Loading...

Table of Content

    01 September 2006, Volume 26 Issue 9
    Database Technology
    COCA — a new way to auto-detect association based on entropy correlated coefficients
    2006, 26(9):  2005-2008. 
    Asbtract ( )   PDF (800KB) ( )  
    Related Articles | Metrics
    Self-managing and self-optimizing is currently a hot research field in database. To guarantee the accuracy of the estimates made by optimizer, this paper proposed a new method named COCA (entropy-COrrelated-Coefficient-based Auto-detection of association). In comparison with CORDS, COCA has the following features: (1) Fewer limitations. It overcomes the limitation that Chi-square test needs at least 80% of the cells in the contingency table have frequencies greater than 5. (2) More results. CORDS can tell the correlation between columns, while COCA can further discern the specific association degree for both directions. Experiments show that COCA is more robust and produces more statistical information, which is supportive to the creation of more effective and efficient histograms.
    A fuzzy approach for Web service discovery based on vector spaces
    2006, 26(9):  2009-2012. 
    Asbtract ( )   PDF (1030KB) ( )  
    Related Articles | Metrics
    Web service is becoming an important distributed computing paradigm in recent years. Having comprehensively analyzed the current documents of WDSL(Wireless Digital Subscriber Line), we proposed a new algorithm based on fuzzy set to select term set that characterize Web services in service corpora, and a generating means of Web service vector spaces. According to the generated vector spaces, fuzzy clustering of Web services can be done. Based on all the above mentioned techniques, an algorithm to discover Web service using a fuzzy approach in the generated vector spaces was presented. Compared with the semantic Web service discovery, our approach is more suitable for the discovery of existing services because it does not require any extra information besides that can be easily obtained from service description files. Experiments show that the proposed approach is effective for service discovery.
    Survey of text mining based on ontology
    2006, 26(9):  2013-2015. 
    Asbtract ( )   PDF (636KB) ( )  
    Related Articles | Metrics
    Text mining is an effective means of detecting potentially useful knowledge from large text database. However, conventional text mining technology cannot achieve high accuracy, because it cannot effectively make use of the semantic information of the text. Ontology provides theoretical basis and technical support for semantic information representation and organization. This paper introduces common ontology and domain ontology, and analyzes text mining technology based on these ontologies.
    Multi-representation geographic information system based on object deputy model
    2006, 26(9):  2016-2019. 
    Asbtract ( )   PDF (1019KB) ( )  
    Related Articles | Metrics
    A new approach to realize multi-representation GIS(Geographic Information System) based on object deputy model was proposed. It allows geographic object to have multiple deputy objects which can be defined as its multiple representations since deputy objects can be used to represent object views and role multiplicity. Through object update propagation, this approach can support dynamic classification and maintain system consistency. In addition, bilateral links between objects and their deputy objects facilitate cross-representation query. A multi-representation GIS based on object deputy model had been implemented. The experiment shows our approach is more efficient than the traditional one.
    Three probes into the social network analysis and consortium information mining — mining the structure, core and communication behavior of virtual consortium
    2006, 26(9):  2020-2023. 
    Asbtract ( )   PDF (827KB) ( )  
    Related Articles | Metrics
    SNA(Social Network Analysis) is a new hot spot in data mining area. This paper surveyed the current research advances in SAN, and introduced the author’s three research results in recent years, including: (a) Mine the structure of virtual consortium,and discuss the formation of init virtual consortium, weight computation, the generation of the consortium tree and algorithm for structure mining of consortium. (b) Mine the core of consortium based on the Six Degrees of Separation and describe Shortest Path based on LINk wEight algorithm SPLINE(Shortest Path based on LINk wEight). (c) Mine the communication behaviors based on the user’s personality, and set a model based on the data from 911 to simulate the email sending-and-receiving between the terrorists.
    Deep Web query interface selecting
    DongDong Zheng
    2006, 26(9):  2024-2027. 
    Asbtract ( )   PDF (764KB) ( )  
    Related Articles | Metrics
    As Web develops, more and more data has become available under Web query interface. Therefore, how to find the data-sources that are most relevant to the user’s requirements has become more and more important. This paper presented a Deep Web query interface selection arithmetic, which completely depended on the characteristics of query interface. Given numerous heterogeneous Deep Web data sources, we aimed at selecting sources most relevant to the user’s requirements. By allowing the users to input an imprecise initial query, our system found appropriate sources for them. We observed the characteristics of query interface and found out the relationships between predicates. Based on this discovery, an algorithm based on co-occurrence predicate model for capturing the relevance of attributes was designed. It can be used to select the sources most relevant to the user’s requirments.
    HoliAdapt—An Adaptive Query Processing Strategy over Data Stream
    LiJie Zhang
    2006, 26(9):  2028-2030. 
    Asbtract ( )   PDF (551KB) ( )  
    Related Articles | Metrics
    Continuous query has some special properties. With this motivation in mind, we think carefully about adaptive factors: run-time memory usage and time latency based on selectivity and processing time. Then we present an adaptive query processing strategy —HoliAdapt. First, we collect continuously statistical information over query windows, then we optimize dynamically query planning according to computing about statistical information. Thereafter, we adopt a scheduling strategy to schedule adaptively operators. Experiments have proved that this query processing strategy can availably minimize run-time memory usage and time latency, and ultimately improve performance of query.
    Artificial intelligence
    Semantic Constraint based on Frame Combination
    2006, 26(9):  2031-2033. 
    Asbtract ( )   PDF (512KB) ( )  
    Related Articles | Metrics
    It is one of the important developing directions of Geographic Information System (GIS) that integrating theories and technologies in the field of Artificial Intelligence (AI) with GIS to design the thematic analysis model in GIS application. Taking this as the background, problems of representation for the GIS thematic knowledge are discussed in this paper. An enhanced frame representation and the idea of frame combination are presented, and then the frame combination operation is put forward to perform semantic constraint on the concept and to obtain more accurate meaning of the concept.
    Topological localization based on visual salient regions in unknown environments
    2006, 26(9):  2034-2037. 
    Asbtract ( )   PDF (1487KB) ( )  
    Related Articles | Metrics
    This paper presented a new topological localization system for mobile robot navigation based on salient visual regions. These salient regions were obtained by computing the contrast of color and texture among multi-scale image spaces, and then they were organized to construct the vertex of topological map by using HMM(Hidden Markov Model). So localization problem can be converted to the evaluation problem of HMM. In our system, the topological map of environment can be created online and the robot locates itself concurrently. Experiments show that the salient regions are stable to large changes in scale, 2D rotation and viewpoint. Higher ratio of recognition was obtained. And our localization system can guarantee mobile robot navigation safely in unknown environment.
