Supervised and Sponsored by Chongqing Southwest Information Co., Ltd.
CODEN JKIEBK
-
Service-oriented Middleware Model for Internet of Things
谭云松,韩建国. 一种面向服务的物联网中间件模型[J]. 计算机科学, 2011, 38(Z10): 1-3.
TAN Yun-song,HAN Jian-jun. Service-oriented Middleware Model for Internet of Things[J]. Computer Science, 2011, 38(Z10): 1-3. - TAN Yun-song,HAN Jian-jun
- Computer Science. 2011, 38 (Z10): 1-3.
- Abstract PDF(252KB) ( 599 )
- RelatedCitation | Metrics
-
We introduced a servic}oriented middleware model for the development of Internet of Things systems, which focus on embedded devices and security. We described the set of abstract primitives supported by the model that tries to case the development of applications hiding platforms details and other aspects such as scalability, adaptability and inter-operability which are mandatory features in Internet of Things.
-
Internet of Things:Differential Features and Descriptive Model
黄映辉,李冠宇. 物联网:标志性特征与模型描述[J]. 计算机科学, 2011, 38(Z10): 4-6.
HUANG Ying-hui,LI Guang-yu. Internet of Things:Differential Features and Descriptive Model[J]. Computer Science, 2011, 38(Z10): 4-6. - HUANG Ying-hui,LI Guang-yu
- Computer Science. 2011, 38 (Z10): 4-6.
- Abstract PDF(361KB) ( 493 )
- RelatedCitation | Metrics
-
The differential features can support Internet of Things existing as a new kind of development, and the theory model can indicate that Internet of Things has been understood deeply. A semantic analysis pointed out that the thing in word Internet of things indicates actually the thing's information, and the Internet is actually the Internet application.Internet of Things is a new type of Internet application which makes the thing's information be shared on a global scale. Internet of Things has four differential features; only for thing's information, coded by UID or EPC, stored in RFID electronic tag, uploaded by non-contact reading with RFID reader. The graphical model of Internet of Things shows that the main tasks of constructing Internet of things are the preprocessing of thing's information before uploaded into Internet and the building of an RFID system. The set expression model of Internet of Things stresses the common character of Internet applications namely an Internet application is essentially a set of information, so the development processes and the technical methods of other Internet applications can be referenced and reused.
-
Security Analysis and Strategy for M2M of IOT
晁世伟,杨元,李静毅. 物联网M2M的安全分析及策略[J]. 计算机科学, 2011, 38(Z10): 7-9.
CHAO Shi-wei,YANG Yuan,LI Jing-yi. Security Analysis and Strategy for M2M of IOT[J]. Computer Science, 2011, 38(Z10): 7-9. - CHAO Shi-wei,YANG Yuan,LI Jing-yi
- Computer Science. 2011, 38 (Z10): 7-9.
- Abstract PDF(263KB) ( 421 )
- RelatedCitation | Metrics
-
The advanced idea of M2M technology attracts one new round of "wireless revolutions" , and also exposes the potential security hazard of Internet of Things. So, in this case, M2M's structure, consists of front-end sensors and cquipment,networks,back-end IT systems,will become a starting point to analyze the possible potential security threats,those arc Internet of hhings faced, from thirteen parts which is to proposed in this paper, aggressively proposed their corresponding solutions and strategics.
-
Non-contact Health Monitoring System Based on the Internet of Things and Expression Recognition
杨宁,张虹. 一种基于物联网和表情识别的健康监护系统[J]. 计算机科学, 2011, 38(Z10): 10-11.
YANG Ning,ZHANG Hong. Non-contact Health Monitoring System Based on the Internet of Things and Expression Recognition[J]. Computer Science, 2011, 38(Z10): 10-11. - YANG Ning,ZHANG Hong
- Computer Science. 2011, 38 (Z10): 10-11.
- Abstract PDF(249KB) ( 472 )
- RelatedCitation | Metrics
-
The Internet of things uses in various fields,which is of great convenience to people's lives. Health monitoring can provide users with convenient and reliable health services, which are of low cost The current health monitoring systems depend on the instruments. Based on the Internet of things and expression recognition, a system called NCHMS was proposed, which monitors the health status with no contact. This article elaborated on the structures and functions of NCHMS system, improved the expression classification space for health monitoring, and gave a detailed expression recognition algorithm. The experimental data from the simulated experiments can tell that the system has considerable feasibility and practicality. Internet of things, Expression recognition, Health monitoring, Non-contact
-
Machine Manufacturing Rapid Inquiry System's Primary Design and Implementation
黄鹏. 物联网技术的架构与应用[J]. 计算机科学, 2011, 38(Z10): 12-13.
HUANG Peng. Machine Manufacturing Rapid Inquiry System's Primary Design and Implementation[J]. Computer Science, 2011, 38(Z10): 12-13. - HUANG Peng
- Computer Science. 2011, 38 (Z10): 12-13.
- Abstract PDF(159KB) ( 609 )
- RelatedCitation | Metrics
-
The Internet of I}hings is regarded as the computer, the Internet and mobile communication network of information industry after the third time, because of its vast wave of industrial application prospects under governments' attendon. The structure system of the Internet of Things and the key technology play a decisive networked application effect. Content networking applications, can change the traditional industry management mode, let management become more intelligent,more efficient.
-
Study of Autonomous Method of IoT Component
何双,周彦晖. 物联网构件的自适应方法研究[J]. 计算机科学, 2011, 38(Z10): 14-17.
HE Shuang,ZHOU Yan-hui. Study of Autonomous Method of IoT Component[J]. Computer Science, 2011, 38(Z10): 14-17. - HE Shuang,ZHOU Yan-hui
- Computer Science. 2011, 38 (Z10): 14-17.
- Abstract PDF(313KB) ( 460 )
- RelatedCitation | Metrics
-
With the development of the Internet of Things(IoT),how to "intclligentize" the sentient objects with the self-adaption abilities to change their own autonomously against the environment is a real challenge in the IoT researches. Based on the components theory, this paper brought up the FEI3DA(fcature environment belief desire action)structure and its definition of self-adaptive from the three-tier architecture of IoT, and established corresponding algorithm to describe it, at last demonstrated the self-adaption mechanism of these components with instance.
-
Constructing Smart Campus Based on the Cloud Computing and the Internet of Things
吕倩. 基于云计算及物联网构建智慧校园[J]. 计算机科学, 2011, 38(Z10): 18-21.
LU Qian. Constructing Smart Campus Based on the Cloud Computing and the Internet of Things[J]. Computer Science, 2011, 38(Z10): 18-21. - LU Qian
- Computer Science. 2011, 38 (Z10): 18-21.
- Abstract PDF(475KB) ( 915 )
- RelatedCitation | Metrics
-
Based on the wisdom of cloud computing and physical build the campus network, the use of cloud computing,virtualization, SOA cloud build the smart campus, combined with the Internet of things, RFID smart campus building.Most universities already have the hardware to achieve wisdom campus conditions, but the software side, their own way,sharing of resources,poor application of a single campus. Using virtualization technology to integrate the formation of university resources to pool hardware resources, to achieve dynamic resource allocation, dynamic load balancing, improve resource utilization. Meanwhile, using resources monitoring, load management, redundant backup, dynamic dcployment, rapid deployment, resource scheduling, multi-tenant technology, massive data processing, large-scale distributed storage, data management technology to build the campus structure cloud. Conjugating network technology, physical infrastructure and IT infrastructure in general Internet, real-time monitoring, large amounts of data will be handled by the campus goes,the real wisdom on campus,for Colleges leaps and bounds.
-
RFID Uncertain Data Cleaning Strategy under Shunting Mechanism
夏秀峰,玄丽娟,李晓明. 分流机制下的RFID不确定数据清洗策略[J]. 计算机科学, 2011, 38(Z10): 22-25.
XIA Xiu-feng,XUAN Li-juan,LI Xiao-ming. RFID Uncertain Data Cleaning Strategy under Shunting Mechanism[J]. Computer Science, 2011, 38(Z10): 22-25. - XIA Xiu-feng,XUAN Li-juan,LI Xiao-ming
- Computer Science. 2011, 38 (Z10): 22-25.
- Abstract PDF(331KB) ( 439 )
- RelatedCitation | Metrics
-
Radio frequency identification(RFID) is one of the key technologies in Internet of Things. The uncertainty and mass of RFID original data limit the development of technology seriously. 13y analyzing the uncertain data characteristics,an RFID data cleaning strategy under shunting mechanism was established. The strategy introduces the cleaning queue concept, and according to the cleaning nodes' judgment conditions it can choose the optimal cleaning line. Since it needn't to travel all the cleaning nodes in cleaning system, it saves much time of data transmission and waiting. The experimental results show that the strategy can ease the pressure of data transmission, and improve the efficiency of data cleaning greatly.
-
Research and Application of Low-cost Food Tracking Based on the Internet of Things
邓方源,景小平. 基于物联网的低成本食品跟踪技术的应用研究[J]. 计算机科学, 2011, 38(Z10): 26-29.
DENG Fang-yuan,JING Xiao-ping. Research and Application of Low-cost Food Tracking Based on the Internet of Things[J]. Computer Science, 2011, 38(Z10): 26-29. - DENG Fang-yuan,JING Xiao-ping
- Computer Science. 2011, 38 (Z10): 26-29.
- Abstract PDF(329KB) ( 409 )
- RelatedCitation | Metrics
-
Duc to high cost of the current RFID technology application in the food tracking, it can't be used in low-cost industry. We proposed a Internet based low-cost solution for food tracking analysis using the two-dimensional code on the basis of Internet of things. By analyzing the two-dimensional code, middleware, mobile phones, computer terminals and other component parts in the Internet of things,we indicated the feasibility of the solution,of which the identificalion of two-dimensional code using the phone provides a great convenience. The final result is that the solution for traeking the food industry is currently a large number of applications.
-
Real Time Situational Awareness Model for Large-scale Networks
郑黎明,邹鹏,张建锋,贾焰,韩伟红. 面向大规模网络的安全态势实时量化感知模型[J]. 计算机科学, 2011, 38(Z10): 30-35.
ZHENG Li-ming,ZOU Peng,ZHANG Jian-feng,JIA Yan,HAN Wei-hong. Real Time Situational Awareness Model for Large-scale Networks[J]. Computer Science, 2011, 38(Z10): 30-35. - ZHENG Li-ming,ZOU Peng,ZHANG Jian-feng,JIA Yan,HAN Wei-hong
- Computer Science. 2011, 38 (Z10): 30-35.
- Abstract PDF(557KB) ( 971 )
- RelatedCitation | Metrics
-
NSAS (Network Situation Awareness System) can identify and predict potential attacks. It plays an important role in improving the emergency response capacity and proactive defense capability of the networks. Existing NSASs have many faults, such as lacking for multi source information, higher computational complexity, which arc difficult to be applied to larg}scale networks and real-time situational awareness. This paper introduced an NSAS for largescale network. The situational awareness model was proposed first, and then the details of key technologies, including data fusion, correlation analysis, index quantification and event predication,were given. I}he experimental results demonstrate the effectiveness and reasonability of the proposed model.
-
Honeyfarm-based Network Worm Detection Technique in Three-tied Intranet
陈志杰,鲜明. 一种基于三级内网蜜场系统的网络蠕虫检测技术[J]. 计算机科学, 2011, 38(Z10): 36-40.
CHEN Zhi-jie,XIAN Ming. Honeyfarm-based Network Worm Detection Technique in Three-tied Intranet[J]. Computer Science, 2011, 38(Z10): 36-40. - CHEN Zhi-jie,XIAN Ming
- Computer Science. 2011, 38 (Z10): 36-40.
- Abstract PDF(436KB) ( 602 )
- RelatedCitation | Metrics
-
There arc many intrusion activities on the intranet in which network worms cause the greatest harm. Traditional network security means have many deficiencies, as a means of monitoring and information gathering, honey field technology is essentially different with traditional network security measures. A network worm detection method based on honcyfarm of threctied intranet was proposed. With the ability of improving the speed of worm detection, enhancing the security of internal network, it has important practical significance.
-
Web Browser Vulnerability Exploitation Attack Test Technology Based on Code Overriding
孟辰. 基于代码覆盖的浏览器漏洞利用攻击检测方法[J]. 计算机科学, 2011, 38(Z10): 41-43.
MENG Chen. Web Browser Vulnerability Exploitation Attack Test Technology Based on Code Overriding[J]. Computer Science, 2011, 38(Z10): 41-43. - MENG Chen
- Computer Science. 2011, 38 (Z10): 41-43.
- Abstract PDF(302KB) ( 483 )
- RelatedCitation | Metrics
-
Based on the proofs of concept for vulnerability exploitation attack, we can find the characteristic of the attack through reverse engineering using WinDbg and write test code according to the characteristic. We then encapsulate the test code into a DLL and inject the DLL into Web browser through remote thread. The injected DLL will hook browser's API by means of code overriding, so that the browser will jump to the test code. I3y visiting a website and acknowledging the return value of the injected code to judge whether the webpage contains trojan horse using the vulnerability. I3y deploying this technology into numerous virtual machines, we can analyze webpages in bulk, and then provide high-quality webpages blacklist to antivirus software companies and search engines.
-
Construction Method of Rootkit Based on JOP
李正玉,茅兵,谢立. 一种基于JOP的rootkit构造方法[J]. 计算机科学, 2011, 38(Z10): 44-49.
LI Zheng-yu,MAO Bing,XIE Li. Construction Method of Rootkit Based on JOP[J]. Computer Science, 2011, 38(Z10): 44-49. - LI Zheng-yu,MAO Bing,XIE Li
- Computer Science. 2011, 38 (Z10): 44-49.
- Abstract PDF(515KB) ( 472 )
- RelatedCitation | Metrics
-
ROP is a new programming method, this method can leverage existing code of system to construct malicious code, rootkit constructed by ROP can evade the detection of most kernel integrity protection mechanisms present. Because the instruction gadgets ending by jmp have a certain regularity, so, present there are many protection methods that can detect it. Compared with ROP, the construction method of rootkit based on JOP has no certain regularity, so, the methods of ROP detection present can't detect it. Moreover, compared with ROP, this new method will not be restricted by size of kernel stack and the memory layout of data will be more flexible in the process of construction.
-
Secure and Reliable Centralized Multicast Key Management Scheme
邓淑华,赵泽茂. 一种安全可靠的集中式组播密钥管理方案[J]. 计算机科学, 2011, 38(Z10): 50-52.
DENG Shu-hua,ZHAO Ze-mao. Secure and Reliable Centralized Multicast Key Management Scheme[J]. Computer Science, 2011, 38(Z10): 50-52. - DENG Shu-hua,ZHAO Ze-mao
- Computer Science. 2011, 38 (Z10): 50-52.
- Abstract PDF(328KB) ( 566 )
- RelatedCitation | Metrics
-
By constructing two special polynomials,a new multicast key management (MKM) scheme-Hash Function-based Multicast Kcy Management (HFMKM) scheme was proposed,which was based on hash function and two-variable one-way function. The properties of both centralized and distributed were combined in this scheme, so it overcame the defect of conventional centralized flat schemes, whose security totally depended on the Group Controller CGC). With Comparing and analyzing it with GKMP scheme, the results showed that the HFMKM scheme obviously improved the security and the overall performance. It is a new security MKM scheme.
-
Research on the Defense in Depth System of Air Defense Information Network
黄仁全,李为民,张荣江,贺泽维. 防空信息网络纵深防御体系研究[J]. 计算机科学, 2011, 38(Z10): 53-55.
HUANG Ren-quan,LI Wei-min,ZHANG Rong-jiang,HE Ze-wei. Research on the Defense in Depth System of Air Defense Information Network[J]. Computer Science, 2011, 38(Z10): 53-55. - HUANG Ren-quan,LI Wei-min,ZHANG Rong-jiang,HE Ze-wei
- Computer Science. 2011, 38 (Z10): 53-55.
- Abstract PDF(422KB) ( 1082 )
- RelatedCitation | Metrics
-
In the information age, the security of air defense information network is a new challenging problem to the air defense system. According to the frangibility of the hardware, operation system and the network protocol, there was a great danger hidden in the air defense information network, and both of the outside and inside threats were studied. For keeping the security of the air defense information network, the defense in depth strategy was proposed, and then the defense models were constructed both in length and depth. At last, the technology framework was analyzed, and the key technology was studied.
-
Key Management Scheme for WSN Based on Convertible Ternary Polynomial
方赵林,谢红军. 基于可转换三元多项式的WSN密钥管理方案[J]. 计算机科学, 2011, 38(Z10): 56-58.
FANG Zhao-lin,XIE Hong-jun. Key Management Scheme for WSN Based on Convertible Ternary Polynomial[J]. Computer Science, 2011, 38(Z10): 56-58. - FANG Zhao-lin,XIE Hong-jun
- Computer Science. 2011, 38 (Z10): 56-58.
- Abstract PDF(249KB) ( 391 )
- RelatedCitation | Metrics
-
Because all nodes having the same polynomial use the same shared session keys, schemes designed for wireless sensor networks based on the ternary polynomial are vulnerable to the node capture attacks. They are lack of performance scalability in terms of communication overhand. To address these limitations, a new dynamic key management proposal was designed for wireless sensor networks based on the convertible ternary polynomial, which can guarantee that all nodes having the same polynomial can get the same administration keys and two nodes having the same polynomial can get shared session keys. Compared with the schemes based on the ternary polynomial, the proposed scheme can greatly defend against the node capture attacks overall and reduce communication overhand.
-
Groups of Immune-softman Intrusion Detection Model Based on Trust Correlation
周芳,郑雪峰,于真. 基于信任关联的免疫软件人群体检测模型[J]. 计算机科学, 2011, 38(Z10): 59-61.
ZHOU Fang,ZHENG Xue-feng,YU Zhen. Groups of Immune-softman Intrusion Detection Model Based on Trust Correlation[J]. Computer Science, 2011, 38(Z10): 59-61. - ZHOU Fang,ZHENG Xue-feng,YU Zhen
- Computer Science. 2011, 38 (Z10): 59-61.
- Abstract PDF(253KB) ( 390 )
- RelatedCitation | Metrics
-
The immuncsoftman is provided with adaptability, intelligence and collaboration, so it is used to monitor distributed dynamic network environment in real time. Most of Distributed Intrusion Detection System will produce large amounts of alarm information and the false-alarm rate is also high, which affects the effectiveness of intrusion detection.To address this issue, groups of immuncsoftman intrusion detection model based on trust correlation was proposed.Through the trust correlation algorithms the credibility of the Immune-softman producing alarm can be measured. Simulations show that the groups of immuncsoftman intrusion detection model based on trust correlation can improve the accuracy of intrusion detection alerts.
