Loading...

Table of Content

    27 August 2010, Volume 1 Issue 8
    算法设计与分析
    Formal Development of Three Classical Mathematics Problems
    YANG Chen;XUE Jin-yun;SU Zhao
    2010, 1(8):  1-4.  doi:10.3969/j.issn.1006-2475.2010.08.001
    Asbtract ( 883 )  
    Related Articles | Metrics

    Turing Award in computer science prizewinner Knuth says algorithm is the core of computer science. Algorithm design and understanding are important to the development of efficient and correct software. This paper, through the formal PAR derives square number, geometric sum and an polynomials evaluation achieves the three classical mathematical problem, from the problem of exact function to be described starting, uses the PAR method and PAR platform reasoning and transformation rules, after a series of equivalent transformation, gets the correct algorithm program finally. This process reveals three classical mathematical problem subtleties. Facts show that PAR method and platform can play a greater role in the algorithm and program design process.

    Design and Research of Parallel Clustering Algorithm
    MENG Hai-dong;YANG Yan-kan
    2010, 1(8):  5-7.  doi:10.3969/j.issn.1006-2475.2010.08.002
    Asbtract ( 911 )  
    Related Articles | Metrics

    During dealing with massive data sets, a single computer’s power is limited. The traditional clustering algorithms are difficult to obtain the results in the short time. To overcome these problems, a new parallel clustering algorithm is presented according to the analysis of clustering algorithm based on density and adaptive densityreachable. Theoretical analysis and experimental results demonstrate that the algorithm is nearlinear speedup ratio, and can handle the massive data sets effectively.

    Improvement of Continuous Variables Processing with C4.5 Algorithm
    LI Hui-hui;WAN Wu-zu
    2010, 1(8):  8-10.  doi:10.3969/j.issn.1006-2475.2010.08.003
    Asbtract ( 1568 )  
    Related Articles | Metrics
    The decision tree classification algorithm C4.5 is the most popular and classical classification algorithm in the data mining. But, there are some defects in it, the processing of continuous variables in the C4.5 algorithm consumes too much time, according to this characteristic, the paper improves the processing of continuous variables to enhance the efficiency of the algorithm. The improved algorithm has better efficiency and has the same accuracy comparing with the C4.5 algorithm when building decision tree. 
    Adaptive Threshold Signal Preprocessing Based on Wavelet Transform
    GONG Ming-guang;WANG Qi;JIANG Min-jun;LI Jin
    2010, 1(8):  11-14.  doi:10.3969/j.issn.1006-2475.2010.08.004
    Asbtract ( 872 )  
    Related Articles | Metrics

    The presence of wild points in the measurement and control system, brings serious difficulties to the further processing of data. Since traditional methods cannot be completely exclude outliers and retain high frequency information signal, this paper presents a new method for excluding the outliers based on wavelet transform and moment theory. In this method, the original signal wavelet decomposition of lowfrequency components as the original signal, estimates and removes outliers with adaptive method, reconstructs signal after removing outlier, then obtains ideal signal. Comparing with traditional methods, the method not only retains the highfrequency signal components but also effective exclude outliers. The fixed threshold and adaptive threshold method are compared by Matlab simulation, the results show that the adaptive method is better.

    V-Support Vector Machine Hybrid Classification Algorithm Based on Boundary of Rough Set
    JIANG Gui-lian;LIU Shu-kun
    2010, 1(8):  15-17.  doi:10.3969/j.issn.1006-2475.2010.08.005
    Asbtract ( 871 )  
    Related Articles | Metrics

    V-support vector machine (v-SVM) can take up a lot of training time when largescale samples set. V-support vector machine hybrid classification algorithm based on boundary of rough set (RSBv-SVM) is proposed. According to the merits of boundary region of rough set theory, the algorithm gets the boundary set of the classified data, which includes all support vectors. The boundary set can substitute the original inputs as a training subset, and the size of the training set is decreased. Training time is reduced by v-SVM while keeping the accuracy of classification and the performance of generalization. The simulation experiments show the effectiveness of the suggested hybrid method.

    Application of BP Neural Network Intrusion Detection System Based on
    ZHANG Xue-feng;HUANG Zi-hui
    2010, 1(8):  18-21.  doi:10.3969/j.issn.1006-2475.2010.08.006
    Asbtract ( 1617 )  
    Related Articles | Metrics

    With the popularization of Internet, the consequent network security issues becomes prominent. This paper based on the security threats of campus network faced, by the brief introduction of intrusion detection techniques and combining the actual campus network, presents a new realtime intrusion detection system, which is established based on genetic neural network. It effectively enhances the security of campus network.

    Study on Algorithm for Generating Random Points in Dot Density Map
    ZHANG Hai-wen;SHI Liang-ping;HAO Yang-mei
    2010, 1(8):  22-24.  doi:10.3969/j.issn.1006-2475.2010.08.007
    Asbtract ( 1067 )  
    Related Articles | Metrics
    In view of the condition that dot density map is frequently used for rendering a map in GIS and the datum relating to the map are vividly showed by the amount of random points, this paper proposes an algorithm for generating a given number of random points based on polygon rasterization. With the algorithm, a perfect dot density map can be rendered.