    Discriminant analysis based on lifting wavelet transform and learning vector quantization
    2006, 26(9):  2038-2040. 
    Asbtract ( )   PDF (907KB) ( )  
    Related Articles | Metrics
    A new discriminant analysis method based on LWT(Lifting Wavelet Transform) and LVQ(Learning Vector Quantization) Network was proposed in this paper. LWT is faster and more efficient than the first generation wavelet transform, but it also has the multi-resolution characteristics. LWT can be used to extract the low frequency coefficients and reduce the dimension of an image. LVQ is an effective learning algorithm that trains the competitive layer under supervision. It has a simple network structure, but it also has good discriminant analysis ability. The experimental results on ORL face database show that the method proposed has very good classification capability and high recognition rate.
    Real-time gesture recognition based on "Bighand-Smallhand"
    2006, 26(9):  2041-2043. 
    Asbtract ( )   PDF (954KB) ( )  
    Related Articles | Metrics
    With the development of human-computer interaction technology, real-time gesture recognition based on bare hands attracts more and more attention. Most methods based on bare hands are not real-time which can only deal with data offline. A new scheme of feature extraction based on Bighand-Smallhand was proposed. The hands were divided into Bighand and Smallhand, and the overlap of both hands was treated as one hand. Totally, 17 words were tested with this method. The results indicate that the new scheme is real-time with the discrimination of 94.1%.
    Dynamic fuzzy machine learning model and its validation
    2006, 26(9):  2044-2046. 
    Asbtract ( )   PDF (437KB) ( )  
    Related Articles | Metrics
    According to the dynamic fuzzy characteristic of the machine learning system, a dynamic fuzzy machine learning model was proposed, put forward the dynamic fuzzy machine learning algorithm, described the description of its geometry model, and finally, the theory was verified by giving an example. The result shows that the algorithm of this paper is superior to that of Back Propagation, so it is verified that the proposed algorithm of this paper is more effective.
    Solving constrained optimization problems with parallel quantum particle swarm optimization
    2006, 26(9):  2047-2050. 
    Asbtract ( )   PDF (657KB) ( )  
    Related Articles | Metrics
    In this paper, parallel quantum model of particle swarm system was adopted to enhance the global search ability, and as well as a non-stationary multi-stage assignment penalty in solving constrained problem to improve the convergence and gain more accurate results. Thus, a new optimization algorithm of PQPSO was proposed. This approach was tested on several accredited benchmark functions and the experimental results show much advantage of PQPSO to QPSO(Quantum-behaved Particle Swarm Optimization) and the traditional PSO in terms of optimal value and running time, and the running time is also decreased in linear.
    Graphics and image processing
    The research for precise determination the global center position of double olsen samples base on Hough tranform
    2006, 26(9):  2051-2053. 
    Asbtract ( )   PDF (639KB) ( )  
    Related Articles | Metrics
    Double olsen test usually is used to examine materials’ mechancial properties. Double olsen’s shape is quite complicate and it is composed of inter and outer circles which havenot same center. To precisely and quickly determinate its round center, the Hough transform was adopted to obtain sample’s contour for dertermination the sample position in the image base on hardware location. An advanced Hough transform was developed by narrowing the parameter range of radius and center of circle on the basis of prior experience. It reduced resource consumption greatly and improved the running speed and precision.
    Arithmetic for the realization of freeform surface triangular mesh based on the scattered data
    2006, 26(9):  2054-2056. 
    Asbtract ( )   PDF (696KB) ( )  
    Related Articles | Metrics
    With regard to the quality problems such as the quantity and shape of triangular mesh in the realization process of the freeform surface triangular mesh, a triangulation algorithm adopting least total length for scattered data was proposed. The article analyzed and summarized the three dimension methods of triangular mesh, and designed the concrete three dimension optimizing process. Advantage and disadvantage of the artery solid mesh partition had been analyzed and pointed out. Meanwhile, considering the characteristics of the circularity partition, three dimension optimizing process has been constituted using the methods of increasing points. This algorithm increased the speed of triangulation, improved the quality of triangular facet, and increased the speed to modify triangular facet. The result of the experiment has proved the validity of the arithmetic.
    Study on model transformation and computer demonstration of virtual prototype
    2006, 26(9):  2057-2058. 
    Asbtract ( )   PDF (889KB) ( )  
    Related Articles | Metrics
    The complex machine virtual prototype cannot be imported to DIVISION MockUp system because of model data incompatibility. Taking bearing virtual prototype as an object, model transformation and product demonstration of virtual product were studied in this paper. According to graphical exchange between CAD and DIVISION MockUp system, data storage kernel system was analyzed and thus data conversion of substandard three dimension model was solved successfully. A new way was also found to guarantee model precision and demonstration speed. The research is quite valuable in applying virtual prototype product in virtual reality environment.
    Impulse noise reduction by variational method based on adaptive median filter
    2006, 26(9):  2059-2062. 
    Asbtract ( )   PDF (1081KB) ( )  
    Related Articles | Metrics
    To improve the performance of impulse noise reduction, a new variational method based on adaptive median filter was proposed. First, adaptive median filter was used to identify the impulse noise. Second, a cost function of the identified noisy pixels was designed, which was composed of datafidelity term and edgepreserving regularization term. Third, variational method was used to get the optimal solution which minimize the cost function and restore the noisy pixels. Simulation results demonstrate that our proposed method is obviously better than standard median filter, switching median filter, variational method and adaptive median filter, and can erase as much as 90% impulse noise.
    A Color Image Quantization Algorithm Based on Kernel Method
    2006, 26(9):  2063-2064. 
    Asbtract ( )   PDF (1083KB) ( )  
    Related Articles | Metrics
    Color image quantization is an important process of representing true color images using a small number of colors in a palette. This paper introduces a kernel color image quantization(KCIO) algorithm based on K-means clustering. By using kernel method, data from low-dimensional input space can be mapped to high-dimensional feature space, so that no-linear problem may become linear one in feature space. Since this method involves only inner products of data in input space, it can be evaluated much more efficiently even with no knowledge of mapped data in feature space. Our experiments shows that KCIO performs better than K-means on special image , which includes one important color but with only a few data, and KCIO has almost the same performance as K-means when works with common images.
    Moving vehicles’shadow detection using fast normalized cross-correlation
    2006, 26(9):  2065-2067. 