-
Analysis of Problem in SVD Domain Watermarking and Improved Algorithm
蒋天发,熊祥光,蒋巍. 一类SVD域水印问题分析及改进算法[J]. 计算机科学, 2011, 38(Z10): 62-65.
JIANG Tian-fa,XIONG Xiang-guang,JIANG Wei. Analysis of Problem in SVD Domain Watermarking and Improved Algorithm[J]. Computer Science, 2011, 38(Z10): 62-65. - JIANG Tian-fa,XIONG Xiang-guang,JIANG Wei
- Computer Science. 2011, 38 (Z10): 62-65.
- Abstract PDF(389KB) ( 704 )
- RelatedCitation | Metrics
-
The reasons of high falscpositive detection rate problem for a class of singular value decomposition(SVD)based image watermarking algorithms were analyzed and the corresponding results were given. On this basis, a novel watermarking algorithm based on discrete wavelet transform(DWT) and SVDwas proposed. First the host image is divided into non-overlap blocks and each block is applied 1-level DW T, and then SVD on the low-frequency sub-bandis made. The watermarking is preprocessed by Arnold transform and then is embedded into the singular values of the low-frequency sub-band based on quantization method. Experiments show that the proposed algorithm can overcome the high falscpositive detection rate problem which exists in the traditional watermarking algorithm based on SVD and robust against common signal processing such as JPEG compression, filtering, and the adding of noise.
-
Research and Development of Peer-to-Peer Botnets
杜勤,吕光丽,苏忠,林繁,张少年. P2P僵尸网络研究与进展[J]. 计算机科学, 2011, 38(Z10): 66-71.
DU Qin,LU Guang-li,SU Zhong,LIN Fan,ZHANG Shao-hua. Research and Development of Peer-to-Peer Botnets[J]. Computer Science, 2011, 38(Z10): 66-71. - DU Qin,LU Guang-li,SU Zhong,LIN Fan,ZHANG Shao-hua
- Computer Science. 2011, 38 (Z10): 66-71.
- Abstract PDF(563KB) ( 1303 )
- RelatedCitation | Metrics
-
Because of IRGbased botnets' central point of failure, more and more botnets turn to decentralized Command & Control Channel. Peer-to-Peer protocol based botnet(P2P botnet) is the most important one. After more than 10 years' development, the technology of P2P botnets has been fully mature. They are more resilient and robust, and more difficult to be eliminated. They are considered to be the new generation of botnets. In this paper,the P2P botnet's evolution process was introduced, the functional structure, taxonomy and execution process of P2P botnet were discussed in detail, the propagation model and research development on technology of tracking, detecting and defending methods were proposed.
-
New Botnet Propagation Model with Inununity
黄彪,谭良. 具有免疫特征的僵尸网络传播模型[J]. 计算机科学, 2011, 38(Z10): 72-75.
HUANG Biao,TAN Liang. New Botnet Propagation Model with Inununity[J]. Computer Science, 2011, 38(Z10): 72-75. - HUANG Biao,TAN Liang
- Computer Science. 2011, 38 (Z10): 72-75.
- Abstract PDF(360KB) ( 411 )
- RelatedCitation | Metrics
-
Botnet is a novel attack mode evolved from the traditional malicious softwares, currently it has become a major threat to Internet. The propagation model of botnet is the most common method to study the spreading features of bots, but current botnets' propagation models don't consider characteristics of some hosts' immunity, so these propagation models can not exactly describe how the bots spread on the Internet. In this paper, a new botnet propagation model with the immunity was proposed. This model carefully considerates about the real situation of the Internet, espedally immunity of the host which removed from the susceptible network in advance. Simulation result shows that the botnet propagation model with immunity more exactly satisfies the practical propagation laws and infection characteristics of bot on Internet.
-
Framework Detecting in Parallel DSP Network Based on Wormhole Algorithm
邹修国. 一种基于蠕虫算法的并行DSP网络结构探测[J]. 计算机科学, 2011, 38(Z10): 76-77.
ZOU Xiu-guo. Framework Detecting in Parallel DSP Network Based on Wormhole Algorithm[J]. Computer Science, 2011, 38(Z10): 76-77. - ZOU Xiu-guo
- Computer Science. 2011, 38 (Z10): 76-77.
- Abstract PDF(249KB) ( 318 )
- RelatedCitation | Metrics
-
There are many ways that compose parallel DSP network. Two methods connecting DSP are EMIF and McBSP, combining the advantages of both approaches. Its structure can use wormhole algorithm. Depth-first traversal algorithm is a good wormhole algorithm. Elaborating on the concrete realization of the wormhole algorithm, and geting the framework with this algorithm in the detecting. If using the same DSP chip, the parallel DSP algorithm has more applicability in parallel DSP system.
-
Research on Software Vulnerability Mining Technique Based on File-format
陈韬,孙乐昌,潘祖烈,刘京菊. 基于文件格式的漏洞挖掘技术研究[J]. 计算机科学, 2011, 38(Z10): 78-82.
CHEN Tao,SUN Le-chang,PAN Zu-lie,LIU Jing-ju. Research on Software Vulnerability Mining Technique Based on File-format[J]. Computer Science, 2011, 38(Z10): 78-82. - CHEN Tao,SUN Le-chang,PAN Zu-lie,LIU Jing-ju
- Computer Science. 2011, 38 (Z10): 78-82.
- Abstract PDF(481KB) ( 941 )
- RelatedCitation | Metrics
-
Software vulnerability mining technique based on FilcFormat becomes more important in information security filed for the filcformat vulnerability's serious damage and complexity discovery. Summarized the development of this technique,and mainly analyzed three disadvantages when applied to a special filcformat At last, proposed the further improvement directions.
-
New Trust Metric Based on Fuzzy Adjustment for Services Computing Environment
盛勇,杜晓静,蒋黎明,徐建. 服务计算环境中基于模糊修正的信任度量[J]. 计算机科学, 2011, 38(Z10): 83-86.
SHENG Yong,DU Xiao-jing,JIANG Li-ming,XU Jian. New Trust Metric Based on Fuzzy Adjustment for Services Computing Environment[J]. Computer Science, 2011, 38(Z10): 83-86. - SHENG Yong,DU Xiao-jing,JIANG Li-ming,XU Jian
- Computer Science. 2011, 38 (Z10): 83-86.
- Abstract PDF(331KB) ( 793 )
- RelatedCitation | Metrics
-
In order to deal with the problem of the decline of accuracy of trust metric, which is met due to the ignorance of the difference of rating scale, we presented a new trust metric based on fuzzy adjustment, Firstly, we described the semantic of trust rating and rating scale based on fuzzy member functions. On this basis,we proposed a trust rating adjust method. Lastly, we applied the weigh calculated from similarity matrix to trust aggregation. Analysis and experiment show that compared with Pagerank algorithm and TidalTrust algorithm, the method proposed in this paper has more remarkable enhancements in the accuracy of trust metric and is effective to reduce the false positive and negative in trust decision.
-
A Kind of Network Security Protocols and Verification
李晓燕,苗长云. 一种网络入侵检测系统安全通信协议及其验证[J]. 计算机科学, 2011, 38(Z10): 87-88.
LI Xiao-yan,MIAO Chang-yun. A Kind of Network Security Protocols and Verification[J]. Computer Science, 2011, 38(Z10): 87-88. - LI Xiao-yan,MIAO Chang-yun
- Computer Science. 2011, 38 (Z10): 87-88.
- Abstract PDF(169KB) ( 332 )
- RelatedCitation | Metrics
-
Considering some problems of secure communications between the various modules in distributed intrusion detection system, a kind of network security protocols of applicable to distributed intrusion detection system were poposed. The protocols are proved to be safe in theory and to be a reliable in product testing.
-
Research and Design of Network Access Control Software Based on a Special Network
楼恒越,窦月皎. 基于专网的网络访问控制软件研究与设计[J]. 计算机科学, 2011, 38(Z10): 89-91.
LOU Heng-yue,DOU Yue-jiao. Research and Design of Network Access Control Software Based on a Special Network[J]. Computer Science, 2011, 38(Z10): 89-91. - LOU Heng-yue,DOU Yue-jiao
- Computer Science. 2011, 38 (Z10): 89-91.
- Abstract PDF(356KB) ( 397 )
- RelatedCitation | Metrics
-
Based on analysis of security and confidentiality in a private network and the demand for network access control,a network access control software was designed and realized. Focused on the request of management and limitation for on-line client computers which used chipset/wireless network card in a private network, this software realized its functions by detecting the change of client IP address or other messages, triggering network control events for network monitoring and management.
-
Reliability Prediction Model for Web Services Based on Control-structure
谢春丽,王喜凤. 基于控制结构的Web服务可靠性预测模型[J]. 计算机科学, 2011, 38(Z10): 92-95.
XIE Chun-li,WANG Xi-feng. Reliability Prediction Model for Web Services Based on Control-structure[J]. Computer Science, 2011, 38(Z10): 92-95. - XIE Chun-li,WANG Xi-feng
- Computer Science. 2011, 38 (Z10): 92-95.
- Abstract PDF(298KB) ( 344 )
- RelatedCitation | Metrics
-
In the development phase of Web services, the services located in different locations and provided by different organizations must be composed together in order to satisfy specific business requirements. The reliability must be ensured for composite services first. The reliability of composite services is the most important QoS(Quality of Service)which can determine the popularity of the services. The reliability of composite services is affected by the structure of services and by the composite conditions. So, the traditional models to predict the reliability are inapplicable to Web services. In this paper, to improve the accuracy of reliability prediction, a reliability prediction model for composite service was presented based on control-structure. Lastly, a case study was designed to support our reliability model. The experimental results show that our model can obtain better reliability prediction accuracy.
-
Study on Military Networks Defense In-depth Model Based on Closed-loop Control
刘升俭. 基于闭环控制的军事网络纵深防御模型研究[J]. 计算机科学, 2011, 38(Z10): 96-98.
LIU Sheng-jian. Study on Military Networks Defense In-depth Model Based on Closed-loop Control[J]. Computer Science, 2011, 38(Z10): 96-98. - LIU Sheng-jian
- Computer Science. 2011, 38 (Z10): 96-98.
- Abstract PDF(279KB) ( 913 )
- RelatedCitation | Metrics
-
According to the specific construction demand of military networks defense system, this paper proposed a new military network defense in-depth model of APR-WPDRRC based on closed-loop control mechanism. Since the model adopts technique policy of multilayer defense in-depth and integrate layer-class frame of defense in-depth technique method, it can achieve cooperation linkage and closed-loop control of fast warning, initiative protection, real-time detection, urgent response, dynamic restore and precision counterattack. hhe model has a good networks defense agility of adaptability, intrusion tolerance attack and strong survivability when it is confronted with large-scale, distributed, instantancous changing network attacks.
-
Vague-keyword Search under Encrypted Environment in Cloud Computing
梁宇,路劲,刘笠熙,张驰. 一种云计算环境下的加密模糊检索方案[J]. 计算机科学, 2011, 38(Z10): 99-100.
LIANG Yu,LU Jin,LIU Li-xi,ZHANG Chi. Vague-keyword Search under Encrypted Environment in Cloud Computing[J]. Computer Science, 2011, 38(Z10): 99-100. - LIANG Yu,LU Jin,LIU Li-xi,ZHANG Chi
- Computer Science. 2011, 38 (Z10): 99-100.
- Abstract PDF(262KB) ( 438 )
- RelatedCitation | Metrics
-
As there is a significant development in potable devices market recently, cloud computing is more commonly implemented. Confidential Batas arc accumulated and stored in cloud servers. To ensure the Batas arc secured, they should be encrypted when being uploaded, which makes efficient searching among them a much complicated task. Traditional searching programmes in encrypted environments are able to find the data only if the keyword is exactly correct,but will fail if spelling errors or format errors occur.These programmes arc hence not suitable for cloud computing. We introduced a high efficiency programme which can deal with even vague keyword searching in the encrypted environment.
-
Secure ID-based Verifiably Encrypted Signature without Random Oracles
王天芹,苏莉文. 标准模型下安全的基于身份的可验证加密签名[J]. 计算机科学, 2011, 38(Z10): 101-105.
WANG Tian-qin,SU Li-wen. Secure ID-based Verifiably Encrypted Signature without Random Oracles[J]. Computer Science, 2011, 38(Z10): 101-105. - WANG Tian-qin,SU Li-wen
- Computer Science. 2011, 38 (Z10): 101-105.
- Abstract PDF(357KB) ( 428 )
- RelatedCitation | Metrics
-
Verifiably encrypted signature can be used in secure electronic transactions. We presented the first efficient identity-based verifiably encrypted signature scheme which has the properties of verifiability and recoverability. We gave a security model with precise definitions and showed that the scheme is secure under the computational Bilinear Diffie-Hellman assumption without random oracles.
-
Application of FAT in Information Security Risk Assessment
郑雷雷,宋丽华,郭锐,张建成. 故障树分析法在信息安全风险评估中的应用[J]. 计算机科学, 2011, 38(Z10): 106-108.
ZHENG Lei-lei,SONG Li-hua,GUO Rui,ZHANG Jian-cheng. Application of FAT in Information Security Risk Assessment[J]. Computer Science, 2011, 38(Z10): 106-108. - ZHENG Lei-lei,SONG Li-hua,GUO Rui,ZHANG Jian-cheng
- Computer Science. 2011, 38 (Z10): 106-108.
- Abstract PDF(357KB) ( 642 )
- RelatedCitation | Metrics
-
Information Security (IS) becomes the focus question that people pay attention to, how to build a qualitative model of Information Security Risk Assessment (ISRA) and how to quantitatively analyze the key parts in a number of risk factors are the primary questions that we concerned. We built the ISRA model using Fault Tree Analysis (FAT),and then by qualitative and quantitative analysis, we analyzed the relationship between risk factors and IS, finding out the main factors that result in Information Security Risk exposure. The result shows the practicability and expandability of this assessment model.
-
Research on Hierarchical Trusted Platform Based on Trusted Terminal
贾佳,周毅,董慧,张成岩. 基于终端可信的分层可信平台模型研究[J]. 计算机科学, 2011, 38(Z10): 109-113.
JIA Jia,ZHOU Yi,DONG Hui,ZHENG Cheng-yan. Research on Hierarchical Trusted Platform Based on Trusted Terminal[J]. Computer Science, 2011, 38(Z10): 109-113. - JIA Jia,ZHOU Yi,DONG Hui,ZHENG Cheng-yan
- Computer Science. 2011, 38 (Z10): 109-113.
- Abstract PDF(463KB) ( 395 )
- RelatedCitation | Metrics
-
This paper presented the research on hierarchical trusted platform based on trusted terminal, which is a new direction. The platform system is a combination of hardware, secure operating system and application system. This paper,through building a complete trusted chain from the start stage of the client terminal, undertaking the security of trusted computing platform which could make the trust transfer from user to user, realized the real trusted computing experience for users.
-
Network Model Based on Local World
王学光. 一种基于局域世界的网络模型研究[J]. 计算机科学, 2011, 38(Z10): 114-118.
WANG Xue-guang. Network Model Based on Local World[J]. Computer Science, 2011, 38(Z10): 114-118. - WANG Xue-guang
- Computer Science. 2011, 38 (Z10): 114-118.
- Abstract PDF(409KB) ( 490 )
- RelatedCitation | Metrics
-
Self-organized mechanism is one of many reasons which can explain system building. For simulating the network formation in the real world, this paper proposed a network evolution model based on local world and self-organized mechanism. It discussed the model's topological properties, including clustering coefficient, betweenness centrality, efficiency,reachability,biggest cluster size and cluster diameter. The results show that the model can tolerate random failures and intentional attacks very well.
-
Applications of A-EKE Protocol with ElGamal Signature Scheme Based on the Conic Curve over Zn
郝思佳,方颖钰,王标,邬静阳. 基于环Zn上圆锥曲线上的A-EKE协议及其应用[J]. 计算机科学, 2011, 38(Z10): 119-123.
HAO Si-jia,FANG Ying-jue,WANG Biao,WU Jing-yang. Applications of A-EKE Protocol with ElGamal Signature Scheme Based on the Conic Curve over Zn[J]. Computer Science, 2011, 38(Z10): 119-123. - HAO Si-jia,FANG Ying-jue,WANG Biao,WU Jing-yang
- Computer Science. 2011, 38 (Z10): 119-123.
- Abstract PDF(384KB) ( 396 )
- RelatedCitation | Metrics
-
This paper proposed a scheme in which A-EKE is formed on the basis of conic curve over residue class ring Zn,using ElGamal signature algorithm, and presented the numerical simulation of the scheme. This scheme has combining advantages; A-EKE Protocol using a combination of asymmetric(publi-key) and symmetric(secret-key) cryptography provides security and identification for communication on computer network. A-EKE allows hosts not to store cleartext passwords, and thus can prevent the attacker from mimicking the user to the host. Implementing the scheme using ElGamal signature algorithm also strengthens the scheme. The scheme can secure against active attack, overlay attack,rnan-irrth}rniddle attack,off-Line dictionary attack and password profile cor工iprornise. Cox工iprehensively usin9 the difficulties in factorizing large integer and computing discrete logarithm with Conic Curve over ,the security of this scheme is increased. For the facility of plaintext embedding and the computing of rank and point on conic Cn(a, b),the scheme has the advantages of speedy operation and easy realization, especially by using the NAF. These advantageous properties of the schemes have pragmatic significance for the design and realization of secure and efficient identity authentication and key negotiation system.
-
Survey of Data Consistency Insurance Technologies for Continuous Data Protection
刘林,熊琦,吴世忠. 连续数据保护中的数据一致性保障技术研究综述[J]. 计算机科学, 2011, 38(Z10): 124-127.
LIU Lin,XIONG Qi,WU Shi-zhong. Survey of Data Consistency Insurance Technologies for Continuous Data Protection[J]. Computer Science, 2011, 38(Z10): 124-127. - LIU Lin,XIONG Qi,WU Shi-zhong
- Computer Science. 2011, 38 (Z10): 124-127.
- Abstract PDF(464KB) ( 850 )
- RelatedCitation | Metrics
-
As a new branch of disaster tolerance, Continuous Data Protection(CDP) overcomes the weakness of traditional data backup and snapshot technology, protecting critical data with novel method. The working flow of Continuous Data Protection was first introduced, then problems leading to data inconsistency in CDP were analyzed, and some technologies employed for data consistency protecting were summarized and analyzed. The future research direction in CDP data consistency protection was pointed out.