    Application Research of Mining Association Rules in Teaching Evaluation
    WEN Ji-quan;QU Wu-jiang
    2010, 1(8):  25-28.  doi:10.3969/j.issn.1006-2475.2010.08.008
    Asbtract ( 839 )  
    Related Articles | Metrics
    Teaching evaluation is very important sector for teaching management.It is crucial to find a good method for this work. This paper discusses how to mine data in a way that based on SQL language and making it fit for the relation database better, so it is used in teaching evaluation. Through testing much data, the important teaching reference information is got that cannot get by the old way before.
    Digital Text Watermarking Algorithm Based on Chinese Characters Structure
    ZUO Shuang-yong
    2010, 1(8):  29-32.  doi:10.3969/j.issn.1006-2475.2010.08.009
    Asbtract ( 876 )  
    Related Articles | Metrics
    In this paper, a digital text watermarking algorithm based on Chinese characters structure is proposed. Accounting to the content of text, it isn’t influenced by the text formatting. Based on the distinguishing of the Chinese characters structures, the eigenvalue of every sentence is computed and compared those binary eigenvalue sequences with the watermark binary sequences, and then it is embed watermarking through changing some eigenvalues. Through theoretical analysis and experiments, the algorithm is easy to implement and has an effective invisibility. Furthermore, it has a better watermarking robustness and security.
    网络与通信
    A Survey of Development of Grid Architecture
    YANG Xiao-lin;WANG Yi-fu;XU Peng
    2010, 1(8):  33-36.  doi:10.3969/j.issn.1006-2475.2010.08.010
    Asbtract ( 949 )  
    Related Articles | Metrics
    The grid architecture, something essential in grid, plays important roles as framework and soul. A grid platform with high effectiveness and quality can only be designed and created on reasonable grid architecture. To make readers have real understanding of the grid architecture, this paper deeply analyzes the FLSA and OGSA, which are based on protocols and services respectively, and then WSRF, the improvement of OGSI as kernel specification of OGSA.
    Study on Modeling of Network Traffic Based on Custom Packet
    LI Qing-ping
    2010, 1(8):  37-40.  doi:10.3969/j.issn.1006-2475.2010.08.011
    Asbtract ( 917 )  
    Related Articles | Metrics
    ased on the method of custom packet and the simulation software of OPNET Modeler, the network traffic background of the enterprise is explained and layer 3 modeling mechanism based on OPNET Modeler is analyzed. The producing module and the processing module that all based on custom packet are set respectively. Thus, the layer 3 module of processnodenetwork is carried out, achieving the statistical data of network throughput and pointtopoint utilization.
    Design and Implementation of Fee Adding System Based on DCBI System
    CAI Hong-min
    2010, 1(8):  41-43.  doi:10.3969/j.issn.1006-2475.2010.08.012
    Asbtract ( 900 )  
    Related Articles | Metrics
    With the great development of computer network and the popularity of PC, the number of campus network users become more and more, and it brings forth so much work to network administrators. The paper takes a secondly development to the DCBI system and develops the batch fee adding system, and it greatly increases the efficiency.
    Design and Implementation of P2P-based VOD System
    DAI Qi;XIA Qing;GU Chun-hua;GAO Xiao-wu
    2010, 1(8):  44-46.  doi:10.3969/j.issn.1006-2475.2010.08.013
    Asbtract ( 1715 )  
    Related Articles | Metrics
    The development of Internet led to the development of IPbased Internet applications, including video downloads. However, the traditional video download service mainly uses C/S mode, in which the server connect to each client by unicast method. With the rapid increase of clients, bandwidth and other resources of the server are consumed very quickly. P2P technology as a solution to solve these problems, becomes more and more popular. This paper puts forward two algorithms, sorting of download and playing control. Subsequently based on the open source software JTorrent, the system is changed to suitable for streaming media transmission.
    操作系统
    Design of Custom IP Core in SOPC Based on FPGA
    LI Xiang-dong;HU Huai-wei;HAO Lu-jun;YAN Xin-fen
    2010, 1(8):  47-51.  doi:10.3969/j.issn.1006-2475.2010.08.014
    Asbtract ( 1732 )  
    Related Articles | Metrics
    The FPGA based on the SOPC is one of the last technologies in electronic design fields. Custom IP core is the important embodiment of the SOPC system flexibility, and is most important in the design of the SOPC system. This paper describes the design of custom IP core and the design flow using SOPC Builder, taking EP1C6Q240C8 for example that belongs to Cyclone series made by ALtera Co. On the condition of Quartus II8.0, the hardware of sevenLED is designed by Verilog language. On the condition of NiosⅡIDE, the API to access and control the hardware equipment is developed by C language.