    Asbtract ( )   PDF (865KB) ( )  
    Related Articles | Metrics
    Video detection plays an important role in intelligent transportation system, and the shadows of moving vehicles have serious influence on object detection and segmentation. By adopting a FNCC(Fast Normalized Cross-Correlation) algorithm in this paper, moving shadows were directly detected from grayscale video sequences. By applying three sum-tables in FNCC and detecting shadows within a confined range, the computational complexity had been significantly reduced compared with the traditional NCC(Normalized Cross-Correlation) algorithm. And the experimental results have shown that this method can detect moving vehicles’ shadows efficiently and accurately.
    Rectangle-packing Optimization using Quantum-behaved Particle Swarm Optimization
    2006, 26(9):  2068-2070. 
    Asbtract ( )   PDF (700KB) ( )  
    Related Articles | Metrics
    An improved QPSO(Quantum-behaved Particle Swarm Optimization) to solve rectangle-packing problems was proposed. The rectangle-packing is to replace two-dimensional irregular objects with their best rectangle, which is the first step of the clothing layout. The experimental results show that QPSO is better at solving the layout problem than PSO and GA(Genetic Algorithm).
    Multiscale segmentation of remote sensing images based on local morphological multifractal exponents
    Yong Xia
    2006, 26(9):  2071-2073. 
    Asbtract ( )   PDF (747KB) ( )  
    Related Articles | Metrics
    To separate artificial regions in a remote sensing image from natural background, a new texture descriptor named the LMME(Local Morphological Multifractal Exponents) and a quadtree-based multiscale segmentation algorithm were proposed in this paper. To assess its performance in segmentation of remote sensing images, the proposed approach was compared with four other approaches. The formerused box-counting based multifractal dimensions, and the latter used a Gaussian Markov random field based feature. The experimental results demonstrate that the proposed approach can provide more effective and more efficient segmentations.
    Image retrieval of the block edge pattern based on run-length coding
    2006, 26(9):  2074-2076. 
    Asbtract ( )   PDF (998KB) ( )  
    Related Articles | Metrics
    A new image retrieval algorithm based on block edge patterns was proposed in this paper. Block edge patterns were extracted in each 8×8 block of an image. Then by following the principle of run-length coding, the features of an image were extracted by utilizing block edge patterns to implement content-based image retrieval inside image database. Because the edge orientation of each block can be estimated in DCT(Discrete Cosine Transform) without decompressing, computation complexity declined greatly. In comparison with current representative techniques, the experimental results demonstrate the proposed algorithm has better performance both in retrieval efficiency and effectiveness.
    Study on the overlap of regional intensity ranges in image segmentation
    2006, 26(9):  2077-2080. 
    Asbtract ( )   PDF (1456KB) ( )  
    Related Articles | Metrics
    This paper studied the overlap of regional intensity ranges in image segmentation, and probed into the concept difference between image smoothing and filter. It was found that image smoothing can were decrease minor objects and aggravate gradual change for segmentation. Therefore, it was thought that image smoothing could reduce the overlap of regional intensity ranges and bring out transition region for the segmentation of specific image objects. The experiments indicate that the overlap of regional intensity ranges in image is obstacle to correct image segmentation, and image smoothing can eliminate or weaken its impact.
    Image segmentation combining support vector machines with C-means
    2006, 26(9):  2081-2083. 
    Asbtract ( )   PDF (752KB) ( )  
    Related Articles | Metrics
    Image segmentation based on support vector machines (SVM) requires the user to provide the training data. The proposed method in this paper used C-means to obtain feature vectors and labels for training SVM. Firstly, image was divided into several regions and discrete wavelet transform was performed on each region in order to remove edged region. Secondly, after applying C-means to smooth region classification, the energy of region and labels were taken as training data of SVM(Support Vector Machine). Finally, image segmentation was performed using SVM classifier. Experimental results show that the method has good performance in image segmentation. Meanwhile, using one representative image for the training of SVM, the produced classifier can be applied to the set of similar images and 3D volume data.
    New algorithm for adaptive image enhancement based on scale correlation
    2006, 26(9):  2084-2085. 
    Asbtract ( )   PDF (623KB) ( )  
    Related Articles | Metrics
    According to the limitation of the traditional algorithms in which the increasing image feature often amplified the noise, a novel algorithm for adaptive image enhancement based on the wavelet transformation was proposed. The method was derived from the correlation coefficient theory of the wavelets and the correlation of the wavelet coefficient on different scales in the dyadic wavelet transformation. Following experiments confirmed that the method not only provided a better image enhancement but also indicated a stronger anti-noise capability, compared to the traditional algorithms.
    Approach to H.264-based still stereoscopic pictures compression
    2006, 26(9):  2086-2088. 
    Asbtract ( )   PDF (689KB) ( )  
    Related Articles | Metrics
    To compress still stereoscopic pictures with huge amounts of data, H.264-based still stereoscopic pictures compression scheme was studied. Adopting H.264 coding tools to achieve this compression was discussed with reference to a number of related articles. Still stereoscopic pictures compression schemes based on H.264, MPEG-2 and JPEG were compared through the experiments. The results show that with H.264-based scheme higher compression rate can be achieved, higher quality compressed multi-stereo pairs can be acquired and the exact binocular disparities between multi stereo pairs can be better preserved.
    Face recognition based on 2D-DWT and 2D-PCA
    2006, 26(9):  2089-2091. 
    Asbtract ( )   PDF (614KB) ( )  
    Related Articles | Metrics
    An efficient face recognition method by combining the2D-DWT(two-dimensional discrete wavelet transform) method with the 2D-PCA(two-dimensional principal component analysis) method was proposed. First, each face image was decomposed into four sub-images by using the 2D-DWT approach, and then 2D-PCA approach was used to extract the features for recognition from each sub-image respectively. All the extracted features were further combined and used for face classification. Moreover, considering that the discriminative features extracted from each sub-image may not share the same metric scale measure, we also proposed an effective features combination method in this paper. Better performance of the proposed method is confirmed by the Yale face database and the AR face database.
    Comparability determination of 3D surface based on LIM
    WuYing Feng
    2006, 26(9):  2092-2094. 
    Asbtract ( )   PDF (770KB) ( )  
    Related Articles | Metrics
    To meet the needs of identification through stereo bare footprint, this paper proposed a method for comparability determination of 3D surface based on LIM(Lorentz Information Measure). Taking gauss curvatures and normal vectors as random variables, Lorentz Curve was extended to 3D Lorentz Surface. Reflecting the difference of information measure of two 3D surfaces, the volume between two Lorentz Surfaces was used to determinate the comparability of the two 3D surfaces. The experiment on stereo bare footprint surface indicates that our method is valid.
    Region counting algorithm based on region labeling automaton
    2006, 26(9):  2095-2098. 