-
Information Filtering Mechanism Based on User Network Architecture for Mobile Internet
王景欣,袁坚,耿军伟,冯振明. 移动互联网基于用户网络结构的信息过滤机制[J]. 计算机科学, 2011, 38(Z10): 128-132.
WANG Jing-xin,YUAN Jian,GENG Jun-wei,FENG Zhen-ming. Information Filtering Mechanism Based on User Network Architecture for Mobile Internet[J]. Computer Science, 2011, 38(Z10): 128-132. - WANG Jing-xin,YUAN Jian,GENG Jun-wei,FENG Zhen-ming
- Computer Science. 2011, 38 (Z10): 128-132.
- Abstract PDF(433KB) ( 356 )
- RelatedCitation | Metrics
-
To improve the accuracy of information filtering mechanism and resolve the cold start problem, an information filtering mechanism based on user network architecture was proposed. Here, the social network is treated as a part of the information sharing and dissemination system, like information processing nodes, to help us recognize mobile users' needs and identify more interesting services. The user interest network structure is used to improve the collaborafive filtering. The social network is used to limit the transmission of information. The fingerprints are used to solve the cold start problem. Data analysis shows that this mechanism has better performance.
-
Design and Implementation of Field Data Collection and Transmission System for e-Science Applications
秦刚,王金一,杨智超,代梁峰,樊道毅,阎保平. e-Science应用中野外数据采集传输系统设计与实现[J]. 计算机科学, 2011, 38(Z10): 133-135.
QIN Gang,WANG Jin-yi,YANG Zhi-chao,DAI Liang-feng,FAN Dao-yi,YAN Bao-ping. Design and Implementation of Field Data Collection and Transmission System for e-Science Applications[J]. Computer Science, 2011, 38(Z10): 133-135. - QIN Gang,WANG Jin-yi,YANG Zhi-chao,DAI Liang-feng,FAN Dao-yi,YAN Bao-ping
- Computer Science. 2011, 38 (Z10): 133-135.
- Abstract PDF(367KB) ( 598 )
- RelatedCitation | Metrics
-
e-Science is one of the research hotspots in recent years, which focuses on how to apply IT on other disciplines. How to collect and transmit field data is an immediate problem to be solved in e-Science for those disciplines involving field observation. This paper brought out a system for field data collection and transmission in an automatic and high efficient way combined with several kinds of communication methods. A demonstration system was developed in JAVA language to implement this system and was verified to be good efficient in test.
-
Use of LDA Model in Topic Tracking
张晓艳,王挺,梁晓波. LDA模型在话题追踪中的应用[J]. 计算机科学, 2011, 38(Z10): 136-139.
ZHANG Xiao-yan,WANG Ting,LIANG Xiao-bo. Use of LDA Model in Topic Tracking[J]. Computer Science, 2011, 38(Z10): 136-139. - ZHANG Xiao-yan,WANG Ting,LIANG Xiao-bo
- Computer Science. 2011, 38 (Z10): 136-139.
- Abstract PDF(418KB) ( 703 )
- RelatedCitation | Metrics
-
As more and more researches are made for the LDA model, its ability of representing and mining has been increased a lot. " Topic" is an important concept in the I_DA model, which is represented as a polynomial distribution of the feature set. Topic tracking is monitoring a stream of news stories to find additional stories on a topic identified by several samples. There are two reasons for using the LDA model in topic tracking; one is to show how the performance of the tracking system using the I_DA model is; the other is trying to find whether there is some relation between the LDA topic and the tracked topic. The experimental results indicate that the LDA model is better than the vector space model,the unigram language model and the special event model in a topic tracking system However, since the granulari- tics of two kinds of topics arc different, the relation between the LDA topic and the tracked topic is not about bijection.An adjustable LDA model is needed in our future work.
-
Techniques for Thread Assessment Based on Rough Set Theory and Plan Recognition
王晓帆,王宝树,罗磊. 基于粗糙集与计划识别的威胁估计方法[J]. 计算机科学, 2011, 38(Z10): 140-142.
WANG Xiao-fan,WANG Bao-shu,LUO Lei. Techniques for Thread Assessment Based on Rough Set Theory and Plan Recognition[J]. Computer Science, 2011, 38(Z10): 140-142. - WANG Xiao-fan,WANG Bao-shu,LUO Lei
- Computer Science. 2011, 38 (Z10): 140-142.
- Abstract PDF(227KB) ( 415 )
- RelatedCitation | Metrics
-
Although there is a mass of uncertain information in process of thread assessment, plan recognition quick is very important. A new method for plan recognition based on rough set was put forward. First the model for plan recognition based multi-attribute of rough set was build and calculating methods were given, then concrete examples were demonstrated to test the validity and correctness of the models. The results of the experiment show that the model can promote the efficiency of thread assessment, and give a new technique of pattern matching quick.
-
Research on Density Clustering Algorithm with a Multiple Constraints
江敏,皮德常,孙兰. 一种多约束的密度聚类算法的研究[J]. 计算机科学, 2011, 38(Z10): 143-145.
JIANG Min,PI De-chang,SUN Lan. Research on Density Clustering Algorithm with a Multiple Constraints[J]. Computer Science, 2011, 38(Z10): 143-145. - JIANG Min,PI De-chang,SUN Lan
- Computer Science. 2011, 38 (Z10): 143-145.
- Abstract PDF(336KB) ( 631 )
- RelatedCitation | Metrics
-
Traditional clustering algorithms based on density can not overcome the shortage with a variety of constraints in the existing clustering algorithm based on the density proposed. This paper proposed a clustering algorithm based on density with a variety of constraints. The algorithm introduces a variety of constraints into clustering algorithm to analyze the clustering results affected by a variety of constraints. Experimental results show that the algorithm in a multi constrained condition can complete a cluster analysis of the data points,and can obtain a better clustering results,provides a good theoretical support for really dealing with multiple constraints clustering.
-
Web Data Mining Based on Cloud-computing
程苗. 基于云计算的Web数据挖掘[J]. 计算机科学, 2011, 38(Z10): 146-149.
CHENG Miao. Web Data Mining Based on Cloud-computing[J]. Computer Science, 2011, 38(Z10): 146-149. - CHENG Miao
- Computer Science. 2011, 38 (Z10): 146-149.
- Abstract PDF(361KB) ( 521 )
- RelatedCitation | Metrics
-
Internet is a huge and widely distributed information service center, the vast amounts of data generated on the Internet arc usually geographically distributed, heterogeneous, dynamic and become more complex, it can not meet the requirements if we use the existing centralized data mining methods. To solve these problems,proposed a cloud computing-based Web data mining method, the massive data and mining tasks will be decomposed on multiple computers parallely processed. We use open platform-Hadoop to establish a parallel association rules mining algorithm based on Apriori, and it tests and veriftes the efficiency of system. This paper proposed a design thinking that "migrate the calculation to the store",the calculation will be implemented on the local storage nodes, thus it can avoid the large amount of data transmission on the network, and will not take a lot of bandwidth.
-
Non-extensive Entropy:A New Metric of Internet Topology
张益方,钱亚冠,王滨,吕兵兵. 非广延嫡:一种新的Internet拓扑度量[J]. 计算机科学, 2011, 38(Z10): 150-152.
ZHANG Yi-fang,QIAN Ya-guan,WANG Bin,LU Bing-bing. Non-extensive Entropy:A New Metric of Internet Topology[J]. Computer Science, 2011, 38(Z10): 150-152. - ZHANG Yi-fang,QIAN Ya-guan,WANG Bin,LU Bing-bing
- Computer Science. 2011, 38 (Z10): 150-152.
- Abstract PDF(238KB) ( 557 )
- RelatedCitation | Metrics
-
With the size of Internet growing fast, the topology model of Internet is becoming an appealing point in research community. People make try to put deep insight into the nature of Internet topology, by constructing more models from initial Waxman random model to I3A,GLP, and PFP. A number of topology metrics were proposed, including node degree, cluster, and betweeness, to describe the topology characters. Non-extensive entropy, which is employed extensively in statistical physics,was introduced for a new Internet topology metric in this paper. It is used to depict the purity of node degree distribution. In order to evaluate the non-extensive entropy as topology metric, we analycd the consistency of BA, Waxman and real topology generated from CAIDA,by their non-extensive entropies. Finally, we argued that I3A is more in accordance with real Internet topology by comparing their non-extensive entropy, which confirms that non-extensive is fit for topology metric.
-
Research on Article Edit Characteristic in Wikipedia
赵东杰,郝黎,李德毅,王华,何宇. 维基百科词条编辑特性研究[J]. 计算机科学, 2011, 38(Z10): 153-156.
ZHAO Dong-jie,HAO Li,LI De-yi,WANG Hua,HE Yu. Research on Article Edit Characteristic in Wikipedia[J]. Computer Science, 2011, 38(Z10): 153-156. - ZHAO Dong-jie,HAO Li,LI De-yi,WANG Hua,HE Yu
- Computer Science. 2011, 38 (Z10): 153-156.
- Abstract PDF(357KB) ( 906 )
- RelatedCitation | Metrics
-
Aiming at the problems of article edit characteristic in wikipedia, under the direction of the idea of networked data mining,featured articles in wikipedia were analysed by text processing to hind the difference of sentence between adjacent versions, the article edit interaction networks were constructed, where the node is editor and the link is the edit interaction connection between editors, then the article edit characteristics in wikipedia were analysed by the empirical analysis of the nine networks. Results show that all networks have small-world properties, strong positive degree strength correlation and negative degre}clustering coefficient distribution, their degree distributions are similar to strength distributions, their cumulate distributions and link weight distribution arc power-law distribution, shortest path length distributions are similar to gauss distribution, all networks have degree and strength disassortativity and weak reciprocity, furthermore the edit collective have strong heterogeneity and community structure, which deepens the knowledge of the process of article edit interaction and collective intelligence.
-
Fuzzy Clustering Partition Model for Computer Cluster in Cloud Computing
刘伯成,陈庆奎. 云计算中的集群资源模糊聚类划分模型[J]. 计算机科学, 2011, 38(Z10): 157-160.
LIU Bo-cheng,CHEN Qing-kui. Fuzzy Clustering Partition Model for Computer Cluster in Cloud Computing[J]. Computer Science, 2011, 38(Z10): 157-160. - LIU Bo-cheng,CHEN Qing-kui
- Computer Science. 2011, 38 (Z10): 157-160.
- Abstract PDF(397KB) ( 441 )
- RelatedCitation | Metrics
-
With the development of cloud computing applications, the computer cluster becomes more and more important, but the computer performance in cluster is so different. Even though they can connect and can share their resources each other, but when the computer performance is not balance and the cluster performance is not to match with the parallcl tasks, it can cause the low efficiency for parallel task. So, it is an important problem how to partition and management computer cluster. The paper gave a way to solve it. Using the fuzzy clustering method according to the computer resources in computer cluster and through the vector of resource demand and the vector of lowest inaccuracy tolerance,we can divide the computer cluster into several classes(logical computer cluster) and make the every computer performance in one class to be more similar. It makes the computer cluster management to become easier. We partition the computers in lab into network gateway cluster, data base cluster, and service cluster for the Internet of thing cloud using this model.This model is fit for the cloud computing applications.
-
Lineage Tracing Model for Iceberg Queries Over RFID Data Stream
刘耀宗,张宏,孟锦,王永利. 面向RFID数据流冰川查询的世系追踪模型[J]. 计算机科学, 2011, 38(Z10): 161-164.
LIU Yao-zong,ZHANG Hong,MENG Jin,WANG Yong-li. Lineage Tracing Model for Iceberg Queries Over RFID Data Stream[J]. Computer Science, 2011, 38(Z10): 161-164. - LIU Yao-zong,ZHANG Hong,MENG Jin,WANG Yong-li
- Computer Science. 2011, 38 (Z10): 161-164.
- Abstract PDF(371KB) ( 398 )
- RelatedCitation | Metrics
-
In order to get popular elements and the origin of the data in RFID data streams, iceberg queries of RFID data streams with data information on the origin of glaciers query must be made. RFID data lineage to track the application flow needs to know the origin of the data. This paper introduced the data streams lineage tracing techniques, combined with the method of the query RFID data stream, a lineage tracing model for iceberg queries over RFID Data Stream was proposed in this paper.
-
Model of Identifying the Influentials in Blog Community
卢露,丁才昌. 社区中最具影响力博客的探测模型[J]. 计算机科学, 2011, 38(Z10): 165-168.
LU Lu,DING Cai-chang. Model of Identifying the Influentials in Blog Community[J]. Computer Science, 2011, 38(Z10): 165-168. - LU Lu,DING Cai-chang
- Computer Science. 2011, 38 (Z10): 165-168.
- Abstract PDF(351KB) ( 504 )
- RelatedCitation | Metrics
-
Some bloggers in the virtual community could impact other partners' opinion and guide the actions of other members by publishing high-quality blog post, which is considered to have high influence. We regarded them as important informative resources. Detecting the influential' s activities gives assistance to external world' s decision. We proposed some measurements of influence by taking advantage of the blog's unique form,and ctuantify influence with resped to topics. I}he experiment shows that model can overcome shortcomings of only using the simple statistical characteristics to identify important blogger,which is an effective method.
-
Application Research on Artificial Immune Network Combined with RBF
颜学明,杨凌霄,葛红. 人工免疫网络算法与RBF网结合的应用研究[J]. 计算机科学, 2011, 38(Z10): 169-171.
YAN Xue-ming,YANG Ling-xiao,GE Hong. Application Research on Artificial Immune Network Combined with RBF[J]. Computer Science, 2011, 38(Z10): 169-171. - YAN Xue-ming,YANG Ling-xiao,GE Hong
- Computer Science. 2011, 38 (Z10): 169-171.
- Abstract PDF(338KB) ( 502 )
- RelatedCitation | Metrics
-
Artificial immune network, an intelligent information processing model inspired by biological immune system,has been widely studied and applied. In this paper, a modified artificial immune algorithm combined with traditional RBF was used in problem solving. The experimental results show that the modified artificial immune network algorithm can present the functions of reducing data redundancy, smoothing noise and extracting feature data to improve data quality.In the application of combining with RBF network, the speed and functionality of problem solving arc raised effectively.
-
Performance Research of Storage Area Network under the Online Transaction Processing
苟彦,李华. 存储区域网络在联机事务处理下的性能研究[J]. 计算机科学, 2011, 38(Z10): 172-174.
GOU Yan,LI Hua. Performance Research of Storage Area Network under the Online Transaction Processing[J]. Computer Science, 2011, 38(Z10): 172-174. - GOU Yan,LI Hua
- Computer Science. 2011, 38 (Z10): 172-174.
- Abstract PDF(281KB) ( 419 )
- RelatedCitation | Metrics
-
Storage area network is a storage solution based on "block" data access, it is popular in recent years and used in many areas. Online transaction processing is popular business. Online transaction processing business is running in a storage area network, to improve the quality of business. How to ensure the business can run fast and stable, or how to resolve problems in the shortest time is something that we are concerned about. This requires us to research their performance and optimize it,in order to support system running with a high quality.
-
Personalize Context and Item Class Based Resource Recommendation
杨畅,李华. 基于个性化情境和项目类别的资源推荐研究[J]. 计算机科学, 2011, 38(Z10): 175-177.
YANG Chang,LI Hua. Personalize Context and Item Class Based Resource Recommendation[J]. Computer Science, 2011, 38(Z10): 175-177. - YANG Chang,LI Hua
- Computer Science. 2011, 38 (Z10): 175-177.
- Abstract PDF(317KB) ( 386 )
- RelatedCitation | Metrics
-
The conditional collaborative filtering technology does not consider the user's context information which affect user's rating. 13ut recent research show that user's personalized context directly affect rating, so the result of recommendation can be improved if personalize context is incorporated into conditional collaborative filtering technology.Besides, the personalized context and item class are can be combined, Firstly classifying the items, and then making sure user's personalize context under every item class. When predicting the rating of target item,Firstly make sure which item class the target item is belong to, and then identify the user's personalized context used to compute the rating of the target item. hhe experimental results show that the recommendation accuracy of proposed approach is better than Slope One.
-
Hybrid Particle Swarm Algorithm of Solving Nonlinear Constraint Optimization Problems
张利凤,胡小兵. 求解非线性约束问题的混合粒子群优化算法[J]. 计算机科学, 2011, 38(Z10): 178-180.
ZHANG Li-feng,HU Xiao-bing. Hybrid Particle Swarm Algorithm of Solving Nonlinear Constraint Optimization Problems[J]. Computer Science, 2011, 38(Z10): 178-180. - ZHANG Li-feng,HU Xiao-bing
- Computer Science. 2011, 38 (Z10): 178-180.
- Abstract PDF(281KB) ( 1141 )
- RelatedCitation | Metrics
-
Combining a multiplier method which deals with constraint problems with improved particle swarm optimization algorithm, a new hybrid particle swarm optimization algorithm was proposed for solving non-linear constraint problems. The new algorithm takes advantage of the particle swarm optimization algorithm and the multiplier method, for the non-available particle appearing in the iterative process, using the multiplier method to produce feasible particle, and then search its optimal value by improved particle swarm optimization. Thus it can not only reduce the probability of falling into local minimum, but also can improve the search accuracy. And the numerical tests show that the proposed new algorithm has the characteristics of validity and searching for more precise particle and better robustness.
-
Negative Selection Algorithm Based on Niche Strategy
杨宁,王茜. 一种基于小生境策略的阴性选择算法[J]. 计算机科学, 2011, 38(Z10): 181-184.
YANG Ning ,WANG Qian. Negative Selection Algorithm Based on Niche Strategy[J]. Computer Science, 2011, 38(Z10): 181-184. - YANG Ning ,WANG Qian
- Computer Science. 2011, 38 (Z10): 181-184.
- Abstract PDF(330KB) ( 419 )
- RelatedCitation | Metrics
-
Negative selection algorithm is one of the traditional core algorithms of the artificial immune system, many improved algorithms are based on it, However, there are many problems about these algorithm such as the long-time computing and the excessive consumption of space resources. In order to reduce the complexity of the algorithm and the generation time of the detector, we presented a algorithm which was based on the niche strategy, it improve the efficiency of the generation of negative selection algorithm.
-
Research on PageRank Algorithm
李稚楹,杨武,谢治军. PageRank算法研究综述[J]. 计算机科学, 2011, 38(Z10): 185-188.