    人工智能
    Research on Extenics Representation of Uncertain Knowledge and Reasoning
    YAN Ying-zhan;FANG Xiao;MA Jian;GONG Shu
    2010, 1(8):  52-54.  doi:10.3969/j.issn.1006-2475.2010.08.015
    Asbtract ( 898 )  
    Related Articles | Metrics
    Through the description for representation of knowledge and extenics, the paper proposes a new uncertainty knowledge representation based on the credibility. First, it uses of heuristic reasoning to improve reasoning’s strategy, so that to obtain the Extension Heuristic Search Algorithm (EHSA). In the final, it proves that the methods and reasoning’s strategy is superiority.
    Robot Soccer Shooting Algorithm Based on Hermite Interpolation Curve
    FAN Zong-tao;XU Dong-lai
    2010, 1(8):  55-57.  doi:10.3969/j.issn.1006-2475.2010.08.016
    Asbtract ( 915 )  
    Related Articles | Metrics
    Robot soccer competition is a emerging field about artificial intelligence research, the field includes mathematical algorithms, multiagent, mechanical design, control theory and so on. During robot soccer competition, shooting and passing are two basic action. The speed, accuracy, consistency are the key to improve the efficiency of action. This paper presents a shooting algorithm based on Hermite interpolation curve. The robot can meet a certain speed and complete shooting action continuous and accurate because of the mathematical of Hermite interpolation curve. The experiment in FIRA5: 5 simulation platform proves that this method can better improve the efficiency of shooting.
    A Method for Linear Temporal Logic Programs Model Checking Based on Büchi Automaton
    LUO Qing-sheng
    2010, 1(8):  58-61.  doi:10.3969/j.issn.1006-2475.2010.08.017
    Asbtract ( 873 )  
    Related Articles | Metrics
    Formal verification of temporal logic programs plays an important role in improving program correctness. Corresponding Büchi Automaton is constructed based on automata theory, in which labeled transition system(S) indicating programs’ acts, temporal logic formulas(F) indicating programs’ property. Thus, it proves that whether formal formula S |=F is satisfiable or not.
    应用与开发
    Study of Webbased Framework Based on MonoRail, Castle and NHibernate Architecture
    GAO Rong;GUO Xing;LI Yue-xin
    2010, 1(8):  62-66.  doi:10.3969/j.issn.1006-2475.2010.08.018
    Asbtract ( 1569 )  
    Related Articles | Metrics
    This paper focus on patterns of enterprise application architecture research, and then provides a 4Tier architecture model of enterprise application which is based on MonoRail, Castle and NHibernate framework. This paper mainly describes about each framework plaing what role and providing a general method that is fit for developing enterprise application. In this method, MonoRail is used to build the Web presentation layer; Castle is used to manager the business logic component and NHibernate is used to persist data. At last, a project is implemented by the designed architecture. The result shows the system doesn’t depend on platform, and has the characteristics of high maintainability, expansibility and reusability.
    Research and Implementation of Statistical Analysis Methods for Examination Scores Management in Xinjiang High School Student’s Learning 
    MamatAyup;Muradiljan Ablimit;Askar Hamdulla
    2010, 1(8):  67-70.  doi:10.3969/j.issn.1006-2475.2010.08.019
    Asbtract ( 912 )  
    Related Articles | Metrics
    According to the actual applying requirement of the Xinjiang High School Student’s Learning Level Exam(XJXK) Information Management System, for the purpose of establishing a fair learning level assessing system and upgrading the trusting level of the learning level exam, taking the teaching resources, educating conditions and the area distributional characteristics of students’ studying situations into consideration, this paper researches on the scientific method of score statistics and the algorithm flow, and uses it in the XJXK information system, accomplishes all the statistic functions in the XJXK scoremanage subsystem, provides the design and process of the subsystem using JSF+Spring+Hibernate framework. The implementation results of the algorithms show good feasibilities and effectiveness in practice.
    Design and Implementation of PDAphonebased Instant Remote Teleconsultation System
    XU Xiao-mei;JIANG Wei-wei;PENG Chun
    2010, 1(8):  71-73.  doi:10.3969/j.issn.1006-2475.2010.08.020
    Asbtract ( 1645 )  
    Related Articles | Metrics
    Remote teleconsultation by specialists is important for timely, correct, and specialized emergency surgical and medical decision making. In this paper, a PDAphonebased instant remote teleconsultation system is designed by combining wireless communication with WiFi interfaced local wireless links and 3G wireless communication technology. This system can provide a more effective means of emergency teleconsultation without requiring the user to be limited to a fixed location. Moreover, it enables synchronized radiological image sharing between the attending physician in the emergency room and the remote specialist on picture archiving and communication system terminals without distorted image acquisition. To enable rapid and finequality radiological image transmission over a cellular network in a secure manner, progressive compression and security mechanisms are incorporated. This system may be critical in increasing patients’ chances of survival, and have a practical significance.
