Home > Highlights of Sciencepaper Online > Current Issue

 
 
 
ISSN 1674-2850
CN 11-9150/N5
 
Current Issue
Previous Issue  |  Next Issue
October 30,2011
Volume 4,Issue 20
Pages -
Subject Area:Computer Engineering,Computer Applications,Data Security and Computer Security,Computer Image Processing,Computing Neural Network,Computer Software,Computer Architecture
 
Title: Three-dimensional visualization system for individual korean larch
Authors: LIU Wei, GAO Xindan, LI Yonghao, SUN Kaitao, WU Shaoyang
PP: 1903-1907
Abstract: A three-dimensional visualization system for individual korean larch was established based on the collected growth model and the OpenGL graphics library. Taking MFC as the programming language and VC++ as the development tool, the paper completed the development of visualization system. Through the system, one can use only a few parameters to simulate the morphology in any year of the plant. The system is can be used in computer aided instruction in forestry.
Keywords: computer engineering; visualization; three dimensional; growth model; system implementation
 
Title: Design and implementation of network camera based on DM355
Authors: HUANG Yanqiu, YU Wanli, HUANG He, DING Enjie
PP: 1896-1902
Abstract: The design and implementation of network camera are put forward based on embedded Linux and DaVinci Series digital media processor TMS320 DM355. The system uses the V4L2 (kernel driver of video device) of embedded Linux operating system to write drivers for video capture. The video streams are compressed based on MPEG-4 standard which are collected by the co processor of DM355, and it is realized that the compressed streams are transmitted in network based on real-time transport protocol (RTP) and real-time transport control protocol (RTCP) of embedded Web server and streaming media servers.
Keywords: computer application; network camera; DM355; Video4Linux2; real time streaming protocol
 
Title: Research on cluster-based topology control algorithm for wireless sensor networks
Authors: CUI Kexiang, LI Zhihua
PP: 1889-1895
Abstract: For large-scale deployment of sensor networks, cluster-based topology control algorithm mechanisms have been presented. Several representative algorithms are analyzed and compared with each other. LEACH algorithm is selectively researched particularly for providing foundation for further research. Finally, existing problems and open issues are analyzed and summarized, and the further research trends are also pointed out.
Keywords: computer application; wireless sensor network; cluster-based topology control; clustering; LEACH algorithm
 
Title: Pork price prediction research based on dynamic combination technology
Authors: ZHOU Quan, LI Yang, LU Lili, CHEN Chen
PP: 1882-1888
Abstract: By analyzing the results of existing research of pork prices forecast in the domestic and foreign country, and according to China\'s national conditions, this paper established a price impact index, proposed dynamic combination forecast techniques, and created a dynamic combination of predictive models. Through experiment, the paper compared the three models, which were BP neural network method for predicting, minimum prediction error squares as the objective function of the prediction model and dynamic combination model of two methods. The results show that dynamic combination forecast method has the advantage of high accuracy.
Keywords: computer application; price expectation; dynamic combination; pig price
 
Title: Method for eliminating false positives of cloned code detection with Hash value and identifier conflict ratio
Authors: BIAN Yixin, WANG Tiantian, SU Xiaohong, MA Peijun
PP: 1877-1881
Abstract: There are some disadvantages when detecting syntax similar clone code with clone code detection method based on token method. To solve these problems, this paper proposes a method to eliminate part false detection of clone code detection with statement Hash value and identifier conflict ratio. At first, statement Hash value was compared to determine the statement structure similarity. Then the identifier conflict ratio was computed to decide the direction of false detection elimination and results. Finally, the statement relative line number is modified to eliminate false detection. The experimental results show that the method can eliminate clone code false detection caused by inserting the same structure statement and the reverse order statements of same structure. It improves the accuracy of clone code detection and clone code related defects as well as benefits the study of clone code refactoring.
Keywords: computer application; clone code; Hash value; identifier conflict ratio; false detection; refactoring
 
Title: Improved PSO-based clustering routing algorithm for WSN
Authors: XIA Jiwen, MA Fuchang
PP: 1871-1876
Abstract: In order to prolong the network lifetime for wireless sensor network (WSN), an energy-efficient mechanism of cluster-head selection and formation of clusters is needed to be designed to adapt to the characteristics of (wireless sensor network, WSN). Therefore, this paper proposes an improved routing algorithm (NAPSO-CA). In the fitness function, according to the energy distribution of nodes, the weighting average of distance in clusters is defined based on residual energy of nodes, also taking into consideration the factors of proportion of nodes and cluster-heads' average residual energy, the average transmission energy dissipation of network. In formation of clusters, blending to a new competition mechanism F, the factors of cluster-heads' energy and distance to base station are included, and the simulation analysis is carried out. The simulation results show that the modified algorithm makes cluster-head distribution more even, balances network energy and is considered an effective method to solve the minimization problem of the energy consumption of WSN.
Keywords: computer application; wireless sensor network; nonlinear adaptive particle swarm optimization; clustering routing; weighting average of distance in clusters
 