LI Zhi-ying,YANG Wu,XIE Zhi-jun. Research on PageRank Algorithm[J]. Computer Science, 2011, 38(Z10): 185-188. - LI Zhi-ying,YANG Wu,XIE Zhi-jun
- Computer Science. 2011, 38 (Z10): 185-188.
- Abstract PDF(344KB) ( 1575 )
- RelatedCitation | Metrics
-
Pages ranking is one of the key technologies used in the design of a search engine. I}his paper described the famous PageRank algorithm. For the problems such as topic drift and emphasis on the old page, the approaches and features of a variety of improved algorithms were analysed in detail, hoping that can provide the basic support to the research in the future.
-
Study on Word Meaning Comprehension Based on Formal Concept Analysis
杨帆,翟岩慧,曲开社,李德玉. 基于形式概念分析的词义理解研究[J]. 计算机科学, 2011, 38(Z10): 189-191.
YANG Fan, ZHAI Yan-hui,QU Kai-she, LI De-yu. Study on Word Meaning Comprehension Based on Formal Concept Analysis[J]. Computer Science, 2011, 38(Z10): 189-191. - YANG Fan, ZHAI Yan-hui,QU Kai-she, LI De-yu
- Computer Science. 2011, 38 (Z10): 189-191.
- Abstract PDF(338KB) ( 574 )
- RelatedCitation | Metrics
-
We discussed polysemy analysis and semantic analysis based on formal concept analysis. On polysemy analysis, we generated a decision context based on relations between word meanings and the corresponding parts of speech.And then we extracted the decision rules from the context and gave them explanations. On semantic analysis,we formed a formal context based on relations between linguistic objects and their semantic features, and analyzed them according to formal concept analysis. Experiments show that we can not only classify the linguistic objects easily, but view reladons between different word classifications intuitively, and that formal concept analysis is an efficient tool for semantic analysis.
-
Improved Slope One Algorithm for Collaborative Filtering
王毅,楼恒越. 一种改进的Slope One协同过滤算法[J]. 计算机科学, 2011, 38(Z10): 192-194.
WANG Yi, LOU Heng-yue. Improved Slope One Algorithm for Collaborative Filtering[J]. Computer Science, 2011, 38(Z10): 192-194. - WANG Yi, LOU Heng-yue
- Computer Science. 2011, 38 (Z10): 192-194.
- Abstract PDF(249KB) ( 577 )
- RelatedCitation | Metrics
-
Compared to traditional rating-based collaborative filtering algorithm, the Slope One algorithm is simple and efficient. However, the Slope One algorithm relies on a large number of users' ratings to the item which should be predieted. The rating prediction is affected when users' ratings are not enough and it does not consider the users' habits.For the reason, the semantic similarity of the keywords to describe the items was introduced, which measures the degree of similarity between item-pairs, then a combination of items' semantic similarity and the Slope One algorithm was proposed. Finally,by the standard data set MovieLens, the data of the experiment's result show that the improved algorithm improvers the accuracy of the original algorithm.
-
Research on Cloud Economic Resource Management Model with QoS Constrains
钱琼芬,李春林,张小庆. QoS约束的云经济资源管理模型研究[J]. 计算机科学, 2011, 38(Z10): 195-197.
QIAN Qiong-fen,LI Chun-lin, ZHANG Xiao-qing. Research on Cloud Economic Resource Management Model with QoS Constrains[J]. Computer Science, 2011, 38(Z10): 195-197. - QIAN Qiong-fen,LI Chun-lin, ZHANG Xiao-qing
- Computer Science. 2011, 38 (Z10): 195-197.
- Abstract PDF(374KB) ( 385 )
- RelatedCitation | Metrics
-
It is a major challenge for the cloud computing system to provide satisfied cloud application with QoS constraints. We proposed a cloud computing economic management model based on commodity market prototype, which implements the mapping from application service layer QoS to resource device layer QoS over the SLA negotiations between the users and providers in cloud computing market Finally, the utility function as management strategy was used to optimize resource scheduling.
-
Survey on Product Review Spam Detection
孙升芸,田萱. 产品垃圾评论检测研究综述[J]. 计算机科学, 2011, 38(Z10): 198-201.
SUN Sheng-yun ,TIAN Xuan. Survey on Product Review Spam Detection[J]. Computer Science, 2011, 38(Z10): 198-201. - SUN Sheng-yun ,TIAN Xuan
- Computer Science. 2011, 38 (Z10): 198-201.
- Abstract PDF(349KB) ( 736 )
- RelatedCitation | Metrics
-
It is common for ccommerce Web sites to enable their customers to write reviews of products that they have purchased. Unfortunately, reviewers may write some untruthful opinions in order to promote or damage specific products' reputation which called review spam. Product review spam detection makes an attempt to find untruthful opinions and remove them to restore the truthful for readers. The difference between product review spam and other spams was analyzed firstly. The related work of review spam detection was presented including review helpfulness and review sentiment analysis later; and then the data set and methods to detect spam were introduced and summarized. The trend of product review spam detection was concluded finally.
-
Research and Comparison of Virtual Storage Technology
付云生,王开云. 虚拟存储技术的研究与比较[J]. 计算机科学, 2011, 38(Z10): 202-203.
FU Yun-sheng ,WANG Kai-yun. Research and Comparison of Virtual Storage Technology[J]. Computer Science, 2011, 38(Z10): 202-203. - FU Yun-sheng ,WANG Kai-yun
- Computer Science. 2011, 38 (Z10): 202-203.
- Abstract PDF(266KB) ( 889 )
- RelatedCitation | Metrics
-
We introduced the conception and advantages of virtual storage technology, three implementation approaches of virtual storage were detailed which is called host based, storage device-based and network-based. According to the comparison and analysis of virtual storage described above, we gave the conclusion that users with different demands should choose the appropriate approach of virtual storage depending on the application scenario.
-
Handwritten Numeral Recognition Based on the Improved BP Neural Network
何松,戚建宇. 基于改进BP神经网络的手写体数字识别[J]. 计算机科学, 2011, 38(Z10): 204-205.
HE Song, QI Jian-yu. Handwritten Numeral Recognition Based on the Improved BP Neural Network[J]. Computer Science, 2011, 38(Z10): 204-205. - HE Song, QI Jian-yu
- Computer Science. 2011, 38 (Z10): 204-205.
- Abstract PDF(246KB) ( 654 )
- RelatedCitation | Metrics
-
The digital recognitions have extensive application in a lot of important fields. The artificial network was studied in the paper. The figure specimens were filtered through the process of unconstrained handwritten numeral, that it was recognized by the improved BP neural network. The result of experiment demonstrates that the method has very high noise immunity capacity and overcomes the limitation of traditional BP algorithm. The recognition rate and precision rate are greatly improved at the same time.
-
Towards Improving Process Mining Results Based on Invisible Tasks
薛岗,刘芳妤,周逸漩,叶小虎. 基于初始不可见任务的过程挖掘方法的改进[J]. 计算机科学, 2011, 38(Z10): 206-208.
XUE Gang,LIU Fang-yu, ZHOU Yi xuan, YE Xiao-hu. Towards Improving Process Mining Results Based on Invisible Tasks[J]. Computer Science, 2011, 38(Z10): 206-208. - XUE Gang,LIU Fang-yu, ZHOU Yi xuan, YE Xiao-hu
- Computer Science. 2011, 38 (Z10): 206-208.
- Abstract PDF(225KB) ( 452 )
- RelatedCitation | Metrics
-
Process mining is helpful for deploying new business processes as well as auditing, analyzing and improving the already enacted ones. I}he following text will solve the problem in dealing with invisible tasks,such tasks that exist in a process model but not in its event log. This is a problem since invisible tasks are mainly used for routing purpose but must not be ignored. Analyzed the features of strong-loop,weak-loop,jump and invisible tasks,on the basis of which a new algorithm was proposed. This algorithm can improve the efficiency of the mining of invisible tasks.
-
Mining Complex Structure Based on the Repetitive Task
叶小虎,刘芳妤,薛岗. 基于重复任务的复杂结构挖掘[J]. 计算机科学, 2011, 38(Z10): 209-211.
YE Xiao-hu,LIU Fang-yu, XUE Gang. Mining Complex Structure Based on the Repetitive Task[J]. Computer Science, 2011, 38(Z10): 209-211. - YE Xiao-hu,LIU Fang-yu, XUE Gang
- Computer Science. 2011, 38 (Z10): 209-211.
- Abstract PDF(310KB) ( 348 )
- RelatedCitation | Metrics
-
Process mining is helpful for deploying new business processes as well as auditing, analyzing and improving the already enacted ones. I}he namesake task and a repetitive task exist in the business process of system log of a large number. The existing alpha algorithm of the mining algorithm can distinguish them very well. It leads to the results of the process mining will often produce inaccurate flow model. In order to improve the accuracy of the process mining,it put forward an improved method. The new method not only can dig the complex structure,such as circulation structure,free choice structure and so on, but also can dig the eponymous task and repeat task in the log.
-
Point-to-Point Wireless Data Acquisition Based on CC1100
王俊荷,高飞,吴节林. 基于CC1100点对点无线数据采集[J]. 计算机科学, 2011, 38(Z10): 212-214.
WANG Jun-he,GAO Fei,WU Jie-lin. Point-to-Point Wireless Data Acquisition Based on CC1100[J]. Computer Science, 2011, 38(Z10): 212-214. - WANG Jun-he,GAO Fei,WU Jie-lin
- Computer Science. 2011, 38 (Z10): 212-214.
- Abstract PDF(243KB) ( 489 )
- RelatedCitation | Metrics
-
Wireless sensor network(WSN) feature is convenient distributing and fast networking. I}his paper gave a wireless data acquisition system in the simple hardware own-design that obeys wireless sensor network Zigbec protocol.And data transferring from sender node to receiver node was realized. Last the receiver node sended the results reading from the wireless channel to personal computer.
-
Comparison and Analysis of Modeling Language DSC and BPMN
周逸漩,朱炳宇,李松,夏寿民. 建模语言DSC和BPMN的对比分析[J]. 计算机科学, 2011, 38(Z10): 215-218.
ZHOU Yi-xuan, ZHU Bin-yu, LI Song,XIA Shou-min. Comparison and Analysis of Modeling Language DSC and BPMN[J]. Computer Science, 2011, 38(Z10): 215-218. - ZHOU Yi-xuan, ZHU Bin-yu, LI Song,XIA Shou-min
- Computer Science. 2011, 38 (Z10): 215-218.
- Abstract PDF(331KB) ( 768 )
- RelatedCitation | Metrics
-
Business process modeling is the most important part of Business Process Management, a good modeling language plays a crucial role in business process modeling and development Different characteristics of business process modeling languages are emerging, the research, analysis and comparison of modeling language become an important issue between process design and process realization. This paper introduced a new business process modeling language, DSC(Dynamic System Chart) , and conducted a comparison with BPMN which is the currently popular modeling language.
-
Research of Semantic Retrieval Model Based on Idiom Literary Quotation Ontology
杨雪松,冉婕. 基于成语典故本体的语义检索模型研究[J]. 计算机科学, 2011, 38(Z10): 219-221.
YANG Xuesong , RAN Jie. Research of Semantic Retrieval Model Based on Idiom Literary Quotation Ontology[J]. Computer Science, 2011, 38(Z10): 219-221. - YANG Xuesong , RAN Jie
- Computer Science. 2011, 38 (Z10): 219-221.
- Abstract PDF(266KB) ( 365 )
- RelatedCitation | Metrics
-
Abstract Aiming at the prohlem that the users often can not retrieve useful information or retrieve information is inaccurate, this paper presented an information retrieval model based on Idiom Literary quotation Ontology, and the model and its charactcristics were analyzed in detail. Through a systematic in-depth analysis of the users' questions, the qucstions mode and answers mode were proposed, it can improve the efficiency of semantic retrieval, improve the precision rate and recall rate to a certain extent.
-
Development and Application Research of Network File Management System Based on ASP. NET
杨扬,贾君君,李为卫. 基于ASP. NET的网络文件管理系统开发应用研究[J]. 计算机科学, 2011, 38(Z10): 222-224.
YANG Yang , JIA Jun-jun ,LI Wei-wei. Development and Application Research of Network File Management System Based on ASP. NET[J]. Computer Science, 2011, 38(Z10): 222-224. - YANG Yang , JIA Jun-jun ,LI Wei-wei
- Computer Science. 2011, 38 (Z10): 222-224.
- Abstract PDF(278KB) ( 350 )
- RelatedCitation | Metrics
-
The continuous developing of information technology leads to data and information content increasing rapid1y. How to manage enterprise and individual data, to protect the data assets safety and dependable, and how to transfer,save and get the data conveniently and quickly, these arc the real problems need to be dissolved in the current stage.Network storage technology has come to the stage of widespread application. Combining with the Fourth version of ASP. NET technology, the network file management system was developed and deployed successfully. After practical application, it shows that the system satisfies the requirement of data storage for enterprise and individual, and it gives a new kind of experience for data storage.
-
Overview of Cloud Services Delivery Networks
史佩昌,王怀民,史殿习,尹刚,丁博,王天佐. 云服务传递网络研究进展[J]. 计算机科学, 2011, 38(Z10): 225-229.
SHI Pei-chang,WANG Huai-min ,SHI Dian xi ,YIN Gang, DING Bo ,WANG Tian-zuo. Overview of Cloud Services Delivery Networks[J]. Computer Science, 2011, 38(Z10): 225-229. - SHI Pei-chang,WANG Huai-min ,SHI Dian xi ,YIN Gang, DING Bo ,WANG Tian-zuo
- Computer Science. 2011, 38 (Z10): 225-229.
- Abstract PDF(585KB) ( 558 )
- RelatedCitation | Metrics
-
Cloud Services Delivery Networks(CSDN) build a layer distributed server network on top of Internet and provide users with cloud delivery services using the way to the nearest and on-demand. With no-liner and rapid growth of Internet traffic and three characteristics referring to the Internet traffic including a large scale video traffic, mobile traffic and interactive traffic presented by itself, in order to provide efficient and reliable cloud delivery services,CSDN faces many new challenges. hhis paper first described and analyzed the background and new challenges of CSDN, on the basis presented a classification model of the existing technologies from three dimensions infrastructure layer, platform layer and service layer et al. And then a comprehensive overview of the latest technologies of CSDN research was given,including networking inside CSDN nodes, server placement, content naming, content management, request parsing and system management. Finally, future research trend of CSDN was pointed out, that is the new technology issues what CSDN much-needed breakthrough, including cooperation, mobility management and interactive support al et.
-
Model for Flexible Evolution of Composite Services Based on Conditional Pi Calculus
刘涛,曾国荪. 一种基于条件Pi演算的组合服务柔性演化模型[J]. 计算机科学, 2011, 38(Z10): 230-238.
LIU Tao ,ZENG Guo-sun. Model for Flexible Evolution of Composite Services Based on Conditional Pi Calculus[J]. Computer Science, 2011, 38(Z10): 230-238. - LIU Tao ,ZENG Guo-sun
- Computer Science. 2011, 38 (Z10): 230-238.
- Abstract PDF(676KB) ( 367 )
- RelatedCitation | Metrics
-
Composite services ought to be adaptable to changing environments and business rules. Existing service composition languages and execution engines lack variability and adaptability needed to cater for dynamic changes. In spite of many extensions,how to ensure the correctness for the dynamic adaptation of composite services remains a challenge.We proposed a mechanism for flexible evolution of composite services based on conditional Pi calculus. We extended classical Pi calculus through introducing the conditional control operator and the belonging operator, which suits the Event Condition-Action(ECA) pattern better. A method to describe composite service processes was proposed based on conditional Pi calculus and ECA. I}hrough scenario analysis of various composite service changes, eleven basic dynamic scenarios and corresponding flexible evolution patterns were proposed. Each pattern was formalized and analyzed to ensure the variability and adaptation correctness of composite services.
-
Consistency Model of Distributed Collaborative Learning Based Knowledge Point
王晓华,李天泽. 一种基于知识点结构的分布式协同学习一致性模型分析[J]. 计算机科学, 2011, 38(Z10): 239-241.
WANG Xiao-hua, LI Tian-ze. Consistency Model of Distributed Collaborative Learning Based Knowledge Point[J]. Computer Science, 2011, 38(Z10): 239-241. - WANG Xiao-hua, LI Tian-ze
- Computer Science. 2011, 38 (Z10): 239-241.
- Abstract PDF(359KB) ( 408 )
- RelatedCitation | Metrics
-
Modern distance education is based on the Internet and terminals with teaching activities, collaborative learning is an important way to improve the efficacy of distance learning, it is required that in-depth research of consistency maintenance, collaborative awareness and other key technologies based on collaborative learning semantic, so high effident, natural interaction and customized learning will be achieved. This paper analysised model and algorithm of collaborative learning consistency about the distance education. By this model, a specific algorithms based on knowledge point structure would be Build to maintain the consistency.
-
Analysis on Dynamic Behavior for Open-source Software Execution Network
张锡哲,罗实,印莹,张斌. 面向软件执行网络的行为拓扑分析研究[J]. 计算机科学, 2011, 38(Z10): 242-248.
ZHANG Xi-zhe, LUO Shi ,YIN Ying, ZHANG Bin. Analysis on Dynamic Behavior for Open-source Software Execution Network[J]. Computer Science, 2011, 38(Z10): 242-248. - ZHANG Xi-zhe, LUO Shi ,YIN Ying, ZHANG Bin
- Computer Science. 2011, 38 (Z10): 242-248.
- Abstract PDF(621KB) ( 474 )
- RelatedCitation | Metrics
-
With the development and increasingly mature of Internet and software technology, software system is facing with the characteristic of uncertain using pattern and complex dynamic interaction behavior. This paper analysised the topological measure characteristics in software execution network based on the complex network. Take three typical open-source software running in Linux as an example, first the software execution log and according to the calls relationship of methods the execution network were established, and then typical topological metrics like connectivity, network diameter and density, average path length, degree distributions, degree correlations, clustering coefficient, between- ness centrality and closeness were analyzed in the software execution network, also make comparison with software structural network based on static code association. The results show that execution behavior have dynamic changes and restructuring phenomenon in the software execution process, compared with the structural network the topological characteristics in the execution network have many difference, the average path length becomes smaller in the perform network,the small-world character tends to disappear. Explore software execution behavior rules has important guiding significance for the software maintenance management and quality assurance.
-
Visualization of Internet Macroscopic Topology Structure
张君,赵海,杨波. Internet宏观拓扑结构的可视化[J]. 计算机科学, 2011, 38(Z10): 249-252.
