutions of indirect jump cannot meet the demand of precision.Through research of control flow reconstruction technical,we presented a new method for recognition of indirect jump targets based on trace constraint.For an indirect jump,a trace set from entry point to indirect jump can be constructed from a given initial control flow graph.Then for every element of the trace set,a target address can be determined through trace constraint resolve and target address expression which is constructed with relevant control flow analysis technical.By this means,a set of jump targets can be determined for every indirect jump.
-
Research on Secure Access Control Mechanism Based on Secure Domain Separation for Embedded Systems
牛文生,李亚晖,张亚棣. 基于安全域隔离的嵌入式系统的访问控制机制研究[J]. 计算机科学, 2013, 40(Z6): 320-322.
NIU Wen-sheng,LI Ya-hui and ZHANG Ya-di. Research on Secure Access Control Mechanism Based on Secure Domain Separation for Embedded Systems[J]. Computer Science, 2013, 40(Z6): 320-322. - NIU Wen-sheng,LI Ya-hui and ZHANG Ya-di
- Computer Science. 2013, 40 (Z6): 320-322.
-
Abstract
PDF(363KB) ( 883 )
- References | RelatedCitation | Metrics
-
Based on secure domain separation model,the research in secure architectures of embedded systems proposed a method of the secure access control,which supports multi-level secure separation of information stream with the message router between partions and messages authority based on the secure partition kernels.In order to implement the multi-level security embedded operating system,the structure of the secure access control mechanism was presented according to the secure domain separation model.The security analysis results prove that the proposed method can keep from security threats includeing illegal resource accessing,identity personation,information revealing and cover channel etc.The perfangmance analysis results show that the synthetical comsuming is about 10% with importing the security access control mechannism.
-
Design and Implementation of High-definition Video Conference System in Complex and Confidential Network
马绍良,李凤保,路海. 复杂涉密网络高清视频会议系统的设计与实现[J]. 计算机科学, 2013, 40(Z6): 323-326.
MA Shao-liang,LI Feng-bao and LU Hai. Design and Implementation of High-definition Video Conference System in Complex and Confidential Network[J]. Computer Science, 2013, 40(Z6): 323-326. - MA Shao-liang,LI Feng-bao and LU Hai
- Computer Science. 2013, 40 (Z6): 323-326.
-
Abstract
PDF(618KB) ( 766 )
- References | RelatedCitation | Metrics
-
This paper surveyed recent development of classified video conference system,introduced a design method of high-definition video conference in complex and confidential network.Combining typical confidential and secure network infrastructure,described in detail a high-definition video conference’s structure,automatic video track and control technology and deployment.Through research on key technologies such as related audio and video encoding,boundary defense,service quality guarantee and security policy configuration,proposed a practical and feasible design method which is successfully applied in projects.
-
Research on Fault Diagnosis of Wireless Sensor Nodes
尚兴宏,尚曦乐,章静,钱焕延. 无线传感器节点的故障诊断研究[J]. 计算机科学, 2013, 40(Z6): 327-329.
SHANG Xing-hong,SHANG Xi-yue,ZHANG Jing and QIAN Huan-yan. Research on Fault Diagnosis of Wireless Sensor Nodes[J]. Computer Science, 2013, 40(Z6): 327-329. - SHANG Xing-hong,SHANG Xi-yue,ZHANG Jing and QIAN Huan-yan
- Computer Science. 2013, 40 (Z6): 327-329.
-
Abstract
PDF(311KB) ( 660 )
- References | RelatedCitation | Metrics
-
In Wireless Sensor Networks(WSNs),faulty sensor nodes may consume the limited energy and bandwidth of network.Furthermore,they will produce the paralysis of entire systems.In this paper,RVM and SVM algorithm was applied to fault diagnosis for sensor nodes based on the analysis of fault type of WSNs nodes,and then the values of the features and the corresponding fault types of wireless sensor nodes were used to train RVM and SVM classifier.Simulation results show that the diagnosis results of the RVM model for wireless sensor are better than those of SVM and ANN.
-
System Calls Based Intrusion Detection Method with Frequency Feature Vector
张莉萍,雷大江,曾宪华. 基于频率特征向量的系统调用入侵检测方法[J]. 计算机科学, 2013, 40(Z6): 330-333.