Title: Semi-automatic generation of mini-ontology from Deep Web
Authors: CHEN Kerui, ZUO Wanli
PP: 1863-1870
Abstract: The paper describes the problems in the data record extraction methods of Deep Web research, and accordingly proposes a method combining query interface and query result to semi-automatically build domain-specific ontology. The ontology model can assist the process of extracting deep web result pages. Experimental results show that the method can get more comprehensive concepts and simpler domain ontology.
Keywords: compute engineering; Deep Web; domain ontology; attribute extraction; query example
 
Title: Application and research of EV SSL certificate in electronic commerce security
Authors: CHEN Hongsong, ZHANG Dongyan, FU Zhongchuan
PP: 1856-1862
Abstract: Extended validation security socket layer (EV SSL) is used for solving the rapidly arising problem of online fraud. The development background, security enhancement, visualization and application of EV SSL are introduced in the paper. A novel initial method in Kailar logic is proposed to analyze EV SSL certificate security. In current, EV SSL takes a leading position in most secure Web browser versions of the whole world, and its adoption rate is rising step by step.
Keywords: network security; EV SSL certificate; electronic commerce; visualization
 
Title: Multi-secrets visual secret sharing based on random grids
Authors: GAO Caiyun, CAO Tianjie
PP: 1851-1855
Abstract: The paper briefly describes the (r, n) visual secret sharing. Using random grid which is used to encode images, a multi-secrets visual secret sharing is presented. Visual secret sharing can encode the secret image into number of shares, and they are distributed to more than one holders. Decoding the image does not need the help of computer, and it just need be identified by human's eye. This method can hide four images in the shares.
Keywords: computer application; visual secret sharing; random grids; multi-secrets
 
Title: A method for measuring sudden change degree of image pixels
Authors: LIU Jianzhong
PP: 1846-1850
Abstract: This paper uses examples to illustrate the fact that discrete curvature can not show the change of image pixels perfectly. To solve this problem, the paper comes up with a method to measure the sudden change degree. The method makes use of one certain point and two vectors which are organized by the chosen point and other two points before and behind the certain point. And then, the paper gives the definition that the point’s sudden change degree is just the changing angle which made by the latter vector comparing to the former vector. The experiment results show that the sudden change degree can better prove the change of image pixels than discrete curvature.
Keywords: image processing; discrete curvature; sudden change degree; image pixels
 
Title: Improvement of AODV routing protocol based on probabilistic forwarding
Authors: JING Wenli, LE Hongbing
PP: 1839-1845
Abstract: This paper researched Ad Hoc on-demand distance vector (AODV) routing protocol and gived a mechanism based on probabilistic forward.This mechanism chose different probabilistic forwarding Route REQuest (RREQ) through neighbor's numbers.The NS2 simulation results show that this idea can decrease delay and increase thoughput as well as packet delivery fraction ratio.
Keywords: computer network; wireless network; Ad Hoc on-demand distance vector; probabilistic forwarding; NS2; broadcast storm
 
Title: Ontology mapping approach based on rule learning
Authors: HEN Jianfeng, HU Wei
PP: 1833-1838
Abstract: This paper proposes a new approach for finding complex semantic mappings across ontologies by transforming the problem to a rule learning task. The approach, derived from the classical inductive logic programming (ILP), generates mappings in the form of Horn rules. Specifically, it utilizes existing instance mappings among ontologies to construct variable bindings for finding and validating semantic mappings. Different processing strategies are applied to classes and properties for improving the learning effectiveness. The experimental results demonstrate the feasibility of the approach.
Keywords: computer software; semantic Web; ontology mapping; inductive logic programming; rule learning; instance mapping
 
Title: Web service development process framework and case study
Authors: SUN Chang'ai, WANG Guan, ZHAO Yongmei
PP: 1828-1832
Abstract: Based on the introduction to web services related concepts and techniques, the paper proposes a development process framework for web services, examines steps and key issues of web services development with a general ATM system as a motivating example, and provides a brief comparison between the development of web services and the one of existing component models. The process framework and relevant discussions of key issues presented in this paper are very useful to the development of service oriented architecture (SOA) software based on web services.
Keywords: software engineering; Web services; service oriented architecture software; software development process
 
Title: Linux system transplantation and root file system construction based on S3C6410 platform
Authors: YE Xiaojun, GAO Yuanlou, YE Xiaotong
PP: 1814-1827
Abstract: This paper, taking Tiny6410 development board as system platform, analyzes the Linux system transplantation detailed based on S3C6410 microprocessor, and transplants device driver of NandFlash, DM9000 network card and yaffs2 files system to it. Finally, a basic root file system is constructed by the Busybox tools box. The test results demonstrate the success of the Linux system transplantation and root file system construction.
Keywords: operating system; S3C6410; Linux 2.6.36; Busybox; root file system
 
Title: Resource storage strategy on AmazingStore off-line download system
Authors: CAO Yue, LI Zhenhua, DAI Yafei
PP: 1806-1813
Abstract: A sophisticated storage strategy is called for to help the system stores the most valuable files.In this paper, after brief introduction, several strategies are evaluated by data set obtained from user download log, and the most ideal strategy is found after deep analysis on the performance evaluation.
Keywords: computer architecture; storage strategy; off-line download; cloud computing; distributed system; peer to peer