    Asbtract ( )   PDF (767KB) ( )  
    Related Articles | Metrics
    Region counting has many important applications in computer graphics and image analysis. A new method based on region labeling automaton was proposed to count regions in this paper. The proposed method was found to be fastest. Without region filling we can count the number of the regions by scanning the binary image once. The sequential VCC(Vertex Chain Code) orders of the regions’ contour points can be obtained by appending some codes when we counted the regions. This is useful for image restoration and representation.
    Application of AdaBoost algorithm in spray code recognition
    2006, 26(9):  2099-2100. 
    Asbtract ( )   PDF (332KB) ( )  
    Related Articles | Metrics
    Spray codes are widely used in printing. Template matching is usually adopted to recognize them. But because the spray codes often have errors, it is not easy to recognise the codes exactly with template matching. AdaBoost is a learning algorithm to construct classers. In this paper, the algorithm was used in the recognition of spray codes. It can not only improve the recognition accuracy, but also get more satisfactory speed.
    Eye-gaze tracking with one camera
    2006, 26(9):  2101-2104. 
    Asbtract ( )   PDF (772KB) ( )  
    Related Articles | Metrics
    An eye-gaze tracking method, which can make this system be automatically adapted to external lighting changes and the user’s head movements freely, was put forward to alleviate the restriction on the user’s head movements. In this paper, we concentrated on development of the algorithms. Based on the brightness histogram of the eye image, the adaptive thresholds for pupil extraction and corneal reflection were extracted. On the basis of the brightness, gradient of the edge points of the pupil and the smoothness of the pupil boundary, the edge points could be obtained by a 1D line search. We applied a new randomized method of ellipse fitting to the edge points. A solution to cope with eyelashes, eyelids and glints in the pupil area was also discussed. Experiments show that the improved algorithm is effective.
    Information security
    Integrity protection of renewable data
    2006, 26(9):  2105-2108. 
    Asbtract ( )   PDF (775KB) ( )  
    Related Articles | Metrics
    Data collection is one kind of important applications of mobile Agent and gets involved in many areas of mobile Agent application system. Because the mobile agents could get the attacks from malicious hosts, how to protect the integrity of the collected data is a crucial issue. In this paper, a protocol to protect the integrity of the collected data, when mobile Agent was roaming through a set of potentially malicious hosts, was proposed based on the analysis of security properties for data collection of mobile Agent. The protocol can assure the integrity verification of the collected data regardless of the collecting order of each data segment. So the set of hosts can be visited randomly and can update their own data. The protocol is suitable for application system with dynamically changing data.
    A secure method of mobile agent data protection
    2006, 26(9):  2109-2110. 
    Asbtract ( )   PDF (377KB) ( )  
    Related Articles | Metrics
    Data protection is one of security issues mobile agents have to face. In this paper, based on ElGamal scheme, a secure method for protecting mobile agent data was presented. Its security was analyzed. The results show that this method not only satisfies all security requirements but also makes the same mobile agent can visit the same host many times, which overcomes the shortcoming of the current protocols.
    Model of information security evaluation based on gray analytical hierarchy process
    2006, 26(9):  2111-2113. 
    Asbtract ( )   PDF (499KB) ( )  
    Related Articles | Metrics
    An information security evaluation model was proposed based on Gray Analytical Hierarchy Process. First, an information security hierarchy model with three-hierarchy was established according to ISO/IEC 17799 and some domestic information security evaluation criteria. Second, the model was explained by AHP and gray systems theory, thus the result could be more objective. Finally, a case study was carried out to a stock exchange net and the result was acknowledged by the company. Therefore, this model is proved to be feasible and effective.
    Cryptography scheme based on congruence equation
    2006, 26(9):  2114-2115. 
    Asbtract ( )   PDF (502KB) ( )  
    Related Articles | Metrics
    Most current cryptography and session key exchange schemes based on public key are vulnerable to intermediate attack and have low efficiency. In order to solve this problem, a cryptography and session key exchange scheme based on congruence equation was proposed in this paper. Through this scheme, session key exchange and private message transmission can be realized efficiently and safely, and the intermediate attack can also be avoided. To some extent, we can also prevent the third party to garble the transmission message through this scheme. The security of the algorithm is built upon the difficulty of big integer factorization.
    Improved Woo-Lam model for cryptographic protocols
    2006, 26(9):  2116-2120. 
    Asbtract ( )   PDF (936KB) ( )  
    Related Articles | Metrics
    An improved Woo-Lam Model for cryptographic protocols, namely eWoo-Lam Model was introduced. Compared with Woo-Lam Model, the new model has such advanced properties as follows: to enhance the syntax of the model for cryptographic primitives, which enables the model to specify the principal actions more precisely and detect the attacks on the protocol more efficiently; to bring in match mechanism, which guarantees the effectiveness for the security analysis of the model; to propose seven formalization principles to normalize the procedure for model abstraction; to extend the state-transition based semantics to make it more rational; to redefine the security properties of the model to make them more generic.
    Multi-domain key agreement protocol for WLAN
    2006, 26(9):  2121-2123. 
    Asbtract ( )   PDF (568KB) ( )  
    Related Articles | Metrics
    In WLAN, different wireless users and authentication severs constitute different secure domain under different management institutions. If a wireless user in a secure domain wants to access another secure domain, the key exchange between the wireless user and visitor authentication severs is an unsolved problem. MKAP(Multi-domain Key Agreement Protocol) was proposed to solve the key agreement in authentication server between local and remote secure realms. MKAP made solutions to the two types of cross secure realm access respectively: one is based on local cross realm access and the other is based on mobile IP cross realm.
    Study on the security of SIP
    Zhichun Yu
    2006, 26(9):  2124-2126. 
    Asbtract ( )   PDF (579KB) ( )  
    Related Articles | Metrics
    With the widespread use of multimedia communications, SIP(Session Initiation Protocol) is becoming one of the most important protocols in the VoIP field. Facing the complex and open Internet environment, the security of SIP needs to be improved and enhanced. This paper analyzed the security threats to SIP at first, and then proved the existence of these threats by simulated attacking experiments, finally improved the authentication mechanism and provided security solution to SIP.
    Identification of covert channel based on source code
    2006, 26(9):  2127-2130. 
    Asbtract ( )   PDF (722KB) ( )  
    Related Articles | Metrics
    To solve the heavy workload caused by the fact that covert channel identification still depends on the handwork to analyze the information flow in the statement, an information flow analysis method based on source code was provided. The method can find shared variables in primitive of software system, and take them as the input for shared resource matrix method. Then, a highly-efficient and highly-precise analysis tool for covert channel is obtained.el.
    Implementation of ECC point multiplication with IP core
    2006, 26(9):  2131-2133. 