    Design and Implementation of Expert System for Operation Monitoring
    GUO Hua-wei
    2010, 1(8):  74-76.  doi:10.3969/j.issn.1006-2475.2010.08.021
    Asbtract ( 825 )  
    Related Articles | Metrics
    Fault tree and expert system are introduced to the monitoring analysis of KPI for mobile operators. Operation monitoring expert system is designed and implemented successfully. This paper introduces the basic scheme and designing theory and gives a detailed description of the design of knowledge base. The system can find the operational risk of operators quickly and accurately, and then give the constructive suggestions.
    Research on Modeling for City’s Underground 3D Pipe Network
    CHEN Ya-dong;HU Jian-ping;WANG Li
    2010, 1(8):  77-79.  doi:10.3969/j.issn.1006-2475.2010.08.022
    Asbtract ( 878 )  
    Related Articles | Metrics
    With the development of urban modernization,urban underground spatial information is a key point of urban underground pipe network sharing. Based on modeling of virtual reality technology, this paper proposes a threedimension pipe network modeling. The 3D underground pipe network is realized, and the urban geographical distribution information of over ground and underground are managed and analyzed, which provides the decisionmaking platform of 3D visualization for urban planning, construction and geological prospecting and so on.
    Research and Implementation of Data Acquisition Strategy in Power Quality System
    ZHAO Dong-xu;MA Su-xia;LIN Tian-hua
    2010, 1(8):  80-84.  doi:10.3969/j.issn.1006-2475.2010.08.023
    Asbtract ( 909 )  
    Related Articles | Metrics
    The data acquisition mainly refers to the collection of PQDIF (Power Quality Data Interchange Format)files. In this paper, an efficient and reliable data acquisition strategy is given through analyzing the source of PQDIF files and the data requirements of Power Quality Intelligent Information System. The collection strategy of PQDIF files includes both automatic collection and manual collection. The traditional multithreaded FTP technology is improved, thus the PQDIF files being created in a certain period time can be collected, which provides the Power Quality Intelligent Information System with reliable and realtime basis data sources.
    Research on Key Technology of Water Resources Monitoring System Based on Wireless Sensor Networks
    ZHAO Li-hua;FAN Jun-qing
    2010, 1(8):  85-88.  doi:10.3969/j.issn.1006-2475.2010.08.024
    Asbtract ( 879 )  
    Related Articles | Metrics
    With the application of wireless sensor expanding unceasingly in the military and industry fields, its effect is outstanding even more. Combining with QinghaiTibet Plateau water resource environmental monitoring system, this paper focus on the analysis of connectivity coverage problem in the random deployment of wireless sensor, and gives some solutions. It provides the basic theory for stochasticdeployed application in wireless sensor networks.
    PHP-based Online Testing System of Higher Mathematics
    HE Bing-rong
    2010, 1(8):  89-91.  doi:10.3969/j.issn.1006-2475.2010.08.025
    Asbtract ( 847 )  
    Related Articles | Metrics
    In environment of Apache + PHP + MySQL, using database records stored graphic file name, the problem of mathematical formulas inputting and outputting in Web pages is solved. The paper describes the software design and implementation methods, which with the features of short procedures, stable, easy to use, fast characteristics. It means to initial study in the fields.
    Object Detection Based on Visual Selective Attention Mechanism
    WEI Ling-li;LI Cui-bin
    2010, 1(8):  92-94.  doi:10.3969/j.issn.1006-2475.2010.08.026
    Asbtract ( 844 )  
    Related Articles | Metrics
    The paper puts forward two ways to improve the speed and quality of designing program. The text box, label, picture box and so on can be recognized automatically by programs and can be printed by the program for controls to realize automation of printing. It also introduces practical technique of print preview and realizes printing of complicated forms.
    Design and Implementation of CRM Interface Based on WebService
    YU Shi;HONG Chunyong;CHEN Meng
    2010, 1(8):  95-97.  doi:10.3969/j.issn.1006-2475.2010.08.027
    Asbtract ( 1742 )  
    Related Articles | Metrics
    With the rapid popularization of network services, the number of broadband access users increasingly diverse. Therefore, telecom operators urgent need to develop pretreatment systems in order to increase the response speed of foreground business system, and improve the processing capacity, service quality and the customer satisfaction. As the pretreatment systems need to integrate multiple business systems’ functions, it must achieve crossplatform communication between varieties of heterogeneous systems. For WebService is a common model that can run at any operating platforms that supporting network communication. Based on WebService, this paper analyzes the Customer Relationship Management (CRM) interface, meanwhile introduces the method of design and realization.
    Research and Application of Quartz and Web Integration
    HU Li-qiang;ZHOU Dong-chu;WANG Wei
    2010, 1(8):  98-99.  doi:10.3969/j.issn.1006-2475.2010.08.028
    Asbtract ( 951 )  
    Related Articles | Metrics
    Quartz is an open source framework of task scheduling. It is pure Java, and mainly applies to J2SE and J2EE. It can create simple or complicated task jobs and execute them. This article simply introduces the core mechanism of Quartz and list process, and the method of scheduler realization in Web. 
