Current Issue |
|
|||
October 30,2011 Volume 4,Issue 20 Pages - Subject Area:Computer Engineering,Computer Applications,Data Security and Computer Security,Computer Image Processing,Computing Neural Network,Computer Software,Computer Architecture |
||||
Title: Three-dimensional visualization system for individual korean larch | ||||
Authors: LIU Wei, GAO Xindan, LI Yonghao, SUN Kaitao, WU Shaoyang PP: 1903-1907 Abstract: A three-dimensional visualization system for individual korean larch was established based on the collected growth model and the OpenGL graphics library. Taking MFC as the programming language and VC++ as the development tool, the paper completed the development of visualization system. Through the system, one can use only a few parameters to simulate the morphology in any year of the plant. The system is can be used in computer aided instruction in forestry. Keywords: computer engineering; visualization; three dimensional; growth model; system implementation |
||||
Title: Design and implementation of network camera based on DM355 | ||||
Authors: HUANG Yanqiu, YU Wanli, HUANG He, DING Enjie PP: 1896-1902 Abstract: The design and implementation of network camera are put forward based on embedded Linux and DaVinci Series digital media processor TMS320 DM355. The system uses the V4L2 (kernel driver of video device) of embedded Linux operating system to write drivers for video capture. The video streams are compressed based on MPEG-4 standard which are collected by the co processor of DM355, and it is realized that the compressed streams are transmitted in network based on real-time transport protocol (RTP) and real-time transport control protocol (RTCP) of embedded Web server and streaming media servers. Keywords: computer application; network camera; DM355; Video4Linux2; real time streaming protocol |
||||
Title: Research on cluster-based topology control algorithm for wireless sensor networks | ||||
Authors: CUI Kexiang, LI Zhihua PP: 1889-1895 Abstract: For large-scale deployment of sensor networks, cluster-based topology control algorithm mechanisms have been presented. Several representative algorithms are analyzed and compared with each other. LEACH algorithm is selectively researched particularly for providing foundation for further research. Finally, existing problems and open issues are analyzed and summarized, and the further research trends are also pointed out. Keywords: computer application; wireless sensor network; cluster-based topology control; clustering; LEACH algorithm |
||||
Title: Pork price prediction research based on dynamic combination technology | ||||
Authors: ZHOU Quan, LI Yang, LU Lili, CHEN Chen PP: 1882-1888 Abstract: By analyzing the results of existing research of pork prices forecast in the domestic and foreign country, and according to China\'s national conditions, this paper established a price impact index, proposed dynamic combination forecast techniques, and created a dynamic combination of predictive models. Through experiment, the paper compared the three models, which were BP neural network method for predicting, minimum prediction error squares as the objective function of the prediction model and dynamic combination model of two methods. The results show that dynamic combination forecast method has the advantage of high accuracy. Keywords: computer application; price expectation; dynamic combination; pig price |
||||
Title: Method for eliminating false positives of cloned code detection with Hash value and identifier conflict ratio | ||||
Authors: BIAN Yixin, WANG Tiantian, SU Xiaohong, MA Peijun PP: 1877-1881 Abstract: There are some disadvantages when detecting syntax similar clone code with clone code detection method based on token method. To solve these problems, this paper proposes a method to eliminate part false detection of clone code detection with statement Hash value and identifier conflict ratio. At first, statement Hash value was compared to determine the statement structure similarity. Then the identifier conflict ratio was computed to decide the direction of false detection elimination and results. Finally, the statement relative line number is modified to eliminate false detection. The experimental results show that the method can eliminate clone code false detection caused by inserting the same structure statement and the reverse order statements of same structure. It improves the accuracy of clone code detection and clone code related defects as well as benefits the study of clone code refactoring. Keywords: computer application; clone code; Hash value; identifier conflict ratio; false detection; refactoring |
||||
Title: Improved PSO-based clustering routing algorithm for WSN | ||||
Authors: XIA Jiwen, MA Fuchang PP: 1871-1876 Abstract: In order to prolong the network lifetime for wireless sensor network (WSN), an energy-efficient mechanism of cluster-head selection and formation of clusters is needed to be designed to adapt to the characteristics of (wireless sensor network, WSN). Therefore, this paper proposes an improved routing algorithm (NAPSO-CA). In the fitness function, according to the energy distribution of nodes, the weighting average of distance in clusters is defined based on residual energy of nodes, also taking into consideration the factors of proportion of nodes and cluster-heads' average residual energy, the average transmission energy dissipation of network. In formation of clusters, blending to a new competition mechanism F, the factors of cluster-heads' energy and distance to base station are included, and the simulation analysis is carried out. The simulation results show that the modified algorithm makes cluster-head distribution more even, balances network energy and is considered an effective method to solve the minimization problem of the energy consumption of WSN. Keywords: computer application; wireless sensor network; nonlinear adaptive particle swarm optimization; clustering routing; weighting average of distance in clusters |
||||
Title: Semi-automatic generation of mini-ontology from Deep Web | ||||