ZHANG Li-ping,LEI Da-jiang and ZENG Xian-hua. System Calls Based Intrusion Detection Method with Frequency Feature Vector[J]. Computer Science, 2013, 40(Z6): 330-333. - ZHANG Li-ping,LEI Da-jiang and ZENG Xian-hua
- Computer Science. 2013, 40 (Z6): 330-333.
-
Abstract
PDF(459KB) ( 779 )
- References | RelatedCitation | Metrics
-
In order to solve the problem of extracting feature library and detecting anomaly system calls slowly in intrusion detection methods,this paper proposed a novel two phrase intrusion detection method.In the first phrase,we extracted subsequences from normal system calls and calculated the frequency of the subsequences,and transformed the frequency feature into the frequency feature vector including continue numeric number.In order to improve the accuracy and speed of detecting anomaly system calls,the paper adopted one-class classification support vector machine(SVM) to build the detecting model,which uses the feature vector library to build the model.Finally,we conducted extensive experiment to evaluate the performance of our proposed method.The results show that our proposed method is superior to the existing methods in many evaluation metrics.
-
Privacy Preserving Reputation Protocol for P2P Environment
孙波,丁雪峰,司成祥,张伟. P2P环境下的具有隐私保护的信誉协议[J]. 计算机科学, 2013, 40(Z6): 334-336.
SUN Bo,DING Xue-feng,SI Cheng-xiang and ZHANG Wei. Privacy Preserving Reputation Protocol for P2P Environment[J]. Computer Science, 2013, 40(Z6): 334-336. - SUN Bo,DING Xue-feng,SI Cheng-xiang and ZHANG Wei
- Computer Science. 2013, 40 (Z6): 334-336.
-
Abstract
PDF(332KB) ( 770 )
- References | RelatedCitation | Metrics
-
Reputation protocol is used to compute feedback by summing up the individual reputations of other system users.The feedback is then used to make a decision.It is always the case that the entities in a reputation system will provide dishonest feedback due to fear of exposing their privacy which would lead to retaliatory acts from opponents.In this paper,a privacy preserving reputation protocol enable an entity to acquire fair reputation from other entities.In this protocol Shamir Secret Sharing and Verifiable Secret Sharing with homomorphic property are employed to enable the dealer and secret holders to verify the correctness of the shared secret.Moreover a random selection of the participating secret holders is achieved.And using the shared secret key,the secret reputation feedback is attained by decryption.Further more,the nice privacy preserving properties of the semantically secure ElGamal and Cramer Shoup Cryptosystem are used to enable the secret holders to submit their secret reputation feedback in a privacy preserving way and securely access a database of current reputation feedback maintained by a reputation engine.
-
Trojans Control Behavior Detection Approach Based on Timing Analysis
陈利,张利,姚轶崭,胡卫华. 基于时序分析的木马控制行为识别方法[J]. 计算机科学, 2013, 40(Z6): 337-339.
CHEN Li,ZHANG Li,YAO Yi-zhan and HU Wei-hua. Trojans Control Behavior Detection Approach Based on Timing Analysis[J]. Computer Science, 2013, 40(Z6): 337-339. - CHEN Li,ZHANG Li,YAO Yi-zhan and HU Wei-hua
- Computer Science. 2013, 40 (Z6): 337-339.
-
Abstract
PDF(257KB) ( 694 )
- References | RelatedCitation | Metrics
-
Traditional detection approach based on fingerprint has a higher rate of false negatives.To this end,this paper put forward a detection approach of Trojans control behavior based on timing analysis of network sessions.Firstly,it calculats the weighted Euclidean distance between clustering dataflow,then the Trojans control behavior can be detected by ti-ming relationships of clustering data.Experiments show that the approach did not need fingerprint database,and can achieve higher correct detection rate,less consumption of resource real-time detection and processing.
-
Analysis and Design of ICS Information Security Audit System
陈庄,黄勇,邹航. 工业控制系统信息安全审计系统分析与设计[J]. 计算机科学, 2013, 40(Z6): 340-343.
CHEN Zhuang,HUANG Yong and ZOU Hang. Analysis and Design of ICS Information Security Audit System[J]. Computer Science, 2013, 40(Z6): 340-343. - CHEN Zhuang,HUANG Yong and ZOU Hang
- Computer Science. 2013, 40 (Z6): 340-343.