    Design and Development of Templatebased Multimedia Question Creating System
    WU Dan;WU Yong-he
    2010, 1(8):  100-104.  doi:10.3969/j.issn.1006-2475.2010.08.029
    Asbtract ( 875 )  
    Related Articles | Metrics
    To improve the quality of multimedia questions which have simple presentation, poor interaction and low reusability and to solve the problem of complex operations of question creating tools, this paper designs and implements a templatebased multimedia question creation system. This paper institutes the types of multimedia questions based on analysis of the test questions used in the practice of teaching in the experimental area, and designs a variety of interactive multimedia templates for each type of questions. With the use of XML technology to describe the question, this study has implemented the question creating system.
    Research on Page Elements Configuration of Multi-Tenant Application
    JIANG Shi-chao;ZHANG Sheng-wen
    2010, 1(8):  105-108.  doi:10.3969/j.issn.1006-2475.2010.08.030
    Asbtract ( 891 )  
    Related Articles | Metrics
    This paper first introduces the MultiTenant and analyses page elements personalized customization of MultiTenant within the SaaS(Software as a Service), summeds up and evaluates some viable schemes. At last, it discusses the using conditions of these schemes.
    Solution of Data and Business Process Integration Based on AESB in Digital Campus
    HUANG Chen-hui;LIN Yong-qin
    2010, 1(8):  109-112.  doi:10.3969/j.issn.1006-2475.2010.08.031
    Asbtract ( 1653 )  
    Related Articles | Metrics
    It is hard to implement a large and comprehensive system, so it cries for a solution that several systems coexist and interconnect inside enterprises or inside campus. This paper gives a solution how to implement data integration by using the technique of automatic exchange of intermediate tables based on AESB, and implements crosssystem’s business process integration based on Web Services composition as a compensation of data exchange method. The results show that the solution withstands stress testing and goes well. 
    Design of Network Monitoring Platform for Middlesmall Hydropower Station
    YU Gang;ZHANG Junmin;DAI Wei
    2010, 1(8):  113-116.  doi:10.3969/j.issn.1006-2475.2010.08.032
    Asbtract ( 840 )  
    Related Articles | Metrics
    This paper describes the design of a network monitoring platform for middlesmall hydropower station, including system design objectives, system design contents, key technologies, system components and general block diagram of software.
    Coalmine Gas Density Realtime Monitor Alarm System Based on LabVIEW
    QIU Yong-hua
    2010, 1(8):  117-119.  doi:10.3969/j.issn.1006-2475.2010.08.033
    Asbtract ( 905 )  
    Related Articles | Metrics
    Through the LabVIEW programming, this article designs a coalmine gas density realtime monitor alarm system, and uses the DataSocket programming technology, provides the condition service of the Internet longdistance realtime monitor coalmine gas density for the user.
    Analysis of RTTI Realization
    HE Hong-hui;LIU Ji-yu
    2010, 1(8):  120-123.  doi:10.3969/j.issn.1006-2475.2010.08.034
    Asbtract ( 938 )  
    Related Articles | Metrics
    After compiling a source file by C++ compiler, the class definition information isn’t remained in object file. Therefore, the program at runtime can’t acquire the class information, such as class name,class hierarchy and so on, and consequently many operations such as dynamic_cast, persistence are impossible to be completed. RTTI is the key to conquer this problem. Although a great deal of importance is attached to RTTI, many C++ programmers are still confused by RTTI realization. In this paper, a concrete RTTI is realized, and it gives C++ programmers a chance to have a glimpse of RTTI realization. 
    Design and Implementation of Distance Education System Based on .NET
    WU Yan-hua;CHEN Xin;LIU Tian-feng
    2010, 1(8):  124-127.  doi:10.3969/j.issn.1006-2475.2010.08.035
    Asbtract ( 823 )  
    Related Articles | Metrics
    Remote education system based on .NET is developed according to the special requirement. The development and application of the system is achieved to make the management for the school formalized, standardized and scientific. The .NET technology is adopted in this system. The function design and the implementation are discussed in detail. 
    Design and Implementation of Web Query Based on JQuery Framework
    YANG Xu-shi
    2010, 1(8):  128-129.  doi:10.3969/j.issn.1006-2475.2010.08.036
    Asbtract ( 892 )  
    Related Articles | Metrics
    JQuery is an excellent crossplatform JavaScript framework of browser. It strengthens operators between HTML and JavaScript, also supports AJAX API to simplify interaction for Web application. The article describes the concept and principle of JQuery framework by a query instance applied in Java Web.