ZHANG Jun ,ZHAO Hai , YANG Bo. Visualization of Internet Macroscopic Topology Structure[J]. Computer Science, 2011, 38(Z10): 249-252. - ZHANG Jun ,ZHAO Hai , YANG Bo
- Computer Science. 2011, 38 (Z10): 249-252.
- Abstract PDF(386KB) ( 892 )
- RelatedCitation | Metrics
-
Aiming at the complexity of Internet macroscopic topology structure, we studied the visualization of Internet topology structure at AS level. We designed the algorithms on visualization of Internet topology using several popular strategies of distribution notes. The results showed that these strategies could not exhibit the structural features of Internet topology, and did not apply to the visualization of Internet. So we designed a new algorithm, which is the strategy of center-level distribution nodes. The results showed that the strategy well illustrated the power-low feature and hierarchical feature of Internet topology. It provides a powerful means for directly observing on Internet microscopic topology structure.
-
Research of Three-Queue Scheduling Algorithms Based on Priority
顾宇,周良,丁秋林. 基于优先级的Three-Queue调度算法研究[J]. 计算机科学, 2011, 38(Z10): 253-256.
GU Yu ,ZHOU Liang , DING Qiu-lin. Research of Three-Queue Scheduling Algorithms Based on Priority[J]. Computer Science, 2011, 38(Z10): 253-256. - GU Yu ,ZHOU Liang , DING Qiu-lin
- Computer Science. 2011, 38 (Z10): 253-256.
- Abstract PDF(347KB) ( 734 )
- RelatedCitation | Metrics
-
For solving the shortage of scheduling algorithms on the Hadoop platform, the paper proposed an improved scheduling algorithm-TriplcQueuc algorithm. After taking full account of data locality, the Triple-Qucue algorithm designs a improved computational model of priority, which can distinguish the user's job levels clearly and ensure a certain degree of fairness so as to reduce the job execution time and avoid wasting system resources. The results of experiment show that the algorithm improves the efficiency significantly and solves the problem of data locality better with the increased amount of data.
-
Benefits of Network Coding for Live Streaming Multicast over Wireless Channel
韩莉,钱焕延. 网络编码用于无线网络流媒体多播的优势分析[J]. 计算机科学, 2011, 38(Z10): 257-259.
HAN Li, QIAN Huan-yang. Benefits of Network Coding for Live Streaming Multicast over Wireless Channel[J]. Computer Science, 2011, 38(Z10): 257-259. - HAN Li, QIAN Huan-yang
- Computer Science. 2011, 38 (Z10): 257-259.
- Abstract PDF(358KB) ( 438 )
- RelatedCitation | Metrics
-
For wireless channel is inherently lossy, it is challengeable to maintain the quality of service(QOS) for live streaming. We proposed a well-designed light weighted negative-ACKnowledgment(NACK) oriented reliable multicast protocol, which combines the NGbased repair in its design. NORM repair process uses time slot as the base mechanism,which results in long repair cycle. In our protocol,fecdback round algorithm is applied to optimize the repair processing.Benefits of network coding for live streaming multicast over wireless channel was also analyzed in this paper. Experiment results show that the payload throughput of our protocol is about 0. 5 times greater than that of NORM.
-
Web Service-based Embedded BSP Remote Testing Framework
迟剑,白晓颖,万国良,胡林平. 一种基于Web服务的嵌入式系统BSP远程测试框架[J]. 计算机科学, 2011, 38(Z10): 260-264.
CHI Jian,,BAI Xiao-ying, WAN Guo-liang, HU Lin-ping. Web Service-based Embedded BSP Remote Testing Framework[J]. Computer Science, 2011, 38(Z10): 260-264. - CHI Jian,,BAI Xiao-ying, WAN Guo-liang, HU Lin-ping
- Computer Science. 2011, 38 (Z10): 260-264.
- Abstract PDF(458KB) ( 487 )
- RelatedCitation | Metrics
-
In the embedded I3SP test process, supposing we establish all test environments for each product and their development team, the testing cost is very expensive. Using the remote testing method can reduce testing cost, shared test environment, effectively reuse test cases. Web service is an object deployed in the Web on, it is based on XML, open standard technology on the Web, and has platform independence, interopcrability, functional characteristics of reuse and secure communications. In the paper a framework for embedded system BSP remote test coverage which embedded 13SP test in the entire process was presented, and the framework is divided into test center and test portal. Using SOAP and RESh, two styles of Web services, the user can access the BSP remote test through a unified Web interface.
-
One Variety Conjectures of Modified Bubble Sort Network
师海忠,马继勇,牛攀峰,侯菲菲. 关于修正冒泡排序网络的一簇猜想[J]. 计算机科学, 2011, 38(Z10): 265-267.
SHI Hai-zhong, MA Ji-yong, NIU Pan-feng, HOU Fei-fei. One Variety Conjectures of Modified Bubble Sort Network[J]. Computer Science, 2011, 38(Z10): 265-267. - SHI Hai-zhong, MA Ji-yong, NIU Pan-feng, HOU Fei-fei
- Computer Science. 2011, 38 (Z10): 265-267.
- Abstract PDF(291KB) ( 401 )
- RelatedCitation | Metrics
-
Modified bubble sort networks arc important cayley graphs model in networks design. One variety conjectures of modified bubble sort networks were proposed as follows : for any integer n>=3 , modified bubble sort networks Y are a union of i edgcdisjoint hamiltonian cycles and n一2i perfect matchings of Y,and 1<=i.We proved the conjec到lures are true for i=1,2.
-
Research on Dynamic Task Allocation for MAS Based on Hybrid Genetic and Ant Colony Algorithm
张晋,曹耀钦. 基于混合遗传蚁群算法的多Agent动态任务分配研究[J]. 计算机科学, 2011, 38(Z10): 268-270.
ZHANG Jin, LAO Yao-qin. Research on Dynamic Task Allocation for MAS Based on Hybrid Genetic and Ant Colony Algorithm[J]. Computer Science, 2011, 38(Z10): 268-270. - ZHANG Jin, LAO Yao-qin
- Computer Science. 2011, 38 (Z10): 268-270.
- Abstract PDF(244KB) ( 661 )
- RelatedCitation | Metrics
-
In multi agent systems(MAS),because of the complexity and the difference between respective agents, the dynamic task allocation for multi agent systems is a NP-hard combinatorial optimization problem. According to the dy- namic characteristic of task allocation, first this paper established the mathematical model of task allocation and the target function. And then the hybrid genetic and ant colony algorithm which possesses the trait such as rapid iteration,poshive reaction and distribution, was put forward to achieve combinatorial optimization of task allocation. Finally, the simulation experiments demonstrated that, the algorithm is accomplished in convergence efficiency and solution precision can significantly enhance the performance of MAS.
-
Research and Performance Analysis of Reliable Transport Protocol ACK Mechanism over Satellite Networks
王金苗,许鹏文. 卫星网络可靠传输协议ACK机制研究与性能分析[J]. 计算机科学, 2011, 38(Z10): 271-272.
WANG Jin-miao, XU Peng-wen. Research and Performance Analysis of Reliable Transport Protocol ACK Mechanism over Satellite Networks[J]. Computer Science, 2011, 38(Z10): 271-272. - WANG Jin-miao, XU Peng-wen
- Computer Science. 2011, 38 (Z10): 271-272.
- Abstract PDF(252KB) ( 654 )
- RelatedCitation | Metrics
-
Based on near-earth orbit satellite network, analyzed the existing reliable transport protocol ACK mechanism for space communications. Studied on the SOPS-TP SNACK mechanism, spatial information to improve transport to SCPS-TP SNACK mechanism, did the simulation experiments and performance comparison analysis for several typical TCP extensions protocol.
-
Performance Analysis of AODV Routing Based on Different Mac Access Mechanism
翟建华,张玉芳,熊忠阳. 不同Mac接入机制的AODV路由协议性能分析[J]. 计算机科学, 2011, 38(Z10): 273-275.
GHAI Jian-hua, GHANG Yu-fang, XIONG Zhong-yang. Performance Analysis of AODV Routing Based on Different Mac Access Mechanism[J]. Computer Science, 2011, 38(Z10): 273-275. - GHAI Jian-hua, GHANG Yu-fang, XIONG Zhong-yang
- Computer Science. 2011, 38 (Z10): 273-275.
- Abstract PDF(243KB) ( 485 )
- RelatedCitation | Metrics
-
In order to improve the comprehensive performance of network, this paper fully consided the influence factor at the data link layer and network layer, compared and analysed of switching methods in the different Mac access protocol, selected an appropriate routing and access protocol for Ad Hoc. Simulating the scene based on Mac layer of 802. lla and 802. 11Ext routing in NS-2,the paper fully analyzed and summarized AODV protocol performance about normalized routing load and route discovery frequency and end-to-end average delay and packet delivery ratio. The results show that 802. 11Ext has many obvious advantages, it is more stable and suitable for mobile network.
-
Research on Improving the Performance of TCP for Heterogeneous Networks
韩涛,黄友锐,曲立国,史明. 适用于异构网络的改进TCP协议研究[J]. 计算机科学, 2011, 38(Z10): 279-281.
HAN Tao, HUANG You-rui, QU Li-guo , SHI Ming. Research on Improving the Performance of TCP for Heterogeneous Networks[J]. Computer Science, 2011, 38(Z10): 279-281. - HAN Tao, HUANG You-rui, QU Li-guo , SHI Ming
- Computer Science. 2011, 38 (Z10): 279-281.
- Abstract PDF(244KB) ( 604 )
- RelatedCitation | Metrics
-
In wired network, the packet loss is caused by network congestion. TC;P protocol was designed for wired network. But it isn't adapted to the wired-wireless networks anymore because packet loss is mainly caused by link errors in wireless networks. So it proposed a new protocol (named TCP-Ackflag) based on TC;P. It judges network congestion according to trend of relative time delay in receiver. Then the receiver sends an ACK with network congestion flag bit(NCF) to the sender. For the maximum throughput, the sender checks the NCF in ACK which is received recently when it has found the packet loss. It will deal with network congestion or fast retransmit according to network congestion flag bit in ACK. The simulation results show the accuracy and sensitivity in this programs on the network congestion to determine arc greatly improved, and on this basis to ensure the network transmission performance.
-
Code-shifted Reference UWB Transceiver and its Performance Analysis in WSN Environment
许志猛,钱慧,余轮. 码移参考超宽带收发机及其在WSN环境中的性能分析[J]. 计算机科学, 2011, 38(Z10): 282-285.
XU Ghi-meng QIAN Hui , YU Lun. Code-shifted Reference UWB Transceiver and its Performance Analysis in WSN Environment[J]. Computer Science, 2011, 38(Z10): 282-285. - XU Ghi-meng QIAN Hui , YU Lun
- Computer Science. 2011, 38 (Z10): 282-285.
- Abstract PDF(329KB) ( 368 )
- RelatedCitation | Metrics
-
A novel ultra-widcbandCUW13) transceiver based on codcshifted reference(CSR) was introduced. By modeling and simulation on MATLAI3, the bit error performance sensor network environment It shows that the CSR receiver of the system was analyzed and compared under wireless is more rohust to narrowhand interference than the conventional transmitted reference( I}R) receiver and with a lower complexity. Moreover, simulation the shorter results reveal the relation between the shifting used, the better N13I codes and the NI3I mitigation capacity of CSR-UWI3 receiver or the more random mitigation capacity will be achieve, which provides guidelines for optimization shifting codes code and improving performance for CSR transceiver.
-
Network Congestion Control Based on Qualitative Dynamic Probabilistic Networks
钱民,唐克生. 基于定性动态概率网络的网络拥塞控制[J]. 计算机科学, 2011, 38(Z10): 286-287.
QIAN Min, TANG Ke-sheng. Network Congestion Control Based on Qualitative Dynamic Probabilistic Networks[J]. Computer Science, 2011, 38(Z10): 286-287. - QIAN Min, TANG Ke-sheng
- Computer Science. 2011, 38 (Z10): 286-287.
- Abstract PDF(255KB) ( 495 )
- RelatedCitation | Metrics
-
Network congestion has become a widespread concern. At present, research based on network congestion control has present some specific methods and suggestions, but they arc not able to solve the network congestion well.Qualitative Dynamic Probabilistic Networks(QDPNs) are one of the most efficient models in the uncertain knowledge and dynamically reasoning field. This paper presented a network congestion control method based on QDPNs. This method can effectively predict network congestion, and then we can get the corresponding congestion control strategy according to the prediction before.
-
Research on the Technology of Middleware of Distribution Spectrum Monitoring System
姜美雷,丁丽丽,柏永斌,郭永康,孔祥源. 分布式频谱监测系统中间件技术研究[J]. 计算机科学, 2011, 38(Z10): 288-292.
JIANG Mei-lei, DING Li-li, BAI Yong-bing, GUO Yong-kang, KONG Xiang-yuan. Research on the Technology of Middleware of Distribution Spectrum Monitoring System[J]. Computer Science, 2011, 38(Z10): 288-292. - JIANG Mei-lei, DING Li-li, BAI Yong-bing, GUO Yong-kang, KONG Xiang-yuan
- Computer Science. 2011, 38 (Z10): 288-292.
- Abstract PDF(410KB) ( 484 )
- RelatedCitation | Metrics
-
In allusion to the question that electromagnetic environment has become more and more complicated, the related technologies of the spectrum of existing monitoring systems was in depth studied, and its own characteristics was analyzed, and on this basis, the reasons of using a distributed spectrum monitoring system was discussed. Secondly, for the demand of the issue, this paper put forward a design concept of distributed spectrum monitoring system which is based on middleware, using the middleware to achieve the distribution of tasks and transmission of the results when coping with multiple testing tasks. Finally, designed and implemented the middleware, and the reliability and perform- ancc of middlcwarc were tested.
-
Application of Multiple Description Coding and Network Coding in Wireless Sensor Network
李曼,刘芳妤,路劲,周维. 多描述编码与网络编码在无线传感器网络中的应用[J]. 计算机科学, 2011, 38(Z10): 293-295.
LI Man, LIU Fang-yu , LU Jing, ZHOU Wci. Application of Multiple Description Coding and Network Coding in Wireless Sensor Network[J]. Computer Science, 2011, 38(Z10): 293-295. - LI Man, LIU Fang-yu , LU Jing, ZHOU Wci
- Computer Science. 2011, 38 (Z10): 293-295.
- Abstract PDF(259KB) ( 483 )
- RelatedCitation | Metrics
-
Multiple description coding can prevent the loss of the image data and the dependence of the single share data effectivcly,which can ensure the quality of the images received by the terminal nodes. Network coding can improve the network bandwidth utilization rate effectively. In order to adapt to the reliable transmission and save the bandwidth of the wireless sensor network, this paper proposed the ideology of combining multiple description coding with network coding, which takes multiple paths transmission as a foundation.
-
Internet Traffic Prediction Based on Wavelet Neural Network
黄伟,何哗,夏晖. 基于小波神经网络的IP网络流量预测[J]. 计算机科学, 2011, 38(Z10): 296-298.
HUANU Wei , HE Ye, XIA Hui. Internet Traffic Prediction Based on Wavelet Neural Network[J]. Computer Science, 2011, 38(Z10): 296-298. - HUANU Wei , HE Ye, XIA Hui
- Computer Science. 2011, 38 (Z10): 296-298.
- Abstract PDF(321KB) ( 916 )
- RelatedCitation | Metrics
-
The time series of network traffic data is modeled and forecasted based on wavclet neural network. According to the situation that the network prediction based on BP neural network is not well exact, the wavelet theory was introduced into BP neural network. On the basis of wavelet theory in reference multi solution analysis techniques to improve the model based on BP neural network, the IP network traffic forecasting model based on wavelet neural network was built. We used wavclet multi-solution analysis techniques to decompose the traffic signal and then employed the decomposed component sectuences to train the I3P neural network. The results of the experiment prove that the wavelet neural network is superior to the BP neural netw ork method in prediction performance. And wavclet neural network is the suitable and effective method for forecasting Internet traffic.
-
High Data Rate Wireless Industrial Networks Test-bed for TDMA MAC Development: Design and Experimentation
林俊如,曾鹏,于海斌. 面向高速工业无线网络的TDMA MAC协议设计与实现[J]. 计算机科学, 2011, 38(Z10): 299-304.
LIN Jun-ru, ZENU Peng, YU Hai-bin. High Data Rate Wireless Industrial Networks Test-bed for TDMA MAC Development: Design and Experimentation[J]. Computer Science, 2011, 38(Z10): 299-304. - LIN Jun-ru, ZENU Peng, YU Hai-bin
- Computer Science. 2011, 38 (Z10): 299-304.
- Abstract PDF(631KB) ( 1096 )
- RelatedCitation | Metrics
-
With the development of wireless technology, using wireless technology in industrial environment becomes more and more popular, meanwhile researchers pay more attention to TD MA mechanism due to its capability to avoid collision which makes wireless communication behavior much more determinate, but most current researches arc limited to simulations and experimental studies are rare. To bridge this gap, we developed and implemented a high data rate wireless networks testbed based on I}DMA mechanism and commodity IEEE 802. 11 hardware, the test bed can be used for filed level industrial wireless technology's development and experiment, and experimental evaluation shows the test bed can support TDMA applications that rectuire time slot schedule in millisecond.
-
Convex Region Fault-tolerance Based Topology Control Algorithm
孙若姿,袁坚,山秀明,任勇. 基于凸区域容错性的拓扑控制算法[J]. 计算机科学, 2011, 38(Z10): 305-307.
SUN Ruo-zi, YUAN Jian , SHAN Xiu-ming, REN Yong. Convex Region Fault-tolerance Based Topology Control Algorithm[J]. Computer Science, 2011, 38(Z10): 305-307. - SUN Ruo-zi, YUAN Jian , SHAN Xiu-ming, REN Yong
- Computer Science. 2011, 38 (Z10): 305-307.
- Abstract PDF(236KB) ( 376 )
- RelatedCitation | Metrics
-
At present, most studies utilize connectivity to evaluate fault tolerance of wireless networks. As a metric of fault tolerance, connectivity fails to consider spatial relativity of failed nodes and assumes that any node group can fail simultaneously. In fact, the faults generally have strong spatial correlativity in wireless networks. It is particularly true in military application that the nodes located in the same limited area will fail simultaneously such as due to the damage of an enemy bomb. Therefore, connectivity hardly satisfies the fault tolerant design requirements for wireless networks.To capture the feature of the spatial correlations of faults, the notion of convex region fault tolerance was introduced and based on it,a fault-tolerant topology control algorithm named as convex region fault tolerant algorithm(C-RFT) was proposed. It is proved theoretically that GRI门can preserve the convex region fault tolerance of the original graph and simulation results demonstrate that the topology generated by C-RI门' has lower logical degree and transmission rathus compared with original graph.