    Asbtract ( )   PDF (643KB) ( )  
    Related Articles | Metrics
    Based on Koblitz curve over GF (2^163) recommended by NIST and in the opinion of improved Montgomery algorithm introduced by López, an operation scheme control by Finite State Machines was presented and an ECC(Elliptic Curves Cryptography) point multiplication with IP core was designed. Comprehensive simulation by QuartusⅡ5.0 was made in EP2S90F1508C3. A total of 14502 ALUTs were consumed, the maximal dominant frequency was 166MHz and the speed of point multiplication was 12835 times per second.
    Preventing code injection attack with hook in kernel mode
    2006, 26(9):  2134-2136. 
    Asbtract ( )   PDF (586KB) ( )  
    Related Articles | Metrics
    To prevent code injection attack, it is necessary to monitor involved API(Application Programming Interface) by hooking them. Because there exists rigid process isolation in Windows NT, hooking these APIs must be done in kernel mode. A relatively simple way to do this was introduced. It is proved that in Windows XP the way to hook API in kernel mode can efficiently prevent code injection attack.
    Design and implementation of intrusion detection system based on system-call
    2006, 26(9):  2137-2139. 
    Asbtract ( )   PDF (821KB) ( )  
    Related Articles | Metrics
    The technology of Intrusion Detection is one of the important measures to protect the networks. Host-based intrusion detection is used to protect the key hosts. A flexible loading intrusion detection based on system-call was introduced in this paper. This system improved the common data collection method, and adopted virtual equipment driversto acquire system call. This method brings small influence on system, is easy to load and unload, and provides the standard interface. The data analysis integrates the two detection methods: anomaly and misuse, which provides corresponding detection models and introduces the noise filtering function.
    An extensible distributed testing system for network attack
    2006, 26(9):  2140-2144. 
    Asbtract ( )   PDF (1151KB) ( )  
    Related Articles | Metrics
    With the development of computer network, new attacking means emerge in endlessly. Attacking routing protocols is one of them. RIP(Routing Information Protocol)/RIPng, OSPF(Open Shortest Path First) and BGP(Border Gateway Protocol) are commonly used dynamic routing protocols. Based on the analysis of the characteristics of those routing protocols, this paper brought out possible attacking ways for each of them. A distributed testing system for network attack was also designed. Its modularized structure made the system have good expansibility. The testing results show that the testing cases running in the system, which are written in Tcl, successfully simulate and test the network attacks based on the routing protocols mentioned above, and provide powerful support to solve the hidden security troubles that may exist in the network.
    Anomaly detection approach based on immune algorithm and support vector machine
    HongGang Zhou
    2006, 26(9):  2145-2147. 
    Asbtract ( )   PDF (557KB) ( )  
    Related Articles | Metrics
    In anomaly detection, utilizing support vector machines can make detection system have good generalization ability in situation of small sample. But appropriate parameters are very crucial to the learning results and generalization ability of support vector machines. And many irrelevant and redundant features degrade the performance of classification. Thus an approach that applied immune algorithm to optimize parameters of SVM(Support Vector Machine) and feature selection was proposed. Immune algorithm is an efficient random global optimization technique. It has nice performances such as avoiding local optimum, high precision solution, and quick convergence. The simulation results show that immune algorithm can improve the detection accuracy and meanwhile shorten the testing time.
    Adaptive digital watermarking algorithm
    2006, 26(9):  2150-2152. 
    Asbtract ( )   PDF (636KB) ( )  
    Related Articles | Metrics
    Currently, there are many DWT(Discrete Wavelet Transform) based watermarking algorithms, but few of them discuss the issue in association with fractal image coding in wavelet domain. A new algorithm proposed by us can adaptively select locality to insert digital watermark to get better quality for image with watermarking and enhance the security of watermarking system, according to the characteristics of HVS(Human Visual System) and fractal image coding error. This algorithm performs well especially in low-resolution picture. The experimental results show that the algorithm makes watermark better invisible and robust, and keeps lower positive error ratio as well.
    A Information Hiding Algorithm of Color Image in DWT Domain Based on Grey Relation
    2006, 26(9):  2153-2155. 
    Asbtract ( )   PDF (742KB) ( )  
    Related Articles | Metrics
    According to grey relation theory and the characteristic of information hiding, a new calculation method for grey relation coefficient was defined. Furthermore, and a new information hiding algorithm based on color image was proposed. This algorithm justified LH and HL frequency band coefficients in DWT(Discrete Wavelet Transform) of original carrier image and hid the secret data in LH and HL frequency band coefficients of color carrier image’s every color weight. The secret data was extracted according to grey relation coefficient and the cover image was not needed. The experimental results show that the algorithm is not only invisible, but also robust against various signal processing such as noise adding, cropping, JPEG compression, and filtering.
    Design and implementation of smart card key management system based on threshold scheme
    2006, 26(9):  2156-2159. 
    Asbtract ( )   PDF (728KB) ( )  
    Related Articles | Metrics
    In modern cryptography, the security of cryptography depends on the security of the cryptographic key. In order to ensure the security of cryptographic products, a smart card key management system based on threshold scheme was proposed and implemented in this paper. By introducing the threshold cryptosystem and the mutual dynamic authentication mechanisms based on smart card, the security problems of key generation, storage, distribution, and the security of the application process were solved effectively.
    Study of network security based on packet filtering technology
    2006, 26(9):  2160-2161. 
    Asbtract ( )   PDF (561KB) ( )  
    Related Articles | Metrics
    This paper analyzed several implementations of packet filtering technology. After comparing these implementations and analyzing the OS(Operating System) kernels, this paper also studied and implemented packet filtering technology based on Intermediate driver. By coding kernel-mode network driver, specific application of packet filtering has been realized.
    Network and communications
    Table-lookup determined routing algorithm for triple-based hierarchical interconnection network
    2006, 26(9):  2162-2165. 
    Asbtract ( )   PDF (671KB) ( )  
    Related Articles | Metrics
    Efficient routing algorithm is very essential to the performance of the interconnection network and the whole parallel computing system. This paper presented TDRA (Table-lookup Deterministic Routing Algorithm) in triple-based hierarchical interconnection network, which always delivers the message along the approximately shortest path between any two nodes. Because the route table of any nodes only stores the route information for its cognation nodes and some special group, the cost of storage is very low and the route performance is high. Finally, the analysis based on the simulation of TDRA shows it is not only very simple and easy to implement, but also highly effective.
    A strategy for time resource allocation based on workflow graph
    2006, 26(9):  2166-2168. 