    图像处理
    Key Frame Interpolated Character Animation Based on Hermite Spline
    YUAN Quan;ZHANG Jian-zhong;ZHANG Jian-ping
    2010, 1(8):  130-134.  doi:10.3969/j.issn.1006-2475.2010.08.037
    Asbtract ( 836 )  
    Related Articles | Metrics
    Aiming at the smoothness problem in key frame character animation, this paper proposes an interpolation method which is based on Hermite spline curve integrating with quaternion spherical linear interpolation, and implements smoothness transition of character motion via interpolation in the key frames of skeleton motion based on motion capture data. Many experiments demonstrate that this method can be widely used in humanoid animation due to this method is easy and the result of the motion is smooth.
    Design and Implementation of License Plate Character Segmentation Algorithm
    ZHAI Wei-fang;HU Ya-ying;TIAN Yu-long
    2010, 1(8):  135-139.  doi:10.3969/j.issn.1006-2475.2010.08.038
    Asbtract ( 1025 )  
    Related Articles | Metrics
    Vehicle license plate recognition system is applied in a wide range of areas such as the bridge, the junction of automatic toll collection, parking unattended, automatically records of the vehicle regulations. By studying on character segmentation in the license plate system, and on the basis of gradient sharpening and noise removal of discrete miscellaneous points, the paper proposes a simply divide method by progressive and column scan, and applies it to characters in rapid segmentation of license images, the accuracy is improved significantly.
    Video Watermarking Algorithm for Interframe Prediction Block Partition Based on H.264 Encoded
    YIN Hui
    2010, 1(8):  139-142.  doi:10.3969/j.issn.1006-2475.2010.08.039
    Asbtract ( 826 )  
    Related Articles | Metrics
    Studing on one kind of H.264 encoded video watermarking interframe prediction block division algorithm, the algorithm carries on two values of the watermark image processing and scrambling through the Arnold, then selects a different block division in H.264 interframe prediction encoding according to the two values sequence of the watermark, and embeds the watermark value into it. Experimental results show that the algorithm has good timeliness, robustness.
    Implementation of Face Detection Based on AdaBoost Algorithm in Embedded System
    LI Xian-feng;HUA Xiao-peng;ZHAO Feng;KONG Ling-dong
    2010, 1(8):  143-146.  doi:10.3969/j.issn.1006-2475.2010.08.040
    Asbtract ( 847 )  
    Related Articles | Metrics
    To solve the technical problem of realtime face detection and break through the bottleneck of AdaBoost algorithm, a hardware acceleration strategy based on FPGA is used to calculate the integral squared image by pipeline architecture. The system can detect a face in 352×288 image at a speed of 50 fps on PowerPC405 VirtexTMII Pro FPGA platform, and achieve a detection rate of 98% with a false alarm rate of 1%, so it can meet the requirements of realtime face detection.
    Color Image Segmentation Method Based on RGB Color Space
    YANG Jing;ZHU Lei
    2010, 1(8):  147-149.  doi:10.3969/j.issn.1006-2475.2010.08.041
    Asbtract ( 1445 )  
    Related Articles | Metrics
    The classical image threshold segmentation algorithm converts the color image to grayscale image before segmentation. On the base of analysis upon the characters of RGB color space, the article proposes an image segmentation algorithm based on RGB color space which uses the new criteria to replace the tetrahedral with the cube in color space and segment the color image. The analysis and experimental results indicate that the improved criteria can overcame the wrong which caused by gray degrees conversion and color information lose. As classical algorithm, it is fast and easy to segment the color image. It is suitable to segment the image, which has black target, and can be used to other colors.
    软件工程
    Automatic Testing Approach for Web Service
    ZHAI Ya-juan;ZHAO Hui-qun
    2010, 1(8):  150-156.  doi:10.3969/j.issn.1006-2475.2010.08.042
    Asbtract ( 975 )  
    Related Articles | Metrics
    Web Service is a standardsbased architecture and XMLbased messaging technology. The language and platformindependence characteristics bring difficulties on testing. For the diverse possibilities of languages and platforms of Web Service, an efficient mapping approach for Web Service ATU with TTCN3 is proposed, which can accommodate all varieties of client types. This paper designs an algorithm for the automated generation of the ATU. In addition, this paper presents the process of the test approach via a test case, illustrates that specifying test suites at an abstract level in TTCN3. The test suites are language and platformindependent and can be reused by diverse types of clients.
    A Solution of Public Service Platform Based on SaaS
    NIU Bo;;ZHAO Wei-dong;
    2010, 1(8):  157-160.  doi:10.3969/j.issn.1006-2475.2010.08.043
    Asbtract ( 870 )  
    Related Articles | Metrics
    This paper analyzes the character of SaaS model briefly in the first. Furthermore, a public service platform based on SaaS model, including operation management module and service management module and etc, is put forward. Then the paper discusses the function and the process of the platform, and the preliminary design that used to implement the platform. After thinking about metadata, multitenant data model and security model, a kind of solution to primary implement a SaaS service platform is given.