-
Abstract
PDF(364KB) ( 770 )
- References | RelatedCitation | Metrics
-
At present,Industrial control system(ICS) is widely used in electric power,transportation,water conservancy,large manufacturing industry and national critical infrastructure.ICS has become the important part of the national security strategy.However,the traditional information security technology(such as firewall technology,intrusion detection technology,etc.) has the different technical principle and the different network protocol,and doesn’t have a good protection effect in ICS.In order to effectively improve the Industrial control system information security(ICSIS) protection,based on the specific data and protocol and the highly real-time requirement,this paper designed an ICSIS audit system,which mainly includes data acquisition module,content detection mo-dule,abnormal behavior judgment module,behavior handling module,audit response module.The testing results show that the ICSIS audit system can comprehensive audit the ICS,and the use of ICSIS audit system can greatly improve the ICS safety protection ability.
-
Use Combination of Detection Systems to Reduce Errors of Judgment on Malicious Request
林捷. 利用一个组合检测系统来减少对恶意请求的错误判断[J]. 计算机科学, 2013, 40(Z6): 344-348.
LIN Jie. Use Combination of Detection Systems to Reduce Errors of Judgment on Malicious Request[J]. Computer Science, 2013, 40(Z6): 344-348. - LIN Jie
- Computer Science. 2013, 40 (Z6): 344-348.
-
Abstract
PDF(583KB) ( 582 )
- References | RelatedCitation | Metrics
-
Today’s Web application customization technology is widely used.Anomaly detection in early warning and real-time blocking the attack site of application-level program is a very suitable method.However,anomaly detection techniques are easier to detect problems of false positives and false negatives.The use of an integrated system can solve the problem.This integrated system includs the anomaly detection system based anomaly detection system,the Web and a database.Anomaly detection system and the SQL query of a Web serial structure of the anomaly detection system will be able to improve the efficiency of the detection system.The algorithm was evaluated for its applicability on several existing Web application.It is showed that the algorithm is feasible and effective to reduce false positives and false negatives.
-
Personalized Privacy Preserving Method Based on Lossy Join
刘英华. 一种基于有损连接的个性化隐私保护方法[J]. 计算机科学, 2013, 40(Z6): 349-353.
LIU Ying-hua. Personalized Privacy Preserving Method Based on Lossy Join[J]. Computer Science, 2013, 40(Z6): 349-353. - LIU Ying-hua
- Computer Science. 2013, 40 (Z6): 349-353.
-
Abstract
PDF(453KB) ( 626 )
- References | RelatedCitation | Metrics
-
Recently,anonymity model is one of the hot topic techniques in privacy preserving research.The mainly research is how to avoid leakage of sensitive data in data publishing,but also ensures the efficient use of data.This paper proposed a personalized(α[s],k) - lossy decomposition anonymity model.This method publishes the personalized data though generalization technology and personalizedα restriction for different code of the generalization tree.Based on the idea of lossy decomposition in database,data is projected into the sensitive information table and non sensitive information table,and then the redundant information can be realized privacy protection.Experimental results show that the model can provide better privacy.
-
Research on Best Fraction of Decimal
薛丹,李顺东,杨宸. 小数的最佳分数表示算法研究[J]. 计算机科学, 2013, 40(Z6): 354-355.
XUE Dan,LI Shun-dong and YANG Chen. Research on Best Fraction of Decimal[J]. Computer Science, 2013, 40(Z6): 354-355. - XUE Dan,LI Shun-dong and YANG Chen
- Computer Science. 2013, 40 (Z6): 354-355.
-
Abstract
PDF(236KB) ( 1503 )
- References | RelatedCitation | Metrics
-
In scientific computing,irrational operation is considerably intractable.Transform irrational into integer will greatly convenient in scientific computing.To achieve integer representation to irrational,the first step is to achieve rational representation to irrational.We first transform irrational into continued fraction by utilizing continued fractions technique.Secondly,it is possible and reasonable to choose the most concise expression of the fraction according to the accuracy demand,so that we can achieve the rational approximation of irrational number.A list of the simplest form and the approximation error of some commonly used computing constants under various accuracy requirements is given,which has guiding significance for scientific computing.
-
Fair MAC Protocol Based RTS Injection Attack and Defense
叶进,王正飞,聂东举,张向利. 基于公平MAC协议的RTS注入攻击的防御方法[J]. 计算机科学, 2013, 40(Z6): 356-360.