    Asbtract ( )   PDF (735KB) ( )  
    Related Articles | Metrics
    Time allocation in workflow was studied. Firstly, labeled activities were added in order to make records of the resources usage on each route origin. Secondly, time was regarded as a kind of non-renewable resources, and was classified into three types: private, public and mixed. Thirdly, an approach for time resource analysis and allocation was proposed. In the beginning, time resource was pre-allocated according to the characteristics of different routing, then during the process of actual operation, time resource was reallocated according to time consuming situation by the method of splitting and converging. Finally, a case study illustrated the time resource allocation process in workflow graph.
    Application level multicast routing algorithm based on poly-clonal strategies
    2006, 26(9):  2169-2171. 
    Asbtract ( )   PDF (584KB) ( )  
    Related Articles | Metrics
    Application level multicast is a hot issue in current network study. Its multicast tree is constructed on the virtual completely-connected overlay network. The characteristic of an application level multicast routing model was analyzed in this paper. A new application level multicast routing algorithm with degree and average delay constrains was proposed based on poly-clonal strategies. Simulations show that compared with those based on genetic algorithm, the application level multicast routing based on poly-clonal strategies has faster converging speed and better ability of global searching. And the proposed algorithm is stable, flexible and user-friendly.
    A multi-path routing protocol based on a hybrid criterion of choice
    federer
    2006, 26(9):  2172-2174. 
    Asbtract ( )   PDF (771KB) ( )  
    Related Articles | Metrics
    A multi-path routing protocol based on DSDV(Destination Sequenced Distance-Vector) in Ad hoc networks was proposed. A new neighbor node structure like routing table was established by which the multi-path mode can be expanded. The proposed protocol chooses routing by a hybrid criterion which is based on the shortest path criterion and the best channel state criterion. The hybrid criterion makes use of the information at physical layer related to cross-layer technique. The multi-path dividual transmission was employed as the transmission mode of paths. The simulation shows that, by the mode of multi-path dividual transmission, the proposed protocol greatly improves the throughput of the whole network at the expense of little delivery performance, and increases the utilization ratio of network resources.
    Traffic shaping algorithm with holistic and hierarchical token parameters allocation
    Wenwei Tu
    2006, 26(9):  2175-2177. 
    Asbtract ( )   PDF (566KB) ( )  
    Related Articles | Metrics
    Traffic shaping is an important technique to guarantee QoS in a network that provides Differentiated Services. It is commonly used to regulate the traffic which is sent to the network from users. We proposed a new architecture of traffic shaper named HHTPA(Holistic and Hierarchical Token Parameters Allocation). It works in edge router to dynamically allocate the unused bandwidth through hierarchical shaping and allocating the token parameter as a whole. It improves the utilization rate of bandwidth. In this architecture, lower QoS classes can utilize the extra bandwidth previously saved for higher QoS traffic classes.
    CAN-bus Based Communication Application Layer Protocol for the Colliery Safety Monitoring System
    2006, 26(9):  2178-2181. 
    Asbtract ( )   PDF (898KB) ( )  
    Related Articles | Metrics
    In this paper, we proposed an application layer communication protocol which was suitable for CAN(Controller Area Networks) bus based colliery safety monitoring systems. After analyzing the frame structure of CAN 2.0B and the communication requirements of the monitoring system, we gave a definition for each bit of message identifier in the extended data frame to carry communication control information. Consequently, all of the eight bytes in the data field can be used to transmit actual data and then the CAN bus based communication efficiency was improved. The application layer protocol with multi-pipe technique can support the multi-thread communication between the transmitter and the receiver, and the command and captured data can be transmitted simultaneously in the monitoring system. The CAN bus short frame structure may result in the transmission failure of the large size data, while the frame number and bitmap technique can effectively solve the problem. Finally, the control protocol of the application layer and its frame format were briefly introduced.
    Structure of collaborative design based on multi-agent
    2006, 26(9):  2182-2183. 
    Asbtract ( )   PDF (371KB) ( )  
    Related Articles | Metrics
    Multi-agent technology was introduced into collaborative design so as to make collaborative design system possess the advantages of multi-agent system, such as distribution, cooperation and intelligence. This paper presented the structure of agent, the composition of collaborative design unit: multi-agent and the structure of whole collaborative design system based on web server. And some key techniques for the implementation of collaborative design system were discussed, including creation of agent, communication and knowledge sharing between agents, conflict elimination of agents, etc.
    Introduction to the implementing of IAX-SIP interworking function
    Weijian Shen
    2006, 26(9):  2184-2186. 
    Asbtract ( )   PDF (634KB) ( )  
    Related Articles | Metrics
    This paper introduce a kind of VoIP protocol named IAX(Inter-Asterisk eXchange protocol) which is used in an Opensource SoftPBX Asterisk system. Describe the implementing of the interworking function gateway for IAX and SIP(Session Initiation Protocol), include the mapping of the registration, authentication,normal call flows in IAX protocol to SIP protocol and the way to translate IAX2 MINIFRAME to the RTP/RTCP media stream.
    Study on intrusion tolerant group communication
    2006, 26(9):  2187-2189. 
    Asbtract ( )   PDF (678KB) ( )  
    Related Articles | Metrics
    Based on the associations among intrusion-tolerance, replication and group communication, the necessities of group communication in an intrusion tolerance system were discussed. The model of intrusion-tolerant group communication system was presented and its architecture as well. Considering the position of group communication in the whole system and the structure inside the group communication system, the architecture was designed. At last, the proposed model was compared with OSI/RM. This paper lays a foundation for future researches on reliable multicast, total-order multicast and group key management.
    Implementation of 100Mbps Ethernet based on VxWorks in embedded system
    2006, 26(9):  2190-2191. 
    Asbtract ( )   PDF (575KB) ( )  
    Related Articles | Metrics
    The concept of VxWorks OS(Operating System) was introduced, and the model of Ethernet communication in VxWorks was analyzed. Then the hardware design of the fast Ethernet in embedded system was discussed, and MPC8260 was taken as an example. The driver programming of Ethernet based on VxWorks was described in detail finally.
    System-level fault diagnosis based on mobile agent and active network
    2006, 26(9):  2192-2195. 
    Asbtract ( )   PDF (868KB) ( )  
    Related Articles | Metrics
    The reliability and availability of active network have attracted many researchers’ attention. After discussing distributed algorithm of system-level fault diagnosis, this paper applied the theory of system-level fault diagnosis to active network management based on mobile agent, and introduced a three-valued model of system-level fault diagnosis for active network. This model improves reliability and accuracy. Besides, the distributed diagnosis algorithm was illustrated which adopted the management strategies of mobile agent and achieved distributed network management. Therefore, it is important in practical application.