    Semantic Service Message Matching Based on Linear Logic in Service Composition
    LIN Yong-xing;WANG Peng-ying;QIU Jian-feng;XU Hai-chang;WANG Yue
    2010, 1(8):  161-166.  doi:10.3969/j.issn.1006-2475.2010.08.044
    Asbtract ( 1455 )  
    Related Articles | Metrics
    The paper proposes a method for semantic message matching in automatic service composition. It develops a framework in which the exported message description and behavior description of a service, and represents the behavior of a service with a finite state machine. Since the service interface definition can be represented by ontology concepts, and the service behavior can be represented using linear logic formulas, so the inference rules of linear logic can check the matchability and satisfyability of service message. Meanwhile, it extends the inference rules of linear logic for service composition.
    Research on Support Platform Based on ESB for Public Health Emergency System
    XU Xue-dong;SUN Wei;JI Cai-wei
    2010, 1(8):  167-171.  doi:10.3969/j.issn.1006-2475.2010.08.045
    Asbtract ( 868 )  
    Related Articles | Metrics
    The key of researching Public Health Emergency System (PHES) is to achieve the standardization of the interactive process, to meet the needs of heterogeneous data exchange and the demand for business process reengineering. A Public Health Emergency Supporting Platform (PHESP) based on ESB is present, which takes use of the ESB as infrastructure for information exchange and integration, through adapting behavior rules for service to achieve business process modeling, and through the interpretation and implementation of the rules of BPEL engine to achieve business processdriven, dealing and scheduling. Finally, an example is introduced the generating and runing the process of PHESP in emergency system.
    Implementation and Application of User Interest Model Based on RSS Data Source
    GUO Li-jun
    2010, 1(8):  172-175.  doi:10.3969/j.issn.1006-2475.2010.08.046
    Asbtract ( 833 )  
    Related Articles | Metrics
    In the research field of user interest model based on RSS data source, a user interest model with tree structure, which has three layers such as user points, information sorts, and user interest classes, is designed and implemented. The model is applied to the field of agricultural information, and it contributes to the construction of agricultural information.
    Research and Application of Development Platform Based on Java EE
    ZHANG Yi
    2010, 1(8):  176-181.  doi:10.3969/j.issn.1006-2475.2010.08.047
    Asbtract ( 828 )  
    Related Articles | Metrics
    During the design of Web application based on Java EE, it is difficult to solve the problem happened in the transformation of application from Client/Server structure to Browser/Server structure, such as, the interaction between widgets of the user interface in thin client that cannot be achieved, and the complex UI is difficult to be implemented. The SmartJavaEE Platform combines the benefits of the C/S structure and the B/S structure, and resolves the problem mentioned above. 
    Verification Design Flow for Embedded Software in Specman
    YAN Xiao-bing;ZHANG Yi
    2010, 1(8):  182-184.  doi:10.3969/j.issn.1006-2475.2010.08.048
    Asbtract ( 862 )  
    Related Articles | Metrics
    This paper introduces a design flow for embedded software verification based on Specman. This design flow is implemented in verification of USB driver under Linux. An existing bug in earlier version of the driver is identified successful.
    Application Research of Office Automation System Based on J2EE
    YANG Yang;JIA Jun-jun;LI Wei-wei
    2010, 1(8):  185-187.  doi:10.3969/j.issn.1006-2475.2010.08.049
    Asbtract ( 965 )  
    Related Articles | Metrics
    As the development of computer science and network technology, informationization has become an important method to implement management. As a key node of enterprise informationization, after 20 years development, Office Automation(OA) has been to the stage of application. In the paper, the existing OA system architecture is analyzed. The main parts of the system construction are discussed. The system implementing experience and application situation are summarized. The results show that the OA system can satisfied the requirements of enterprise management, and is important to promote the enterprise management and run efficiency.
    Study and Design on CollaborationOA Based on J2EE Platform
    HE Bi-lian
    2010, 1(8):  188-190.  doi:10.3969/j.issn.1006-2475.2010.08.050
    Asbtract ( 1502 )  
    Related Articles | Metrics
    Today the E-government has played an important role in the national economy information establishment, and has had the revolutionary influence to the traditional running pattern of the government. The prompting of Egovernment system establishment has already become the key of national information system establishment. Under this background, this paper researches the design of an OA system, analyzes J2EE platform technologies, and tries to provide a worthy reference for system establishment.
    [
    信息安全
    Research on Signcryption Algorithm Based on ECC in RFID
    LI Chun-hua;ZHANG Wei
    2010, 1(8):  191-193.  doi:10.3969/j.issn.1006-2475.2010.08.051
    Asbtract ( 1678 )  
    Related Articles | Metrics
    Based on signcryption process of reader and label in the RFID system, this paper proposes a signcryption algorithm based on elliptic curve crypto system, and solves a security problem about asynchronous of encryption and certification in RFID system. The algorithm uses the obscure of elliptic curve crypto system, and has an advantage of DLP design with its shorter key, higher security and flexibility. Most of all, it have a lower communication cost and higherlevel security.