-
Utility-based Resource Management Strategy in Wireless Data Network
吴一多,陈晓光. 基于效用函数的无线数据网络资源管理策略[J]. 计算机科学, 2011, 38(Z10): 308-311.
WU Yi-duo CHEN Xiao-guang. Utility-based Resource Management Strategy in Wireless Data Network[J]. Computer Science, 2011, 38(Z10): 308-311. - WU Yi-duo CHEN Xiao-guang
- Computer Science. 2011, 38 (Z10): 308-311.
- Abstract PDF(337KB) ( 393 )
- RelatedCitation | Metrics
-
A utility-based resource management strategy in wireless data network was proposed in this paper. The strutegy achieves a balance between throughput and rate oscillation of data service and takes into account the impact of both rate and power on the system performance. Numerical results show a low oscillation of rate and an efficient improvement of the system performance in poor channel condition.
-
Research on Path Capacity Estimation for IPv6 Networks
唐军,裴昌幸,苏博. IPv6网络路径容量测量方法研究[J]. 计算机科学, 2011, 38(Z10): 312-314.
TANG Jun , PEI Chang-xing ,SU B0. Research on Path Capacity Estimation for IPv6 Networks[J]. Computer Science, 2011, 38(Z10): 312-314. - TANG Jun , PEI Chang-xing ,SU B0
- Computer Science. 2011, 38 (Z10): 312-314.
- Abstract PDF(339KB) ( 442 )
- RelatedCitation | Metrics
-
Packet dispersion technique is one of the useful path capacity estimation methodology and usually employs continuous sending policy to send probing packets. 13ut the accuracy of measurement is affected by the lower utilization of transmission rate at the sender. Based on fragmentation mechanism, a novel scheme of path capacity estimation for IPv6 networks was proposed. An original probing packet with its size larger than Path Maximum Transfer Unit is generated at the sender, and then be split into a serial of equal-sized fragments by the protocol stack. It is shown by extensive experimental results that the proposed scheme can lead to lower dispersion of the probing packets at the sender and a greater capability against the cross traffic, compared with the classical tool called pathrate.
-
Performance Evaluation of Information Dissemination Protocol in WSNs Based on RS Erasure Codes
杜军朝,刘惠,李晓军,张荧俊,张云扬. 基于RS纠删码的无线传感器网络信息分发协议性能评价[J]. 计算机科学, 2011, 38(Z10): 315-318.
DU Jun-zhao , LIU Hui , LI Xiao-jun , ZHANG Ying-jun , ZHANG Yun-yang. Performance Evaluation of Information Dissemination Protocol in WSNs Based on RS Erasure Codes[J]. Computer Science, 2011, 38(Z10): 315-318. - DU Jun-zhao , LIU Hui , LI Xiao-jun , ZHANG Ying-jun , ZHANG Yun-yang
- Computer Science. 2011, 38 (Z10): 315-318.
- Abstract PDF(408KB) ( 578 )
- RelatedCitation | Metrics
-
In wireless sensor networks(WSNs) , the energy supply, storage capacity and computation power of sensor node are constrained. Furthermore, the irregular link and variable topology are common. Hence, it is difficult to design and implement a reliable and energy efficient network protocol. Well-designed network protocol can not only reduce network load, but also help to save energy of sensor nodes, therefore prolonging the network life. In this paper, an informalion dissemination protocol based on RS erasure codes was proposed and implemented in TinyOS platform, which is a widely used operating system in WSNs. We analyzed the performance of the protocol in theory for single hop case, and we also made a performance comparison with flood information dissemination protocol in the I}OSSIM. I}he simulation results show that the proposed information dissemination protocol based on RS erasure codes obviously reduces the number of packets to transmit, improves the packet delivery ratio, and saves network energy consumption.
-
Research on Data Gathering Protocols for Vehicle Sensor Networks
余玲飞,宋超,王晓敏,龚海刚,佘堑. 车载传感器网络的研究进展[J]. 计算机科学, 2011, 38(Z10): 319-322.
YU Ling-fei, SONG Chao , WANG Xiao-min , GONG Hai-gang , SHE Kun. Research on Data Gathering Protocols for Vehicle Sensor Networks[J]. Computer Science, 2011, 38(Z10): 319-322. - YU Ling-fei, SONG Chao , WANG Xiao-min , GONG Hai-gang , SHE Kun
- Computer Science. 2011, 38 (Z10): 319-322.
- Abstract PDF(396KB) ( 597 )
- RelatedCitation | Metrics
-
Vehicle Sensor Networks( VSNS) compose of many vehicles equipped with different types of sensors, which are data centric mobile sensor networks. Compared with traditional wireless sensor networks, the nodes of VSNS move rapidly, leading to intermittent connectivity and frequent topology change, so that data transmissions in VSNS depend on opportunistic transmissions among nodes,which degrades the performance of data delivery. The state of the arts of the research on vehicle sensor networks was discussed. Introduced with the idea of delay tolerant networks and opportunistic networks into VSNs, the hot research issues on vehicle sensor networks were presented.
-
Transplantation of Embedded Operating System Tinyos for Wireless Sensor Network Nodes
程龙,杨波. 无线传感器网络操作系统TinyOS的移植[J]. 计算机科学, 2011, 38(Z10): 323-325.
CHENG Long , YANG Bo. Transplantation of Embedded Operating System Tinyos for Wireless Sensor Network Nodes[J]. Computer Science, 2011, 38(Z10): 323-325. - CHENG Long , YANG Bo
- Computer Science. 2011, 38 (Z10): 323-325.
- Abstract PDF(275KB) ( 644 )
- RelatedCitation | Metrics
-
The TinyOS system has received much attention as a wireless sensor network operation system for its syntactic model, event driven architecture and easy programming environment, And the CC2430 chip is widely used for wireless sensor network nodes with high performance, low price and low power cos>n But the CC2430 chip is not supported by hinyOS system. After an analysis of tinyOS principle, the programming language NesC and its compiling process,the transplantation was performed including porting NesC and CC2430’s components like Timer, Uart, ADC etc, and its application was tested. The test result shows that the TinyOS system can run on the CC2430 chip, the components work well,and the transplantation is successful. Based on the transplantation, two extended applications were proposed and realized including an improved priority-based scheduling mechanism and the formation of star network.
-
Novel Architecture Network for Cognitive Radio
唐龙,伍爵博. 一种新型的认知无线电网络架构[J]. 计算机科学, 2011, 38(Z10): 326-330.
PANG Long, WU Jue-bo. Novel Architecture Network for Cognitive Radio[J]. Computer Science, 2011, 38(Z10): 326-330. - PANG Long, WU Jue-bo
- Computer Science. 2011, 38 (Z10): 326-330.
- Abstract PDF(512KB) ( 438 )
- RelatedCitation | Metrics
-
Due to the growing bandwidth, business and the existing fixed frequency management mode, the wireless network is facing great challenges that the network resources are becoming more and more shortage. The dynamic changes of heterogeneous network environment causes more conflicts between resource shortage and business needs, so it seriously restricts the deployment and operation of wireless network in the present and future. I'o solve the above problem,this paper made a detailed discussion and analysis to the existing protocols of wireless network, and it summarized the characteristics and existing problems including the cognitive function of IEEE 802. 22,IEEE 1900. 4 and ETSI RRS. It proposed a novel architecture for cognitive wireless network based on the cognitive theory and method of wireless network. This model contains system frequency management, network planning management, heavy configuration management, wireless resource management, cognitive ring processing and cognitie information load mode etc. According to this architecture, it will be better to coordinate and support network learning, reasoning, forecasting, fusion, decision-making and reconfiguration.
-
Reputation-based Evaluation Model for P2P
黄骏虎,虞慧群. 一种基于信誉的P2P的评价模型[J]. 计算机科学, 2011, 38(Z10): 331-335.
HUANG Jun-hu , YU Hui-qun. Reputation-based Evaluation Model for P2P[J]. Computer Science, 2011, 38(Z10): 331-335. - HUANG Jun-hu , YU Hui-qun
- Computer Science. 2011, 38 (Z10): 331-335.
- Abstract PDF(374KB) ( 451 )
- RelatedCitation | Metrics
-
With the development of the P2P(Peer to Peer) technology, it's important to judge the reliability of the request peer. One reputation-based evaluation model for P2P is introduced to calculate the reputation value of each peer while the process of P2P and judge whether the request peer is reliable. "hhe model combines the past experience with other's suggestions. Through the experiments, it is proved that the model not only is able to protect normal peers from malicious peers, but also improves the ability to resist the attack from groups of the malicious peers.
-
Research of the Mixed Softswitching Based on SIP and H.248 Protocol
代孝东,陈文星. 基于SIP和H.248协议的混合软交换技术的研究[J]. 计算机科学, 2011, 38(Z10): 336-337.
DAI Xiao-dong , CHEN Wen-xing. Research of the Mixed Softswitching Based on SIP and H.248 Protocol[J]. Computer Science, 2011, 38(Z10): 336-337. - DAI Xiao-dong , CHEN Wen-xing
- Computer Science. 2011, 38 (Z10): 336-337.
- Abstract PDF(269KB) ( 1239 )
- RelatedCitation | Metrics
-
In the background of rapid development of the softswitching,according to the traditional network reconstruclion brings the huge cost investment,the paper put forward the Networking model of the mixed softswitching based on SIP and H.248protocol,then made planning of the transformation of China's existing network.
-
Ethernet Priority-based Flow Control Simulation Design
龚夏青,窦军. 以太网基于优先级的流控仿真设计[J]. 计算机科学, 2011, 38(Z10): 338-340.
GONG Xia-qing,DOU Jun. Ethernet Priority-based Flow Control Simulation Design[J]. Computer Science, 2011, 38(Z10): 338-340. - GONG Xia-qing,DOU Jun
- Computer Science. 2011, 38 (Z10): 338-340.
- Abstract PDF(326KB) ( 401 )
- RelatedCitation | Metrics
-
With the rapid development of the Internet, there are a series of problems in the normal operation of the network systems, and the most prominent problem is network congestion caused by the overload traffic. hhe author studied a variety of flow control methods, and by the way of priority-based dueuing scheduling, the author used the OPNET network simulation software to simulate the three kinds of designed flow control mechanisms, finally solved the problems of the higher priority data flow not getting a timely response and the fairness issues in Ethernet.
-
Delay Analysis and Simulation Design of High-speed Ethernet
杨佳丽,窦军. 高速以太网时延仿真分析[J]. 计算机科学, 2011, 38(Z10): 341-344.
YANG Jia-li , DOU Jun. Delay Analysis and Simulation Design of High-speed Ethernet[J]. Computer Science, 2011, 38(Z10): 341-344. - YANG Jia-li , DOU Jun
- Computer Science. 2011, 38 (Z10): 341-344.
- Abstract PDF(383KB) ( 759 )
- RelatedCitation | Metrics
-
With the rapid development of the Ethernet technologies, Ethernet has become one of the core technologies in future communication domain. And user experience may be affected by QoS parameters of services typically include delay,jitter,packet loss rate and so on. For real-time audio and video services, end-to-end delay of data is most critical.Based on the exist Ethernet standards,summarized the main factors of end-to-end delay,and theoretical analysis of different delayes on the proportion of totoal delay. Finally carried out a simulation model designed to lOG/40G/1006 Ethernet, which proves the design is feasible and correct.
-
Research of Path Planning with Mobile Anchor in WSN Localization
党小超 ,李小艳. WSN节点定位中移动信标路径规划的研究[J]. 计算机科学, 2011, 38(Z10): 345-349.
DANG Xiao-chao, LI Xiao-yan. Research of Path Planning with Mobile Anchor in WSN Localization[J]. Computer Science, 2011, 38(Z10): 345-349. - DANG Xiao-chao, LI Xiao-yan
- Computer Science. 2011, 38 (Z10): 345-349.
- Abstract PDF(370KB) ( 360 )
- RelatedCitation | Metrics
-
The mobile anchor localization is more practical method in wireless sensor network node localization, it need to consider the problem about moving path, if plan the effective and reasonable path, it can obtain higher location accuracy. Take the sensor nodes as figure vertexs, then use the thoughts of TSP and ant colony algorithm to search for an optimal path. hhrough the theoretical analysis and simulations show that formed paths can cover the entire network and adap to the random distribution node localization in wireless sensor network.
-
Study on Segmented Address Allocation Algorithm
周威,田勇,赵焕新,熊辉. 分段式地址分配算法研究[J]. 计算机科学, 2011, 38(Z10): 350-352.
ZHOU Wei, TIAN Yong , ZHAO Huan-xin , XIONG Hui. Study on Segmented Address Allocation Algorithm[J]. Computer Science, 2011, 38(Z10): 350-352. - ZHOU Wei, TIAN Yong , ZHAO Huan-xin , XIONG Hui
- Computer Science. 2011, 38 (Z10): 350-352.
- Abstract PDF(246KB) ( 378 )
- RelatedCitation | Metrics
-
The address allocation mechanism is presented in each network, which is the basis for communication and data transmission. This paper presented an address allocation method with segmented model and analyzes its principles,while introduced the tree routing algorithm based on the distribution of this address.
-
Wireless Organization Network
刘行兵,郑雪峰. 无线有组织网络[J]. 计算机科学, 2011, 38(Z10): 353-355.
LIU Xing-bing, ZHENG Xue-feng. Wireless Organization Network[J]. Computer Science, 2011, 38(Z10): 353-355. - LIU Xing-bing, ZHENG Xue-feng
- Computer Science. 2011, 38 (Z10): 353-355.
- Abstract PDF(272KB) ( 382 )
- RelatedCitation | Metrics
-
The wireless organization network is the nature of the relation between the network nodes of the infrastructureless wireless network. Besides having characteristics of the infrastructurcless wireless networks, the network has center node, and the position of between nodes arc relatively fixed. hhis special network application temporary communications in the field rescue and military activities. The first reviews structure and characteristics of the intercom system, packet radio networks, mobile ad hoc networks, they don't include the wireless organization networks characteristics. Defined the wireless organization networks related model, analyzed the characteristics and the key of the wireless organization network.
-
Dynamic Job Scheduling Model of Mobile Sensor Sink in Wireless Sensor
卓翠敏,李鲁群. 面向DTN无线传感网移动节点的动态资源调度模型的研究[J]. 计算机科学, 2011, 38(Z10): 356-358.
ZHUO Cui-min LI Lu-qun. Dynamic Job Scheduling Model of Mobile Sensor Sink in Wireless Sensor[J]. Computer Science, 2011, 38(Z10): 356-358. - ZHUO Cui-min LI Lu-qun
- Computer Science. 2011, 38 (Z10): 356-358.
- Abstract PDF(297KB) ( 354 )
- RelatedCitation | Metrics
-
ob scheduling system is the core of data mule and challenging problem in wireless sensor network. How to improve the efficiency of resource and the maximum profit are the ultimate goal of service providers. In at first, by establishing the preemptive priority queuing modle of G/G/l,to meet the QoS of the transmit data at different levels,the linear piecewise functions are used to make the system cost minimum. Furthermore, based on the cost function and profit function of queuing system, to get dynamic allocation rate, and to get the corresponding value which service users and service providers are satisfied with. The results show that, the dynamic resource scheduling system, not only can ensure the different data's QoS requirements, but also can provide the maximize profits for the wireless sensor network service providers.
-
D7S-LEACH : A Dynamic Cluster Based 7.one-spanned Secure Multi-hop Routing Protocol in WSNs
缪成蓓,白光伟,顾跃跃. DZS-LEACH:一种动态的WSN层簇式跨区安全多跳路由协议[J]. 计算机科学, 2011, 38(Z10): 359-363.
MIAO Cheng-beil ,BAI Guang-wei,GU Yue-yue. D7S-LEACH : A Dynamic Cluster Based 7.one-spanned Secure Multi-hop Routing Protocol in WSNs[J]. Computer Science, 2011, 38(Z10): 359-363. - MIAO Cheng-beil ,BAI Guang-wei,GU Yue-yue
- Computer Science. 2011, 38 (Z10): 359-363.
- Abstract PDF(502KB) ( 360 )
- RelatedCitation | Metrics
-
This paper focused on the performance enhancement of the typical LEACH protocol in security and energy efficiency in wireless sensor networks. Considering security threats faced by the existing LEACH protocol, we proposed a novel dynamic hierarchical cluster-based zoncspanned secure multi-hop routing protocol, so called DZS-LEACH. The main idea is to introduce a dynamic key management scheme in the multi-hop routing protocol to provide communication protection. The DZS-LEACH enables, on the one hand, the scalability of routing mechanism and adaptation to the dy- namic network topology, on the other hand, balances energy consumption by means of partition autonomy and avoids long-distance communication between sensor nodes and sink node. Our simulation experiments demonstrate that theproposed DZS-LEACH may enhance defense ability and reduce data loss caused by network attacks. Meanwhile, the enorgy consumption is reduced significantly and the network lifetime is extended.
-
Research on Coverage Performance in Wireless Sensor Network
郭小清,谢忠红. 无线传感器网络覆盖性能研究[J]. 计算机科学, 2011, 38(Z10): 364-366.
GUO Xiao-ding , XIE Zhong-hong. Research on Coverage Performance in Wireless Sensor Network[J]. Computer Science, 2011, 38(Z10): 364-366. - GUO Xiao-ding , XIE Zhong-hong
- Computer Science. 2011, 38 (Z10): 364-366.
- Abstract PDF(241KB) ( 454 )
- RelatedCitation | Metrics
-
To address coverage performance of wireless sensor networks issues,most studies have focused on the optimization of node placement, positioning, etc.,in a complex environment, pay less attention to the quantitative evalualion. The paper first analyzed the performance of the main factors affecting coverage. Secondly, the data fusion model and strategy were discussed to find a basis for model selection. Then from a theoretical point of view of the use of data fusion performance evaluation of the coverage under way and the relationship between the two, found integration of range and network density and coverage relationship, an optimal integration of environment related application range can be obtained by experiment or experience derived through the analysis of the approximate solution.
-
Improvement of Less Packet Loss S-MAC Protocol for Wireless Sensor Networks
周祥云,钱慧,余轮. 低丢包率无线传感器网络S-MAC协议的研究[J]. 计算机科学, 2011, 38(Z10): 367-369.