    Research of VoIP QoS based on TCP-friendly rate control mechanism
    2006, 26(9):  2196-2198. 
    Asbtract ( )   PDF (619KB) ( )  
    Related Articles | Metrics
    It is important to introduce flow control mechanism into UDP(User Datagram Protocol) based VoIP(Video over IP) in order to guarantee its quality service. To get dynamically adapted to both the coding rate and packetization for VoIP Flows,this paper presented an improved TFRC(TCP-friendly rate control) mechanism to solve the congestion of Network, which provided the rate adjustment based on equation at the end host for the UDP streams to show TCP-friendly. By simulation and analysis, it is suggested that this new mechanism can fairly treat VoIP with small packets and other data flows with large packets,and guarantee QoS of VoIP.
    Adaptive layered multicasting based on convex optimization and genetic algorithm
    2006, 26(9):  2202-2205. 
    Asbtract ( )   PDF (708KB) ( )  
    Related Articles | Metrics
    Aiming at the utility optimization for wireless video multicast, a new adaptive layered multicast method with AMC(Adaptive Modulation and Coding) was presented. The video layers were transmitted over different AMC modes and allocated appropriate bandwidth. When the utility function was convex, the utility maximization could be converted into a convex optimization problem. When the utility function was not convex constraint, and several practical issues like limited layer numbers and operational layer rates were taken into account, GA(Genetic Algorithm) was proposed to maximize the total utility. The simulation results show that the proposed method is effective.
    A Combined Prediction Model of Internet Traffic Based on Neural Network
    2006, 26(9):  2206-2208. 
    Asbtract ( )   PDF (704KB) ( )  
    Related Articles | Metrics
    The Internet traffic is correlated and non-stationary time series. By analyzing some past traffic models, a new prediction model was established. In this model, Internet traffic was pretreated with wavelet method at first. Then, linear NN(Neural Network) and Elman NN were used respectively to make prediction. Therefore, the correlation and non-stationary characteristics of the traffic could be described. Finally, the two predictions were combined into the final result through BP neural network. Through one-step and multi-step prediction simulations on different kinds of traffic respectively, it is verified that the combined model can predict more precisely than the individual model.
    Improved rate control algorithm for the H.264 encoder
    2006, 26(9):  2209-2210. 
    Asbtract ( )   PDF (501KB) ( )  
    Related Articles | Metrics
    As one important technology of H.264, rate control plays an important role in promising a steady rate and a high receiving quality. This article gave a detailed analysis about the problem that the algorithm employed by JM(Joint Model) achieved insecure rate and PSNR (Peak Signal to Noise Ratio) for different preliminary quantization parameters, and made some improvement about the algorithm. The test results demonstrate that the improved algorithm could guarantee steady rate and PSNR.
    Study and implementation of ATM NIC device driver and CIPOA based on RTEMS
    2006, 26(9):  2211-2214. 
    Asbtract ( )   PDF (788KB) ( )  
    Related Articles | Metrics
    Design and implementation of ATM(Asynchronous Transfer Mode) NIC (Network Interface Card) device driver based on RTEMS(Real Time Executive for Multiprocessor Systems) were discussed. On the basis of this discussion, implementation of CIPOA(Classical IP Over ATM) was further analyzed. Considering some special applications, protocol implementation was simplified, and a comprehensive test was carried out.
    Realization of soccer robot wireless communication based on visual system
    2006, 26(9):  2215-2216. 
    Asbtract ( )   PDF (404KB) ( )  
    Related Articles | Metrics
    In the competitions of soccer robot, how to improve the ability of soccer robot to process information from various sensors is a key technology. Because of its limited load ability, it becomes necessary for robot to process the information with the help of other computer or workstation through wireless communication. This paper described the realization of wireless communication based on visual system in a wheeled locomotive robot.
    Typical applications
    Analysis of utilization bound for rate monotonic tasks assignment algorithms
    Tao Wang
    2006, 26(9):  2217-2221. 
    Asbtract ( )   PDF (941KB) ( )  
    Related Articles | Metrics
    The scheduling strategies and schedulability conditions of RM(Rate Monotonic) tasks allocation algorithms were analyzed, and the actions that how the tasks allocation algorithms allocate the task to processors were depicted in detail based on the model of preemptive period task in multiprocessor system. According to the theory of Liu & Layland, the theory of the minimum utilization bound for task allocation algorithm was presented. The results of simulation show that the utilization bound of allocation algorithm is the key principle for differently characterized task sets to select different algorithms to allocate tasks. Through the comparison between the total utilization of the task set and the utilization bound of the algorithm, it can be judged whether the algorithm will bring out feasible allocation of the task set.
    Wrapping JDBC API with template method pattern
    2006, 26(9):  2222-2224. 
    Asbtract ( )   PDF (521KB) ( )  
    Related Articles | Metrics
    As a standard core specification to access relational database, JDBC(Java Database Connectivity) plays an important role in the Java platform applications. However, due to its own deficiency, complexities are introduced into the applications directly based on JDBC API(Application Programming Interface). Some related issues when using JDBC API to access database were discussed, and template method and callback functions were adopted to wrap and implement API. Then, the performances between using JDBC API directly and using wrapped API were compared. It is proved that the latter approach has better performance in application.
    Study on architecture of WebGIS based on SOA
    FeiXue Li
    2006, 26(9):  2225-2228. 
    Asbtract ( )   PDF (837KB) ( )  
    Related Articles | Metrics
    SOA(Service-Oriented Architecture) is an architecture of software design suitable for changing environment, in which the difficulty in the sharing of data and operations can be removed to a certain extent. Conceptual framework, hierarchical relations, implementing framework and service implementing modes of WebGIS architecture based on SOA were designed. As a case study, a land use planning management information system for Yubei district, Chongqing city was implemented through XML-based Web service technology. The feasibility and validity of the architecture has been verified preliminarily.
    Study on meta-models in enterprise temporal modeling
    ZhaoJun Yang
    2006, 26(9):  2229-2231. 
    Asbtract ( )   PDF (584KB) ( )  
    Related Articles | Metrics
    To support the modeling of time-related information such as historical information, an enterprise temporal modeling was proposed, involving calendar objects, time attribute domain types, and timestamps. With these concepts and their meta-models, model designers can build temporal enterprise models based on the current snapshot models so as to increase the flexibility of models and information systems.
    Improvement of black-box test reduction method with I/O analysis
    2006, 26(9):  2232-2234. 