Authors: CHEN Kerui, ZUO Wanli PP: 1863-1870 Abstract: The paper describes the problems in the data record extraction methods of Deep Web research, and accordingly proposes a method combining query interface and query result to semi-automatically build domain-specific ontology. The ontology model can assist the process of extracting deep web result pages. Experimental results show that the method can get more comprehensive concepts and simpler domain ontology. Keywords: compute engineering; Deep Web; domain ontology; attribute extraction; query example |
||||
Title: Application and research of EV SSL certificate in electronic commerce security | ||||
Authors: CHEN Hongsong, ZHANG Dongyan, FU Zhongchuan PP: 1856-1862 Abstract: Extended validation security socket layer (EV SSL) is used for solving the rapidly arising problem of online fraud. The development background, security enhancement, visualization and application of EV SSL are introduced in the paper. A novel initial method in Kailar logic is proposed to analyze EV SSL certificate security. In current, EV SSL takes a leading position in most secure Web browser versions of the whole world, and its adoption rate is rising step by step. Keywords: network security; EV SSL certificate; electronic commerce; visualization |
||||
Title: Multi-secrets visual secret sharing based on random grids | ||||
Authors: GAO Caiyun, CAO Tianjie PP: 1851-1855 Abstract: The paper briefly describes the (r, n) visual secret sharing. Using random grid which is used to encode images, a multi-secrets visual secret sharing is presented. Visual secret sharing can encode the secret image into number of shares, and they are distributed to more than one holders. Decoding the image does not need the help of computer, and it just need be identified by human's eye. This method can hide four images in the shares. Keywords: computer application; visual secret sharing; random grids; multi-secrets |
||||
Title: A method for measuring sudden change degree of image pixels | ||||
Authors: LIU Jianzhong PP: 1846-1850 Abstract: This paper uses examples to illustrate the fact that discrete curvature can not show the change of image pixels perfectly. To solve this problem, the paper comes up with a method to measure the sudden change degree. The method makes use of one certain point and two vectors which are organized by the chosen point and other two points before and behind the certain point. And then, the paper gives the definition that the point’s sudden change degree is just the changing angle which made by the latter vector comparing to the former vector. The experiment results show that the sudden change degree can better prove the change of image pixels than discrete curvature. Keywords: image processing; discrete curvature; sudden change degree; image pixels |
||||
Title: Improvement of AODV routing protocol based on probabilistic forwarding | ||||
Authors: JING Wenli, LE Hongbing PP: 1839-1845 Abstract: This paper researched Ad Hoc on-demand distance vector (AODV) routing protocol and gived a mechanism based on probabilistic forward.This mechanism chose different probabilistic forwarding Route REQuest (RREQ) through neighbor's numbers.The NS2 simulation results show that this idea can decrease delay and increase thoughput as well as packet delivery fraction ratio. Keywords: computer network; wireless network; Ad Hoc on-demand distance vector; probabilistic forwarding; NS2; broadcast storm |
||||
Title: Ontology mapping approach based on rule learning | ||||
Authors: HEN Jianfeng, HU Wei PP: 1833-1838 Abstract: This paper proposes a new approach for finding complex semantic mappings across ontologies by transforming the problem to a rule learning task. The approach, derived from the classical inductive logic programming (ILP), generates mappings in the form of Horn rules. Specifically, it utilizes existing instance mappings among ontologies to construct variable bindings for finding and validating semantic mappings. Different processing strategies are applied to classes and properties for improving the learning effectiveness. The experimental results demonstrate the feasibility of the approach. Keywords: computer software; semantic Web; ontology mapping; inductive logic programming; rule learning; instance mapping |
||||
Title: Web service development process framework and case study | ||||
Authors: SUN Chang'ai, WANG Guan, ZHAO Yongmei PP: 1828-1832 Abstract: Based on the introduction to web services related concepts and techniques, the paper proposes a development process framework for web services, examines steps and key issues of web services development with a general ATM system as a motivating example, and provides a brief comparison between the development of web services and the one of existing component models. The process framework and relevant discussions of key issues presented in this paper are very useful to the development of service oriented architecture (SOA) software based on web services. Keywords: software engineering; Web services; service oriented architecture software; software development process |
||||
Title: Linux system transplantation and root file system construction based on S3C6410 platform | ||||
Authors: YE Xiaojun, GAO Yuanlou, YE Xiaotong PP: 1814-1827 Abstract: This paper, taking Tiny6410 development board as system platform, analyzes the Linux system transplantation detailed based on S3C6410 microprocessor, and transplants device driver of NandFlash, DM9000 network card and yaffs2 files system to it. Finally, a basic root file system is constructed by the Busybox tools box. The test results demonstrate the success of the Linux system transplantation and root file system construction. Keywords: operating system; S3C6410; Linux 2.6.36; Busybox; root file system |
||||
Title: Resource storage strategy on AmazingStore off-line download system | ||||
Authors: CAO Yue, LI Zhenhua, DAI Yafei PP: 1806-1813 Abstract: A sophisticated storage strategy is called for to help the system stores the most valuable files.In this paper, after brief introduction, several strategies are evaluated by data set obtained from user download log, and the most ideal strategy is found after deep analysis on the performance evaluation. Keywords: computer architecture; storage strategy; off-line download; cloud computing; distributed system; peer to peer |
||||