YE Jin,WANG Zheng-fei,NIE Dong-ju and ZHANG Xiang-li. Fair MAC Protocol Based RTS Injection Attack and Defense[J]. Computer Science, 2013, 40(Z6): 356-360. - YE Jin,WANG Zheng-fei,NIE Dong-ju and ZHANG Xiang-li
- Computer Science. 2013, 40 (Z6): 356-360.
-
Abstract
PDF(427KB) ( 831 )
- References | RelatedCitation | Metrics
-
This paper focused on RTS injection attacks to access point in WLAN.A solution based on fair MAC protocol was proposed,which utilizes virtual queue management.Compared with the existed schemes,our solution is of simplicity and feasibility to be deployed at AP.Simulation results show that our solution can defense against RTS attacks effectively.The proposed fair MAC protocol can also help to defense against other types of DoS attacks.
-
Software Safety Test Analysis for Fire Control System of Remote Multi-barrel Rocket
庞红彪,李之博,高小雅. 远程多管火箭炮火控系统的软件安全性测试分析[J]. 计算机科学, 2013, 40(Z6): 361-364.
PANG Hong-biao,LI Zhi-bo and GAO Xiao-ya. Software Safety Test Analysis for Fire Control System of Remote Multi-barrel Rocket[J]. Computer Science, 2013, 40(Z6): 361-364. - PANG Hong-biao,LI Zhi-bo and GAO Xiao-ya
- Computer Science. 2013, 40 (Z6): 361-364.
-
Abstract
PDF(380KB) ( 798 )
- References | RelatedCitation | Metrics
-
The fire control system’s software composition,function and typical task profile of remote multi-barrel rocket were introduced briefly.And the basic connotation of the software safety test was introduced briefly.Then according to the typical task profile of the fire control system,the software safety test in the various stages was analyzed,and the "difficult" " Miscellaneous " " multiple " problems in the course of the fire control system’s software safety test were solved systematically.The test efficiency and quality are improved effectively,and the fire control system’s safty of remote multi-barrel rocket is ensured further.
-
Encryption Algorithm of Color Video Image Based on Lorenz Chaos
何晔,王磊,夏晖,张学峰. 基于三维Lorenz混沌的彩色视频加密[J]. 计算机科学, 2013, 40(Z6): 365-367.
HE Ye,WANG Lei,XIA Hui and ZHANG Xue-feng. Encryption Algorithm of Color Video Image Based on Lorenz Chaos[J]. Computer Science, 2013, 40(Z6): 365-367. - HE Ye,WANG Lei,XIA Hui and ZHANG Xue-feng
- Computer Science. 2013, 40 (Z6): 365-367.
-
Abstract
PDF(494KB) ( 600 )
- References | RelatedCitation | Metrics
-
Because chaotic encryption is a new area of research,most video encryption algorithms are based on low dimensional maps,and their securities need to be improved.Although the capability of encryption of high-dimensional chao-tic system is much more better,the generation process of chaotic sequences are also much more complex.It conflicts with the characteristics of large amount of data and the high real-time requirement of video encryption.Thus the high-dimensional chaotic system is less used in the encryption of video.In light of this,combining with ideas of diffusion of pixels,this dissertation proposed a color video image encryption algorithm based on chaotic Lorenz system.The system follows mechanism of confusion and diffusion proposed by Shannon’s information theory.Any pixel in the image which is decrypted incorrectly will affect the whole decryption of the video.The algorithm has a high security,besides it also has the advantage of fast encryption.The algorithm can satisfy the characteristics of video encryption which have a large quantity of data and demand a high real-time.
-
Gas Turbine Power Prediction Based on Support Vector Regression
王文超,苗夺谦,陈骥远. 基于SVR算法的燃气轮机功率预测研究[J]. 计算机科学, 2013, 40(Z6): 368-371.
WANG Wen-chao,MIAO Duo-qian and CHEN Ji-yuan. Gas Turbine Power Prediction Based on Support Vector Regression[J]. Computer Science, 2013, 40(Z6): 368-371. - WANG Wen-chao,MIAO Duo-qian and CHEN Ji-yuan
- Computer Science. 2013, 40 (Z6): 368-371.