ZHOU Xiang-yun, QIAN Hui, YU Lun. Improvement of Less Packet Loss S-MAC Protocol for Wireless Sensor Networks[J]. Computer Science, 2011, 38(Z10): 367-369. - ZHOU Xiang-yun, QIAN Hui, YU Lun
- Computer Science. 2011, 38 (Z10): 367-369.
- Abstract PDF(250KB) ( 497 )
- RelatedCitation | Metrics
-
According to the packet loss problem in S-MAC protocol, this paper proposed an optimized scheme which based on the cache queue principle and simplified the format of group data for S-MAC protocol. Combined with the Acfive Message(AM) mechanism of TinyOS, the S-MAC protocol has been implemented on the Mica2 motes, and it has tested the packet loss ratio of MAC layer. hhe result demonstrates that the improved S-MAC protocol has significantly reduced than the original S-MAC protocol in the packet loss ratio and enhances the network throughput.
-
Using SOM to Recognize Friendship from Mobile Phone Data
陈蔼样. 用SOM网络从移动通信数据中识别朋友关系[J]. 计算机科学, 2011, 38(Z10): 370-375.
CHEN Ai-xiang. Using SOM to Recognize Friendship from Mobile Phone Data[J]. Computer Science, 2011, 38(Z10): 370-375. - CHEN Ai-xiang
- Computer Science. 2011, 38 (Z10): 370-375.
- Abstract PDF(526KB) ( 421 )
- RelatedCitation | Metrics
-
Data collected from mobile phone、have the potential to provide insight into the relational dynamics of individuals. In this paper, using the reality data collected from 94 Nokia 6600 users, an highly effective parsing algorithm named do&dol was designed and realized to construct the communication pattern of a pair phone number. The do&dol algorithm's correctness, theory time complexity and experimental observations were given. With the output of do&dol as training data, a Relationship Recognition System building on SOM neural network was designed and realized. The system RSS can recoginze the reciprocal friends, nonreciprocal friends and reciprocal nonfriends.
-
Timer Realization Based on UMTS Core Network
郜林,王荃. 一种基于UMTS核心网的定时器实现方案[J]. 计算机科学, 2011, 38(Z10): 376-379.
GAO Lin , WANG Quan. Timer Realization Based on UMTS Core Network[J]. Computer Science, 2011, 38(Z10): 376-379. - GAO Lin , WANG Quan
- Computer Science. 2011, 38 (Z10): 376-379.
- Abstract PDF(409KB) ( 412 )
- RelatedCitation | Metrics
-
To implement the call connection protocol of UMTS core network, a timer design was proposed by the way of software, developed and researched in the environment of WinCE real-time embedded system. Based on relative time algorithm proposed, the timer program, which data structure is constructed by single linked list and relative time item,creates a single time thread and insertion/deletion functions to realize the multiple-timer logic regulated by UMTS protocol. In the embedded system programming, we applied mutex method to implement the synchronization in communicalion between the timer thread and insertion/deletion functions, and adopted heap management method to realize the dynamic allocation and release of memory. The paper discussed the technique and the structure of the plan with key code and analysed the relative WinCE mechanisms and UMTS protocols. Experiments prove that the design, which has the qualities of low hardware occupation and high program efficiency, with good real time ability, is suitable for timer programming in communication protocols based on embedded system.
-
Research on Relay Selection Strategy in Cooperation Communication
闰力缓,王玥,陈晨. 协同通信中继选择技术的研究[J]. 计算机科学, 2011, 38(Z10): 380-384.
YAN Li-yuan, WANG Yue, CHEN Chen. Research on Relay Selection Strategy in Cooperation Communication[J]. Computer Science, 2011, 38(Z10): 380-384. - YAN Li-yuan, WANG Yue, CHEN Chen
- Computer Science. 2011, 38 (Z10): 380-384.
- Abstract PDF(432KB) ( 674 )
- RelatedCitation | Metrics
-
Cooperation communication is a hot research topic in wireless communication presently. hhe first problem to be solved is how to select the cooperative relay in cooperation communication. We Proposed a criterion to evaluate the technology of cooperative relay selection. Then we classified, analyzed and compared these algorithms that proposed in recent years. At last, we look forward to the developed direction of the algorithm of cooperative relay selection.
-
Application and Study of IOCP in Single Client-mufti Server Model
王震,徐博,解永平,孙加奉. 单客户机一多服务器模式下IOCP的应用与研究[J]. 计算机科学, 2011, 38(Z10): 385-388.
WANG Zhen, XU Bo, XIE Yong-ping, SUN Jia-feng. Application and Study of IOCP in Single Client-mufti Server Model[J]. Computer Science, 2011, 38(Z10): 385-388. - WANG Zhen, XU Bo, XIE Yong-ping, SUN Jia-feng
- Computer Science. 2011, 38 (Z10): 385-388.
- Abstract PDF(406KB) ( 651 )
- RelatedCitation | Metrics
-
This paper analyzed a single client一mufti-server model based on specific network applications. This paper not only gave the client basic implementation based on IOCP, but also gave the thread scheduling, asynchronous connections IOCP framework method. Aiming at receiving variable length data for the reduest,memory pool management and buffer settings were analyzed and designed. By connecting test and throughput test, results show that this design has capabilities of a large number of connections and efficient data processing. The recommendations of the number setting of IOCP worker threads were given by the experimental methods.
-
Applied Study on End-to-End QoS Solutions for MPLS VPN
陈家益. MPLS VPN端到端QoS解决方案的应用研究[J]. 计算机科学, 2011, 38(Z10): 389-391.
CHEN Jia-yi. Applied Study on End-to-End QoS Solutions for MPLS VPN[J]. Computer Science, 2011, 38(Z10): 389-391. - CHEN Jia-yi
- Computer Science. 2011, 38 (Z10): 389-391.
- Abstract PDF(292KB) ( 624 )
- RelatedCitation | Metrics
-
MPLS VPN is the mainstream of present virtual private network technology. In order to transmit the integration of voice, video and critical data in MPI_S VPN, the key is to achicvc cffcctivc QoS guarantcc. Based on the study on DiffServ and MPLS TE,it introduced the MPLS DS-TE. By combining the differentiated Services of DiffServ with the effective end-to-end routing strategy of MPLS TE, and employing the bandwidth constraints model, DS-TE achieves QoS guarantee of end-to-end and differentiated Services in MPI_S VPN.
-
Research of UniDirectional Link Detection
韩倩,程友清. 单向链路故障检测的研究[J]. 计算机科学, 2011, 38(Z10): 392-393.
HAN Qian,CHENG You-qing. Research of UniDirectional Link Detection[J]. Computer Science, 2011, 38(Z10): 392-393. - HAN Qian,CHENG You-qing
- Computer Science. 2011, 38 (Z10): 392-393.
- Abstract PDF(140KB) ( 469 )
- RelatedCitation | Metrics
-
UDLD is a layer protocol that enables devices connected through fiber-optic or twisted-pair Ethernet cables.It monitors a physical connection to detect unidirectional links to avoid spanning-tree topology loops or silent drop traffic. All connected devices must support UDLD for the protocol to successfully identify the unidirectional links. When UDLD detects a unidirectional link, it can administratively shut down the affected port and send you a warning message.
-
Balanced-energy Sleep Scheduling Scheme Based on Alternating Cluster-head inHigh-density Wireless Mesh Sensor Networks
吴琼,范菁,张翠,郝俊锋. 基于簇首轮替的高密度无线网状传感器网络中能耗均衡休眠调度方案[J]. 计算机科学, 2011, 38(Z10): 394-398.
WU Qiong,FAN Jing,ZHANG Cui,HAO Jun-feng. Balanced-energy Sleep Scheduling Scheme Based on Alternating Cluster-head inHigh-density Wireless Mesh Sensor Networks[J]. Computer Science, 2011, 38(Z10): 394-398. - WU Qiong,FAN Jing,ZHANG Cui,HAO Jun-feng
- Computer Science. 2011, 38 (Z10): 394-398.
- Abstract PDF(384KB) ( 324 )
- RelatedCitation | Metrics
-
Wireless Mesh Sensor Networks(WMSN) topology structure was constructed by combining Wireless Sensor Networks with Wireless Mesh Networks. Energy consumption in the high-density WMSN could be decreased by putting the partial sensor nodes into sleeping state and the energy holes problem could be solved by balancing the network energy consumption. This paper proposed a balanced-energy sleeping scheduling scheme based on alternating cluster head nodes in WMSN. hhe sleeping probability of sensor nodes in balanced-energy network was obtained by building cluster head alter-nated model when different sensor nodes took turns to be cluster head. Analytical and simulation resups show that the scheme assures the network coverage, extends the lifetime and balances the energy consumption compared with Randomized Scheduling scheme.
-
Novel Location Service for ilrban Vehicular Ad-hoc Networks
李秀明,方珍,李帅,杨露霞. 一种新的适用于车载Ad-hoc网络的位置服务机制[J]. 计算机科学, 2011, 38(Z10): 399-401.
LI Xiu-ming,FANG Zhen,LI Shuai,YANG Lu-xia. Novel Location Service for ilrban Vehicular Ad-hoc Networks[J]. Computer Science, 2011, 38(Z10): 399-401. - LI Xiu-ming,FANG Zhen,LI Shuai,YANG Lu-xia
- Computer Science. 2011, 38 (Z10): 399-401.
- Abstract PDF(343KB) ( 418 )
- RelatedCitation | Metrics
-
We proposed a novel location service for urban vehicular Ad-hoc networks called ILSV (Intersection Location Service for VANET) , a distributed location service algorithm that makes use of the features of street intersections and traffic rules. We demonstrated these traits and its performance by providing extensive simulation in a wide range of urban scenarios. Compared with GLS and HLS, ILSV achieves good results in terms of query success ratios and remarkable scalability with respect to network size.
-
Game-theoretic Approach to Joint Rate and Power Control for Cognitive Ratdo
关宏博,张广春. 认知无线电中基于博弈论的联合功率和速率控制算法[J]. 计算机科学, 2011, 38(Z10): 402-405.
GUAN Hong-bo,ZHANG Guang-chun. Game-theoretic Approach to Joint Rate and Power Control for Cognitive Ratdo[J]. Computer Science, 2011, 38(Z10): 402-405. - GUAN Hong-bo,ZHANG Guang-chun
- Computer Science. 2011, 38 (Z10): 402-405.
- Abstract PDF(324KB) ( 390 )
- RelatedCitation | Metrics
-
We studied joint power and rate control for cognitive radios in the underlay type. Power control is one of the key technology in cognitive radio,and the next generation wireless systems also will be required to support with different transmission rates. In this paper we assumed the problem between second users as a non-cooperative game, and one power control algorithm was proposed,subject to the tolerable interference limits. And it is proved that the Nash ectuilibrium of the algorithm is the existence, uniqueness, the simulation results show that the method has a faster convergence, and can converge to the lower power and higher rates.
-
Research of TDOA Cooperative Location Algorithm Based on Chan and Taylor
陈德章,唐插,吴季达. 基于Chan和Taylor的TDOA协同定位算法研究[J]. 计算机科学, 2011, 38(Z10): 406-407.
CHEN De-zhang,TANG Hao,WU Ji-da. Research of TDOA Cooperative Location Algorithm Based on Chan and Taylor[J]. Computer Science, 2011, 38(Z10): 406-407. - CHEN De-zhang,TANG Hao,WU Ji-da
- Computer Science. 2011, 38 (Z10): 406-407.
- Abstract PDF(237KB) ( 2080 )
- RelatedCitation | Metrics
-
In the system of radio location, Chan algorithm has a small computational and high accuracy in the Gaussian noise environment. However, under the NLOS, it performs degradation. Taylor series expansion method has been widely used for its high accuracy and good robustness. Since the performance of Taylor algorithm depends highly on the initial estimation, a new cooperative location algorithm based on Chan and Taylor algorithm was proposed to inherit the char acteristics of a small computational and the high accuracy and good robustness. The simulations and tests indicate that the cooperative algorithm can effective inhibit adverse noise environment in the NLOS channel, and has stable performance.
-
Study on Structural Damage Identification Using Bayes' Theorem and mGA
钱小妹,严刚. 基于Bayes定理和mGA的结构损伤识别方法研究[J]. 计算机科学, 2011, 38(Z10): 408-411.
QIAN Xiao-mei,YAN Gang. Study on Structural Damage Identification Using Bayes' Theorem and mGA[J]. Computer Science, 2011, 38(Z10): 408-411. - QIAN Xiao-mei,YAN Gang
- Computer Science. 2011, 38 (Z10): 408-411.
- Abstract PDF(307KB) ( 494 )
- RelatedCitation | Metrics
-
This paper proposed an approach for estimating the parameters of the location and size of damage in structure along with the associated uncertainties using I3ayes' Theorem and micro genetic algorithm mGA). After obtaining the measured information, combined with the damage model, the posterior probability density function (PDF) of the pares meters of the damage was updated according to the Bayes' Theorem, thus the damage was identified with uncertainties.To maximize the updated PDF of damage parameters, mGA was employed to search out the global optimum values of damage parameters. The proposed approach was applied to damage identification for plate structure, and numerical study was performed to demonstrate its effectiveness.
-
Data Model for Intelligent Community Power
耿卫建,徐小龙,李玲娟,陈建新,杨庚. 智能小区用电数据模型研究[J]. 计算机科学, 2011, 38(Z10): 412-415.
GENG Wei-jian,XU Xiao-long,Li Ling-juan,CHEN Jian-xin,YANG Geng. Data Model for Intelligent Community Power[J]. Computer Science, 2011, 38(Z10): 412-415. - GENG Wei-jian,XU Xiao-long,Li Ling-juan,CHEN Jian-xin,YANG Geng
- Computer Science. 2011, 38 (Z10): 412-415.
- Abstract PDF(355KB) ( 852 )
- RelatedCitation | Metrics
-
An intelligent community power data model was proposed in this paper for providing data and relational support for the smart grid, and building the low-carbon, convenient and energy-saving intelligent community. The demand analysis of the data model was discussed about store queries, communication requirements and data flow analysis. According to the demand and function of the community, the data model was constructed. Finally, an application demo waspresented to verify our model. The results show that the data mode is feasible and available.
-
Research and Application of Scorm Metadata in Semantic Retrieval of Education Resources
刘茜,李华. Scorm元数据在教育资源语义检索中的研究与应用[J]. 计算机科学, 2011, 38(Z10): 416-418.
LIU Qian, LI Hua. Research and Application of Scorm Metadata in Semantic Retrieval of Education Resources[J]. Computer Science, 2011, 38(Z10): 416-418. - LIU Qian, LI Hua
- Computer Science. 2011, 38 (Z10): 416-418.
- Abstract PDF(243KB) ( 388 )
- RelatedCitation | Metrics
-
This paper introduced Scorm structure and metadata standard, described the contributing relationship among Scorm metadata, ontology and semantic retrieval, and mainly described the semantization process of study object, in addition,it presented the semantization example on base of the actual university subject,which shows the important apphcanons of the Scorm norms in semantic retrieving of education resources.
-
Technology and Application of Rich Client Based on AJAX
陈必峰. 基于AJAX的富客户端技术及应用[J]. 计算机科学, 2011, 38(Z10): 419-420.
CHEN Bi-feng. Technology and Application of Rich Client Based on AJAX[J]. Computer Science, 2011, 38(Z10): 419-420. - CHEN Bi-feng
- Computer Science. 2011, 38 (Z10): 419-420.
- Abstract PDF(262KB) ( 619 )
- RelatedCitation | Metrics
-
AJAX namely asynchronous JavaScript and XML,uses JavaScript, HTML,DOM technology to design Web rich client with server background asynchronous interaction, the interaction can't interrupt the user' screen operation, it can provide better service response.月AX makes the traditional client based on Web design, and makes the same effect stand-alone GUI way of distributed system based on Web design, has produced important influence. Compared with traditional Web development way of comparison, this paper introduced core technologies and basic principle of useing AJAX Web to develope application system.
-
Remote Control System Based on SMS
陈亮,李汪洋,吴国樟,邓麒,李洋. 基于SMS远程监控系统[J]. 计算机科学, 2011, 38(Z10): 421-422.
CHEN Liang,LI Wang-yang,WU Guo-zhang,DENG Qi,LI Yang. Remote Control System Based on SMS[J]. Computer Science, 2011, 38(Z10): 421-422. - CHEN Liang,LI Wang-yang,WU Guo-zhang,DENG Qi,LI Yang
- Computer Science. 2011, 38 (Z10): 421-422.
- Abstract PDF(183KB) ( 444 )
- RelatedCitation | Metrics
-
SMS remote control system utilizes the existing GSM SMS service with low-cost hardware equipment to ereate a system for remote monitoring and remote control. The system can be controlled and monitored via SMS from anywhere that is covered by the USM service. Devices that connect to the system can be turn on or off by sending SMS to the system. Meanwhile the status of the system can be requested via SMS. The system can also be programmed to send specific SMS to predetermined number if any event or condition is triggered. Utilizing GSM/ GPRS MODEM main control system and one wireless modem, the system could establish a control network that is more from a master. Furthermore makes the network of Smart Home System come true.
-
New Particle Swarm Optimization Algorithm for the Design of the Adaptive Notch Filter
章洁,蒋世奇. 基于改进粒子群算法的自适应陷波器设计[J]. 计算机科学, 2011, 38(Z10): 423-424.
ZHANG Jie, JIANG Shi-qi. New Particle Swarm Optimization Algorithm for the Design of the Adaptive Notch Filter[J]. Computer Science, 2011, 38(Z10): 423-424. - ZHANG Jie, JIANG Shi-qi
- Computer Science. 2011, 38 (Z10): 423-424.
- Abstract PDF(236KB) ( 772 )
- RelatedCitation | Metrics
-
In signal processing ficld,disturbanee and noise signal often exists in the received signal. Adaptive notch filter, as one of the optimal filter, is the best structure to eliminate the low frequency interference. In this paper, the particle swarm optimization was applied to the adaptive notch filter, it can get useful signal by the adaptive algorithm to adjusting its weight and eliminating the low frequency interference. Then,a new PSO algorithm was proposed to improve the local convergence and the speed of convergence, the simulation results show that the algorithm is efficient and hasgood global optimization ability.
-
Contacts Recognition of Optical Touch System Based on Features Outlines
柴硕,王栋,刘金尧,王晓庆,陈戈. 基于特征轮廓的光学触控系统触点识别[J]. 计算机科学, 2011, 38(Z10): 425-427.