    Analysis on Capacity of Network Management Based on User Behavior Model
    MEI Zhen-kun;HUANG Jia-lin
    2010, 1(8):  194-197.  doi:10.3969/j.issn.1006-2475.2010.08.052
    Asbtract ( 1622 )  
    Related Articles | Metrics
    Existing network management models generally focus on the management of network device itself, it is unlikely to adapt to present the increasingly complex network management. Based on user behavior model from the user’s point of view, this paper analyzes network related user behavior, and manages the user behavior based on the strategies of the user’s standard network behavior management. Thereby eliminates the undesirable network behavior on the network performance and security implications, so that network can be safe and stable manner, and significantly reduce the network administrator’s burden. This paper discusses the key issues of the network management based on user behavior model, and presents and analyzes the model should have four capabilities: sensing capability, control capabilities, the ability of evidence and the capacity of inform. Finally discusses their practical network management application, and proves their availability.
    A Hybrid Key Predistribution Scheme for HWSN
    ZHANG Yin;SHAN Hong
    2010, 1(8):  198-202.  doi:10.3969/j.issn.1006-2475.2010.08.053
    Asbtract ( 813 )  
    Related Articles | Metrics
    A hybrid key predistribution scheme for heterogeneous wireless sensor networks is proposed. It deploys different methods to establish keys for heterogeneous nodes. Advanced nodes authenticate each other and reach key agreement using identitybased cryptography and common nodes establish pairwise key using random key predistribution method based on oneway hash chain. The pairwise key is established by key agreement and shared key discovery which takes advantage of public key and random key predistribution method. The analysis and simulation show that the proposed scheme performs well in terms of security connectivity and antiattack by the combination of characteristic of heterogeneous nodes and hybrid key management.
    Research and Design on Intrusion Detection System Based on WLAN
    WEI Guang-ke
    2010, 1(8):  203-206.  doi:10.3969/j.issn.1006-2475.2010.08.054
    Asbtract ( 899 )  
    Related Articles | Metrics
    As a security technology,WLAN intrusion detection technology plays an important role in the security of the WLAN network and system. Some intrusion ways are analyzed, and the intrusion detection techniques are discussed. Architecture of the WLAN intrusiondetection system (WIDS) is designed. The logic structures are given, functions in the WIDS and implementation technique are expatiated detailed finally, and the realization of the WIDS is researched and discussed.
    Research on Dynamically Optimizing Firewall Rules Based on Haffman Tree
    HE Xiang-bin;ZHOU Cong
    2010, 1(8):  207-210.  doi:10.3969/j.issn.1006-2475.2010.08.055
    Asbtract ( 861 )  
    Related Articles | Metrics
    With the increasing of the network function, the filtration ruleset in the firewall becomes more and more, which has affected the overall performance of network seriously. This paper proposes an optimization method that adjusts the rules in the firewall accord to the characteristics of network traffic dynamically. In this way, data packets matches the rules that have matched more data packets firstly, then reduces the time of filtering data packets.
    计算机仿真
    Design and Implementation of Simulation System for Bimodal Vehicular Speech Control
    YAN Le-pin;FENG Xiao-hui
    2010, 1(8):  211-215.  doi:10.3969/j.issn.1006-2475.2010.08.056
    Asbtract ( 1571 )  
    Related Articles | Metrics
    In order to improve the recognition correct rate for audiovisual bimodal speech recognition in noise environment, this paper designs and implements a speech recognition system. This system simulates car environment and puts the speaking video information into speech recognition system. This system consists of three parts, model training, offline recognition and online recognition. Online recognition using voice as humancomputer interaction, has the function of adaptive user. Offline recognition has an analysis of data at different levels for system to produced, it is very suitable for bimodal speech recognition.
    Design and Implementation of Replay Platform for Simulated Robot Soccer Competition
    WANG Li;QIN Xin;YANG Lin-quan
    2010, 1(8):  216-218.  doi:10.3969/j.issn.1006-2475.2010.08.057
    Asbtract ( 1433 )  
    Related Articles | Metrics
    The replay platform for simulated robot soccer competition is not so maturation, so, it is very necessary to develop a replay platform to help designers to analyze strategy. This paper mainly introduces the structure design and specific functions of the replay platform. The application of multithreading and double buffering technologies has achieved smooth and vivid replay of simulated robot soccer competition.
    Simulation and Study on Performance of Multihop Ad Hoc Network Based on NS2
    ZHOU Shao-qiong;XU Yi
    2010, 1(8):  219-222.  doi:10.3969/j.issn.1006-2475.2010.08.058
    Asbtract ( 877 )  
    Related Articles | Metrics
    NS2 is a free and powerful network simulation software. Wireless Ad Hoc networks are termed as selforganized wireless networks, and network performance is always a core problem in its research. The detail simulation progress of Ad Hoc networks typical routing protocol using NS2 based on Window + Cygwin is introduced. The TCL script program, performance analysis gawk programs, the simulating result graphs and some performance analysis are explained clearly. According to the results, some performances such as the getratio and routecost have decreased sharply with the increase of tops.