-
Abstract
PDF(321KB) ( 966 )
- References | RelatedCitation | Metrics
-
Forecasting for the next few hours of the gas turbine power is the key to predict trips,while the domestic related researches are still few.Though using support vector regression(SVR) model,and integration of multivariate forecasting,it improves the accuracy of the forecasts.These experimental data from the real data of a power plant,through some comparative experiments,describes the experimental procedure and selection methods of important parameters in detail.The results verify the effectiveness of the support vector regression techniques applied to practical power prediction.
-
Cloud Resources Management Method in Medical Institutions Deployment
魏振钢,孙维成,杨洁,陈超. 云计算在医疗机构部署中的云资源管理的一种方式[J]. 计算机科学, 2013, 40(Z6): 372-373.
WEI Zhen-gang,SUN Wei-cheng,YANG Jie and CHEN Chao. Cloud Resources Management Method in Medical Institutions Deployment[J]. Computer Science, 2013, 40(Z6): 372-373. - WEI Zhen-gang,SUN Wei-cheng,YANG Jie and CHEN Chao
- Computer Science. 2013, 40 (Z6): 372-373.
-
Abstract
PDF(518KB) ( 803 )
- References | RelatedCitation | Metrics
-
Applying the cloud computing to medical mechanism information construction can bring exciting results to medical institutions information management.From the point of view of cloud computing in the deployment of medical institutions,this paper presented a cloud resource management method by the resource database,and described database design and use in the cloud resources management.
-
Embedded Reliability Modeling of Assembly-line Production Oriented MANET
赵志峰,田立新,赵曦滨,钟诚. 面向流水线型模式的MANET嵌入式可靠性分析研究[J]. 计算机科学, 2013, 40(Z6): 374-376.
ZHAO Zhi-feng,TIAN Li-xin,ZHAO Xi-bin and ZHONG Cheng. Embedded Reliability Modeling of Assembly-line Production Oriented MANET[J]. Computer Science, 2013, 40(Z6): 374-376. - ZHAO Zhi-feng,TIAN Li-xin,ZHAO Xi-bin and ZHONG Cheng
- Computer Science. 2013, 40 (Z6): 374-376.
-
Abstract
PDF(347KB) ( 592 )
- References | RelatedCitation | Metrics
-
Since the market competition of manufacturing becomes intense,improving the productive efficient is of importance.Manufacturing Execution System(MES) is considered to be good solution,but the communication network is basic of MES.With the serious environment of the shop in manufacturing,MANET(mobile ad hoc network) is introduced into our scheme.MANET is a kind of dynamic wireless communication network that does not rely on a fixed infrastructure and is lack of any centralized control.Based on a deep analysis of the application and real work environment,this paper proposed a ERMWT(Embedded Reliability Model on Working Table)for a work table production oriented MANET.
-
Application of Virtual Reality Technique in Tunnel Excavation Engineering
黄地龙,邓飞,唐云. 虚拟现实技术在隧道开挖工程中的应用[J]. 计算机科学, 2013, 40(Z6): 377-380.
HUANG Di-long,DENG Fei and TANG Yun. Application of Virtual Reality Technique in Tunnel Excavation Engineering[J]. Computer Science, 2013, 40(Z6): 377-380. - HUANG Di-long,DENG Fei and TANG Yun
- Computer Science. 2013, 40 (Z6): 377-380.
-
Abstract
PDF(391KB) ( 869 )
- References | RelatedCitation | Metrics
-
We proposed an approach to simulate the tunneling process to ensure the safety of the underground-tunnel construction under complicated geological structure and risks of multiple geo-hazards.We first constructed the 3D geologi-cal model from the geological exploration data using intelligent deduction and human-computer interaction approaches.Then we simulated the tunneling process to show the geological structure changes of the tunnel surrounding rock.In this way,we can predict the potential geo-hazards in the tunneling process.This approach has been successfully applied to several rail way tunneling projects.It is proved that it can effectively predict the changes of the surrounding rock,the location,type and magnitude of the geo-hazards.This approach could provide accurate information for tunnel construction.
-
Discussion on Application of Technology of Network Isolation in Mobile Office Based on 3G Network
孙庆和,刘道群. 网络隔离技术在3G移动办公中的应用探讨[J]. 计算机科学, 2013, 40(Z6): 381-383.