CHAI Shuo,WANG Dong,LIU Jin-yao,WANG Xiao-qing,CHEN Ge. Contacts Recognition of Optical Touch System Based on Features Outlines[J]. Computer Science, 2011, 38(Z10): 425-427. - CHAI Shuo,WANG Dong,LIU Jin-yao,WANG Xiao-qing,CHEN Ge
- Computer Science. 2011, 38 (Z10): 425-427.
- Abstract PDF(236KB) ( 403 )
- RelatedCitation | Metrics
-
In recent years, optical touch system is a gradually rising solution of touch system, and it recognized the touch-point based on the method of mass tracking from computer vision recognition. The paper put forward a new method applied to contacts recognition of optical touch system, first, it carves up the image gathered by the camera by two thresholds and extracts the contours, and then, it computes the minimum external rectangular of the bright spot, at last,it eliminates the invalid contacts based on the area and the aspect ratio of the features outlines. This method using OpenCV1.0,on the premise not affecting handling efficiency basically,realizes the accurate contacts recognition.
-
Advanced Evolution of Power Glitch Attack and Resistance Techniques
段晓毅,李莉,武玉华,靳济芳. 最新电压毛刺(Power Glitch)攻击与防御方法研究[J]. 计算机科学, 2011, 38(Z10): 428-431.
DUAN Xiao-yi ,LI Li , WU Yu-hua , JIN Ji-fang. Advanced Evolution of Power Glitch Attack and Resistance Techniques[J]. Computer Science, 2011, 38(Z10): 428-431. - DUAN Xiao-yi ,LI Li , WU Yu-hua , JIN Ji-fang
- Computer Science. 2011, 38 (Z10): 428-431.
- Abstract PDF(332KB) ( 2376 )
- RelatedCitation | Metrics
-
Power glitch attacks arc fast changes in the power supplied to the device and designed to affect its normal operation. I3y this way,the cpu can be made to execute a number of completely different wrong instructions. This paper summarized the latest development of power glitch attack and defense techniques. Aimed at various implementations of attack on RSA signature With Chinese Reminder I}hcorem, attack on RSA signature without CRh and attack on EEPROM were described. Then the available countermeasures of power glitch were shown, which consist of MASK methods, detecting voltage glitch attacks. Moreover, the relative merits of these countermeasures were analyzed.
-
Research on Cloud Computing in Smart Grid
李琪林,周明天. 面向智能电网的云计算技术研究[J]. 计算机科学, 2011, 38(Z10): 432-433.
LI Qi-lin, ZHOU Ming-tian. Research on Cloud Computing in Smart Grid[J]. Computer Science, 2011, 38(Z10): 432-433. - LI Qi-lin, ZHOU Ming-tian
- Computer Science. 2011, 38 (Z10): 432-433.
- Abstract PDF(271KB) ( 627 )
- RelatedCitation | Metrics
-
The goal of this paper is to investigate the cloud computing in smaert grid. First of all,we introduced the basic concept of cloud computing and analyzed its major characteristics. Secondly, we combined cloud computing with smart grid and presented the view of smart cloud. Subsequently, we looked deeper into the three key issues, including construction of smart cloud, resource management and security policy. Finally, we pointed out future directions of research and concluded the paper.
-
Feature Extraction of Speech Signal Based on Empirical Mode Decomposition
王辉,李生华. 基于EMD的语音特征信息提取[J]. 计算机科学, 2011, 38(Z10): 434-436.
WANG Hui,Li Sheng-hua. Feature Extraction of Speech Signal Based on Empirical Mode Decomposition[J]. Computer Science, 2011, 38(Z10): 434-436. - WANG Hui,Li Sheng-hua
- Computer Science. 2011, 38 (Z10): 434-436.
- Abstract PDF(201KB) ( 624 )
- RelatedCitation | Metrics
-
Effectively extracting feature information of speech signal is the key of speech recognition. By empirical mode decomposition method, a series of intrinsic mode function can be got.Extraction process of intrinsic mode function is to reduce its redundancy. Experimental results show that the empirical mode decomposition method can decrease the recognition error rate. EMD is an effective method. It is feasible to extract the feature from speech signals with EMD.
-
Design and Realization of the Network Video Platform on SOPC
何宾,何军. 基于SOPC的网络视频平台的构建[J]. 计算机科学, 2011, 38(Z10): 437-439.
HE Bin HE Jun. Design and Realization of the Network Video Platform on SOPC[J]. Computer Science, 2011, 38(Z10): 437-439. - HE Bin HE Jun
- Computer Science. 2011, 38 (Z10): 437-439.
- Abstract PDF(357KB) ( 373 )
- RelatedCitation | Metrics
-
SOPC is an important application of programmable device in the embedded system. Based on SOPC, a general network video platform was introduced, which can receive images from the Ethernet, and process them, then transfer them to terminal equipment for display via digital video interface. In this paper, creation of hardware and software platform and a method to test this system were described in detail. On this platform,a variety of network video application can be achieved, such as video surveillance, remote video display.
-
Review on E-voting System Using RFID Technology and its Security
刘淳,张建学. RFID技术电子投票应用的探讨[J]. 计算机科学, 2011, 38(Z10): 440-443.
LIU Chun,ZHANG Jian-xue. Review on E-voting System Using RFID Technology and its Security[J]. Computer Science, 2011, 38(Z10): 440-443. - LIU Chun,ZHANG Jian-xue
- Computer Science. 2011, 38 (Z10): 440-443.
- Abstract PDF(355KB) ( 516 )
- RelatedCitation | Metrics
-
Radio-frequency identification(RFID) is the use of a RFID tag applied to a product for identification and tracking using the radio waves. An active RF)D tag contains a battery and is able to transmit signals when an external source has been successfully identified. RFID technology application has being applied in our life widely. In this paper, we viewed the RFID technology applied in a basic o-voting system and discussed its security. The RFID system shows the advantages over the currently existing optical voting system on verifying the voters, recounting and public bulletin board. Remote voting may be realized based on the RFID technology. I}he RFID technology separates the votes from the voting equipments(software and hardware) and makes it more verifiable.
-
Real-time Performance Analysis of GOOSE Communication Network in Smart Substation
范荣全,肖红,李琪林. 智能变电站GOOSE通信网实时性分析[J]. 计算机科学, 2011, 38(Z10): 444-446.
FAN Rong-quan,XIAO Hong,LI Qi-lin. Real-time Performance Analysis of GOOSE Communication Network in Smart Substation[J]. Computer Science, 2011, 38(Z10): 444-446. - FAN Rong-quan,XIAO Hong,LI Qi-lin
- Computer Science. 2011, 38 (Z10): 444-446.
- Abstract PDF(266KB) ( 906 )
- RelatedCitation | Metrics
-
GOOSE is the model of generic object oriented substation event defined in IEC 61850. It's very important for implementing co-operation between IEDs in smart substation. With rapid advances of the smart substation technology based on IEC61850,GOOSE has widespread application. We attempted to identify the mode of the transmission mechanism and work flow of UOOSE, and the real-time performances of two kinds of network topologies of GOOSE were evaluated by the OPNEI} simulation tool as well.
-
Drools Rules Engine in the Application of Modern Logistics Information Platform
陆歌皓,李仕金,吴超凡. Drools规则引擎在现代物流信息平台的应用[J]. 计算机科学, 2011, 38(Z10): 447-450.
LU Ge-hao, LI Shi-jin, WU Chao-fan. Drools Rules Engine in the Application of Modern Logistics Information Platform[J]. Computer Science, 2011, 38(Z10): 447-450. - LU Ge-hao, LI Shi-jin, WU Chao-fan
- Computer Science. 2011, 38 (Z10): 447-450.
- Abstract PDF(289KB) ( 812 )
- RelatedCitation | Metrics
-
Rule engine is a technology which owns a very broad application prospects. First introduced its concept and function, also the application background of the system. Then mainly introduced the working mechanism of rules engine and the RISES. Finally, used the drools to solve the realisation of the rule engine based on the logistics system, and then discussed the advantage and the disadvantage about the rule engine, also concerned on the future development of this technology.
-
Wireless Multiple-node Image Acquisition System Implementation and Application
仇乐乐,胡艳军,许耀华,姜新红,高韦,卫海燕. 无线多节点图像采集系统实现及应用[J]. 计算机科学, 2011, 38(Z10): 451-453.
QIU Le-le, HU Yan-jun , XU Yao-hua , JIANG Xin-hong GAO Wei WEI Hai-yan. Wireless Multiple-node Image Acquisition System Implementation and Application[J]. Computer Science, 2011, 38(Z10): 451-453. - QIU Le-le, HU Yan-jun , XU Yao-hua , JIANG Xin-hong GAO Wei WEI Hai-yan
- Computer Science. 2011, 38 (Z10): 451-453.
- Abstract PDF(288KB) ( 370 )
- RelatedCitation | Metrics
-
The paper firstly introduced the network scheme integrates mobile network and sensor network. Then it gave a further presentation in the hardware design of the solar panel supplying power and the software design of upper computer. Finally, the whole system was tested under indoor and outdoor environment. Test results shows the network cquipments can rapid convergence to form a sensor network that is low cost, easy extension, easy to control. In addition,under indoor and outdoor environment,upper software can reconstruct clear images.
-
Research of Time Delay Estimation Based on GCC Algorithm
梁宇,马良,纳霞,陈晨. 基于广义互相关算法的时延估计[J]. 计算机科学, 2011, 38(Z10): 454-456.
LIANG Yu , MA Liang , NA Xia , CHEN Chen. Research of Time Delay Estimation Based on GCC Algorithm[J]. Computer Science, 2011, 38(Z10): 454-456. - LIANG Yu , MA Liang , NA Xia , CHEN Chen
- Computer Science. 2011, 38 (Z10): 454-456.
- Abstract PDF(235KB) ( 2825 )
- RelatedCitation | Metrics
-
In the system of radio location, AOA TOA and TDOA are the most development potential location technology of the cellular mobile station. hhe time delay estimation of TIX)A requires very high precision. The higher accuracy of measurement, the residual will be smaller which is introduced. On this basis, the research of time delay estimation adopts new GCC algorithm which is based on periodic cross-spectral and cross-power spectrum. The simulation results show that the improved time delay estimation algorithm in the influence of harsh noise environment shows a relatively good robustness.
-
Implementing of OPNET Based GOOSE Simulation Platform
李琪林,范荣全,肖红. 基于OPNET的GOOSE网仿真平台的实现[J]. 计算机科学, 2011, 38(Z10): 457-458.
Li Qi- lin,FAN Rong-quan,XIAO Hong. Implementing of OPNET Based GOOSE Simulation Platform[J]. Computer Science, 2011, 38(Z10): 457-458. - Li Qi- lin,FAN Rong-quan,XIAO Hong
- Computer Science. 2011, 38 (Z10): 457-458.
- Abstract PDF(262KB) ( 641 )
- RelatedCitation | Metrics
-
With the wide application of GOOSE in smart substation, the investigation of real-time and reliability of GOOSE appears increasingly important. Due to the complexity of GOOSE and high cost of research, the traditional measured method is not good enough to meet the research demands. However, the simulation analysis method can work well in the field. The method of implementing GOOSE simulation platform based on the OPNET was introduced. The platform can be widely applied in various kinds of analysis and research of GOOSE.
-
Study and Implementation of FoxNews-WFL Based on Web Application
王蓉,刘甫迎. 基于Web的网络新闻应急系统工作流程管理(FoxNews_ WFL)的研究与实现[J]. 计算机科学, 2011, 38(Z10): 459-460.
WANG Rong, LIU Fu-ying. Study and Implementation of FoxNews-WFL Based on Web Application[J]. Computer Science, 2011, 38(Z10): 459-460. - WANG Rong, LIU Fu-ying
- Computer Science. 2011, 38 (Z10): 459-460.
- Abstract PDF(231KB) ( 389 )
- RelatedCitation | Metrics
-
FoxNcws's WFL(Work Flow Control System) can sign automaticly. This paper introduced FoxNcws_WFI system based on ASP. NET+C#Technology and introduced it's key programs. FoxNews_ WFL can do something in office without paper and sign News.
-
Study and Implementation of FoxNews-MID Based on Android C2DM
张京,刘甫迎. 基于Android云计算消息框架(C2DM)的FoxNews_ MID 手持移动系统的研究[J]. 计算机科学, 2011, 38(Z10): 461-463.
ZHANG Jing, LIU Fu-ying. Study and Implementation of FoxNews-MID Based on Android C2DM[J]. Computer Science, 2011, 38(Z10): 461-463. - ZHANG Jing, LIU Fu-ying
- Computer Science. 2011, 38 (Z10): 461-463.
- Abstract PDF(251KB) ( 482 )
- RelatedCitation | Metrics
-
FoxNews_MID network news emergency management system using Android cloud computing message frame(C2DM) technology can push emergency information to the remote handheld mobile terminals for the current social stability. This paper discusses the FoxNews_ MIDs function haracteristics,and discusses the key technology and gives the realization of the key programs. The operation shows that,FoxNews_MID system can be realized based on the C2DM pushing information to the remote hold mobile terminal, based on Andriod handheld terminal receiving information, based on Andriod handheld terminal uploading local news information and digital media data.
-
Evaluation Model on Competitive Power of Enterprise Based on Hopfield Neural Networks
李国辉. 基于Hopfield神经网络的企业竞争力评价模型[J]. 计算机科学, 2011, 38(Z10): 464-466.
LI Guo-hui. Evaluation Model on Competitive Power of Enterprise Based on Hopfield Neural Networks[J]. Computer Science, 2011, 38(Z10): 464-466. - LI Guo-hui
- Computer Science. 2011, 38 (Z10): 464-466.
- Abstract PDF(303KB) ( 729 )
- RelatedCitation | Metrics
-
Considering the nonlinear characteristics of competitive power evaluation and the existence of many nonquantitative factors in the evaluation system, a Hopfield neural network model of evaluation on competitive power was built in this paper according to the evaluating data given by the experts. By utilizing the properties of association and memory of neural network that can approximate any nonlinear continuous function, the model can calculate quantified cvaluation and has higher efficiency than that of existing evaluation system. The method of applying Hopfield neural network to competitive power evaluation can overcome subjective factors in the process of expert assessment, avoid complex process of traditional competitive power evaluation and also has broad applicability.
-
Discussion about Algorithm of Calculating Source Location Based on TDOA
唐皓,吴季达,鲁东生. 基于TDOA原理计算信号源位置的算法探讨[J]. 计算机科学, 2011, 38(Z10): 467-469.
TANG Hao, WU Ji-da, LU Dong-sheng. Discussion about Algorithm of Calculating Source Location Based on TDOA[J]. Computer Science, 2011, 38(Z10): 467-469. - TANG Hao, WU Ji-da, LU Dong-sheng
- Computer Science. 2011, 38 (Z10): 467-469.
- Abstract PDF(214KB) ( 658 )
- RelatedCitation | Metrics
-
At present, small and medium size radio monitoring stations with their low cost, small volume, convenient in maintenance etc advantages are widely applied, have gradually become the industry trend. However, numerous small stadons currently only have monitoring function, doesri t have the direction-finding function, and bring a lot of inconvenfence to the unknown source orientation. So it is particularly important to research method of locating based on TDOA Time Difference of Arrival). This paper discussed the method of calculating unknown source to defined position, based on temporal difference between unknown source and the different stations. Finally, it was implemented with C language.
-
Radio Monitoring System Integration Based on ESB
陈志钢,陈晨,沈立,李映红. 基于ESB的无线电监测系统集成[J]. 计算机科学, 2011, 38(Z10): 470-472.
CHEN Zhi-gang , CHEN Chen ,SHEN Li , LI Ying-hong. Radio Monitoring System Integration Based on ESB[J]. Computer Science, 2011, 38(Z10): 470-472. - CHEN Zhi-gang , CHEN Chen ,SHEN Li , LI Ying-hong
- Computer Science. 2011, 38 (Z10): 470-472.
- Abstract PDF(240KB) ( 380 )
- RelatedCitation | Metrics
-
The radio business is in rapid development, and the monitoring system of Yunnan radio does not satisfy its existing requirements.Therefore,improving the system automation levcl,fully realizing consummation radio information system platform construction, integrating various information system are imminent And using ESI3, Web service integration method is the best method, solves key problems of the agreement decoupling and interface, substantially achieves integration system task.
-
Design and Implementation of Automatic Tank Gauging System Based on Remote Sectional Technologies
刘荣志. 远程分段式油罐自动计量系统的设计与实现[J]. 计算机科学, 2011, 38(Z10): 473-476.
LIU Rong-zhi. Design and Implementation of Automatic Tank Gauging System Based on Remote Sectional Technologies[J]. Computer Science, 2011, 38(Z10): 473-476. - LIU Rong-zhi
- Computer Science. 2011, 38 (Z10): 473-476.
- Abstract PDF(420KB) ( 525 )
- RelatedCitation | Metrics
-
On basis of analyzing the important influence of oil level on the automatic tank gauge,a new type of remote sectional measurement system for oil tank and its principle ware introduced. This paper described the design,implementation and on-site application of the system,focusing on analysis of the practical application level gauge results for the oil field station library to provide technical support for automated measurement. The promotion and application of the technologies enable automatic monitoring of oil tank liquid level, reduce the employee labor intensity, increase the overall efficiency, and achieve the purpose of automatic management of the tank liquid level.
-
Research of Network Congestion Control of Ubiquitous Service
张德干,刘微微,陈绪延,王园园. 普适服务模式下网络拥塞控制方法的研究[J]. 计算机科学, 2011, 38(Z10): 576-278.
ZHANG De-gan LIU Wei-wei CHEN Xu-yan WANG Yuan-yuan. Research of Network Congestion Control of Ubiquitous Service[J]. Computer Science, 2011, 38(Z10): 576-278. - ZHANG De-gan LIU Wei-wei CHEN Xu-yan WANG Yuan-yuan
- Computer Science. 2011, 38 (Z10): 576-278.
- Abstract PDF(309KB) ( 474 )
- RelatedCitation | Metrics
-
With the development of social science, the traditional network services model has been replaced by a new model called for pervasive computing model. And then the coexistence of a variety of terminal equipments network situanon comes up. When the task is in the migration of network services,the generation of congestion is inevitable. The result is that congestion has a direct impact on the transmission performance of networks. For the problems of the current traditional algorithm,for example congestion problems,a new congestion control algorithm DARed was designed. that the algorithm in ubiquitous computing environment has shown excellent performance is shown by NS2 simulation experimenu. It can be effective for avoiding for network congestion, and meet the universal service requirements.