SUN Qing-he and LIU Dao-qun. Discussion on Application of Technology of Network Isolation in Mobile Office Based on 3G Network[J]. Computer Science, 2013, 40(Z6): 381-383. - SUN Qing-he and LIU Dao-qun
- Computer Science. 2013, 40 (Z6): 381-383.
-
Abstract
PDF(260KB) ( 742 )
- References | RelatedCitation | Metrics
-
Network isolation technology is taken to increase importance to the system and network security in more companies.In order to slove the security problems in mobile office based on 3G network,network isolation is imported.This article pays more attention to technical theories,main functions and characteristics of network isolation.Finally we proposed the solution of security problem of mobile office in 3G based on network isolation technology.The practical application proves that the security solution has the advantages of simple design,fully separation and high security characteristics.
-
Management System of Web Map Based on NewMap API for Recognising Traffic Congestion
苗得文,邱满,许忠奇,奚雪峰,付保川. 基于NewMap API的地图服务系统在交通拥堵识别中的应用研究[J]. 计算机科学, 2013, 40(Z6): 384-386.
MIAO De-wen,QIU Man,XU Zhong-qi,XI Xue-feng and Fu Bao-chuan. Management System of Web Map Based on NewMap API for Recognising Traffic Congestion[J]. Computer Science, 2013, 40(Z6): 384-386. - MIAO De-wen,QIU Man,XU Zhong-qi,XI Xue-feng and Fu Bao-chuan
- Computer Science. 2013, 40 (Z6): 384-386.
-
Abstract
PDF(268KB) ( 679 )
- References | RelatedCitation | Metrics
-
With China’s rapid economic development,China’s transportation infrastructure is greatly improved.Howe-ver,the growth of the road is behind the vehicle and traffic growth.At the same time driving directions become more complex,indirectly increasing the complexity of the road network.These are some obstacles for smooth driving.And now the road regulatory measures,camera surveillance,which needs almost 24-hour care,and blur images is inefficient.The congestion has become extremely difficult to control and resolve in a timely manner,so people’s travel has become a headache.If,on existing roads and vehicles,people can travel timely according to the current vehicles on the road,it will greatly reduce the complaints of the people travel difficult.The system uses the specific public vehicle traffic running real-time mobile information based on map of the NewMap API,combined with clogging recognition model.It is a real-time reaction to urban road traffic congestion,provides the preconditions for dynamic optimization travel routes.
-
Study of Parallel Network File System
张媛,于冠龙,阚云鹤. 并行网络文件系统PNFS研究[J]. 计算机科学, 2013, 40(Z6): 387-391.
ZHANG Yuan,YU Guan-long and KAN Yun-he. Study of Parallel Network File System[J]. Computer Science, 2013, 40(Z6): 387-391. - ZHANG Yuan,YU Guan-long and KAN Yun-he
- Computer Science. 2013, 40 (Z6): 387-391.
-
Abstract
PDF(679KB) ( 912 )
- References | RelatedCitation | Metrics
-
Beginning with the problems of solving the I/O bottleneck of high performance computer.First,this paper mainly analyzed and designed the architecture,access mechanism,management mechanism and operating mechanism of parallel network file system-PNFS.Second,we made the test of PNFS,and the results show that PNFS can resolve the problems of traditional file systems about scalability,availability and performance and provides an effective method for building high performance file system.
-
Study on Reuse of TT&C Application Software System
陈骁,孙军,刘志芳. 测控应用软件系统资源复用研究[J]. 计算机科学, 2013, 40(Z6): 392-394.
CHEN Xiao,SUN Jun and LIU Zhi-fang. Study on Reuse of TT&C Application Software System[J]. Computer Science, 2013, 40(Z6): 392-394. - CHEN Xiao,SUN Jun and LIU Zhi-fang
- Computer Science. 2013, 40 (Z6): 392-394.
-
Abstract
PDF(279KB) ( 601 )
- References | RelatedCitation | Metrics
-
As China launches more space missions with a higher frequency,the efficiency of its TT&C software in space mission preparation is being put to test.How to shorten the preparation cycle while ensuring high-quality output is an issue that urgently needs to be tackled.Based on the framework of “software reuse technology” which currently is a hot research topic,this paper takes into consideration the demand features of TT&C tasks and proposes to ensure spacecraft flight control by retrieving reusable components from TT&C application software system and putting them into reuse in order to relieve software burden and improve quality.
-
Research of Cloud Computing Resource Pricing Based on Stackelberg Leadership Model
冯韵,李浩. 基于Stackelberg领导模式下的云资源定价研究[J]. 计算机科学, 2013, 40(Z6): 395-397.
FENG Yun and LI Hao. Research of Cloud Computing Resource Pricing Based on Stackelberg Leadership Model[J]. Computer Science, 2013, 40(Z6): 395-397. - FENG Yun and LI Hao
- Computer Science. 2013, 40 (Z6): 395-397.
-
Abstract
PDF(332KB) ( 682 )
- References | RelatedCitation | Metrics
-
The resource management is the bottleneck of the cloud computing management.This paper delivered a new idea based on the lifecycle of the Cloud Bank,at the same time,this paper also provided a suitable pricing strategy.According to the different period of the resource characteristics,this paper mechanized corresponding pricing mechanisms.This paper tried to set up an automatic update pricing cloud resources mechanism to maximize the interests of all participants.
-
Spring of Smart Home is Coming
张桂青,鹿曼,汪明,李成栋,彭伟,段新美,纪祥和. 智能家居的“春天”来了[J]. 计算机科学, 2013, 40(Z6): 398-402.
ZHANG Gui-qing,LU Man,WANG Ming,LI Cheng-dong,PENG Wei,DUAN Xin-mei and JI Xiang-he. Spring of Smart Home is Coming[J]. Computer Science, 2013, 40(Z6): 398-402. - ZHANG Gui-qing,LU Man,WANG Ming,LI Cheng-dong,PENG Wei,DUAN Xin-mei and JI Xiang-he
- Computer Science. 2013, 40 (Z6): 398-402.
-
Abstract
PDF(514KB) ( 1140 )
- References | RelatedCitation | Metrics
-
Firstly,the concept of the smart home was briefly introduced in this paper.And,the course of the development of smart home and its core technologies were summarized and discussed in detail.Then,from the multiple views of technology,production factory,the size of the market,and consciousness of consumers,this paper demonstrated that the spring of smart home is coming.At last,we looked into the future development of smart home.
-
Exam System Modelling Research Based on MVC
司飙. MVC模式下的考试系统建模研究[J]. 计算机科学, 2013, 40(Z6): 403-406.
SI Biao. Exam System Modelling Research Based on MVC[J]. Computer Science, 2013, 40(Z6): 403-406. - SI Biao
- Computer Science. 2013, 40 (Z6): 403-406.
-
Abstract
PDF(355KB) ( 739 )
- References | RelatedCitation | Metrics
-
The network has become the main characteristics of the information technology and the application of the important means.In university,as the computer application technology is expanded,networked test is used as a highly efficient and accurate,serious examination form,an alternative to traditional written examination examination of a kind of trend,and the universities is an important means of professional course appraisal reform.This paper proposed a MVC mode based on the campus network exam system modeling solutions,and discussed the Struts framework of some methods of practical application.Practice proves that the use of a mature technology application development,can effectively guaran-tee the project reliability and stability.
-
Study of Semantic Sharing Scheme for Household Electrical Appliance Design Knowledge
常万军,杨亚楠,郭祖华. 家电产品设计知识的语义共享方案研究[J]. 计算机科学, 2013, 40(Z6): 407-409.
CHANG Wan-jun,YANG Ya-nan and GUO Zu-hua. Study of Semantic Sharing Scheme for Household Electrical Appliance Design Knowledge[J]. Computer Science, 2013, 40(Z6): 407-409. - CHANG Wan-jun,YANG Ya-nan and GUO Zu-hua
- Computer Science. 2013, 40 (Z6): 407-409.
-
Abstract
PDF(493KB) ( 618 )
- References | RelatedCitation | Metrics
-
In life cycle management practice of the household electrical appliance enterprises,it still has some insufficient that the product design needs manual archiving and it is difficulty for query and cooperative.The ontology theory was introduced into the field of home appliances.The functional semantic extending method for is-a was presented and used to construct a function body based on studying the top-level ontology construction method of home appliances and extension method of ontology semantic.The index knowledge repository model of user demand-oriented was constructed.The home appliance product design knowledge is expressed by using OWL language.The user needs and ontology knowledge index were transformed to realize the sharing of semantic based on the method of ontology mapping and matching.Final,to verify the correct of the index knowledge model,the semantic sharing plat of refrigerator enterprise design knowledge was established.