    Asbtract ( )   PDF (921KB) ( )  
    Related Articles | Metrics
    P.J.Schroeder proposed a method into test reduction using I/O relations without any loss of fault detection capability. But all his algorithms were not satisfactory, whether due to complexity or bad result. This paper improved the method by making full use of the information about I/O relations. First, I/O relations themselves were minimized; then, the I/O relations were partitioned into several relevant groups according to the relevancy analysis. Thirdly, each relevant group was regarded as independent I/O relations to produce reduced test suite: a combinational test suite was created for each output and then scrabbled up on common element. At last, the union of the results from all groups was just our final target. The experimental results show that the improved method can produce the smallest suite.
    Design pattern in embedded system development
    2006, 26(9):  2236-2239. 
    Asbtract ( )   PDF (775KB) ( )  
    Related Articles | Metrics
    With the widespread use of embedded systems, some advanced technologies of software engineering are in need to instruct the development of embedded software, such as design pattern. The main problem that has to be addressed in this context is how to put the technique into the design of an embedded application, taking into account the true nature of embedded systems. In this paper, an overview of the current embedded software design and the technology of design pattern were given first, and then how to apply the design pattern in the design of the embedded software was discussed. At last, an example was given to illustrate the approach.
    Business objects association models based on state log and association log
    2006, 26(9):  2240-2243. 
    Asbtract ( )   PDF (1171KB) ( )  
    Related Articles | Metrics
    It is important to build well-designed business model to realize fast reconfiguration of enterprise information system in accordance with the business changes. Traditional business modeling methods can not effectively deal with complex association relationships between business objects; therefore extendibility, adaptability, second-round development efficiency and traceability of ESA are greatly influenced. To overcome this limitation, in this paper we presented a log-based business object association model, in which complex and volatile associations between objects were clearly separated from the inner structure of objects and the numerical association styles were discussed with emphasis. Business logics on objects were classified into two types, i.e., simple operation that dealt with inner logics in a simple object, and complex operation that dealt with numerical associations between objects. Run-time states of business objects and association information between objects were separated as logs for further traceability.
    Light-weight embedded GUI system and its implementation
    2006, 26(9):  2244-2246. 
    Asbtract ( )   PDF (819KB) ( )  
    Related Articles | Metrics
    GUI(Graphic User Interface) based embedded applications are now widely in use. Common GUI products are usually large in size and complicated in detail. An embedded GUI system, which is more lightly weighted than most of current GUI products, was proposed in this paper. Due to adopting both object oriented modularized designing and a well-designed simulator, it is more convenient to develop this system. Its implementation in Video Conference Terminals was also introduced. In this implementation, this system took small memory size, and cost significantly short development time. It greatly reduced the cost of both product hardware and development labor.
    Design and implementation of intelligent phone mail client-end based on BREW
    2006, 26(9):  2247-2249. 
    Asbtract ( )   PDF (587KB) ( )  
    Related Articles | Metrics
    To implement the mobile mail client-end which supports IMAP4(Internet Message Access Protocol, version 4) on the intelligent phone, this paper adopted the BREW(Binary Runtime Environment for Wireless) platform which was specially designed for wireless equipment by QUALCOMM under the VC++6.0 environment. Meanwhile, the concept of the atom process was put forward to lower the Coupling Degree and raise the reuse rate of code. The simulation shows that the mail client makes contact with many mail servers in the Internet, and works stably. Therefore, the mail client can be applied as a module of the intelligence phone to the 3G network.
    Dimensionality reduction in audio fingerprint based on weighted PCA
    2006, 26(9):  2250-2254. 
    Asbtract ( )   PDF (911KB) ( )  
    Related Articles | Metrics
    Audio fingerprint technology has been widely used in the music searching, melody identification, and sound restoration. However, dimensionality reduction, the key to audio fingerprint technology, still cannot achieve satisfactory classification and reliability. Firstly, this paper introduced an optimal audio-dimensionality-segment method based on pattern recognition. Secondly, weighted PCA(Principal Component Analysis) was suggested as the kernel dimensionality reduction technology in audio fingerprint processing. This method not only enhances the classification of music data, but also keeps the merits of linear dimensionality reduction, simplicity and fast computation, which makes the heavy-data-processing become feasible.
    Construction of equipment management integration platform for condition monitoring and diagnosis
    2006, 26(9):  2255-2257. 
    Asbtract ( )   PDF (913KB) ( )  
    Related Articles | Metrics
    To solve the isolation of monitoring and diagnosis in current equipment maintenance, an equipment maintenance management platform was constructed in this paper. The system frame was put forward under the direction of CBM(Condition Based Maintenance). According to the equipment maintenance in power plant, information model for CBM was set up. The functions of the equipment maintenance management system were analyzed by means of IDEF, and the function model was given out. Based on the proposed function model, the equipment management system for integrating condition monitoring and fault diagnosis was developed by combining network, computer and database technology. The proposed system can serve as an effective management platform for implementing CBM in power plants successfully.
    Distributed seismic data acquisition system based on embedded Ethernet
    LinHang Zhang
    2006, 26(9):  2258-2260. 
    Asbtract ( )   PDF (616KB) ( )  
    Related Articles | Metrics
    Embedded Ethernet was applied to solving the bottleneck of data transfer in distributed seismic data acquisition system. A relay topology was put forward based on the features of seismic acquisition system, and the key point of network protocol based on this architecture was also given, in which the generation of route table and dynamic IP address assign were discussed with emphasis.
    Design and realization of common email management component based on COM
    2006, 26(9):  2261-2263. 
    Asbtract ( )   PDF (538KB) ( )  
    Related Articles | Metrics
    To solve the problems in lots of development tools such as poor flexibility, controllability and commonality in developing the email management system, a design philosophy of applying the COM(Component Object Model) technology to the common email management component was presented, and the method and process of component implementation were brought up as well as the example of application. The application demonstrates that this component possesses favorable commonality and flexibility.
    Interface design of Samsung S3C44B0X based on ARM
    2006, 26(9):  2264-2266. 
    Asbtract ( )   PDF (545KB) ( )  
    Related Articles | Metrics
    ARM system structure inherits such characters of RISC(Reduced Instruction Set Computer) as load/store structure, fixed 32 bit instruction and format of three address instruction. RAM based Samsung S3C44B0X Microprocessor has the advantages of low power consumption and high performance of RAM, and also has rich resources in chip which is suitable for the development of embedding product. Under certain conditions, real-time operation system μC/OS-II can be transplanted into S3C44B0X.The control of touch screen is realized through ADS7843 chip which is of low power consumption and high speed.ADS7843 communicates with ARM by synchronization serial, and then obtains position of touch screen which can represent coordinates of LCD. Accordingly, the hardware and software of touch screen interface were designed, and the flowchart of control procedure was listed.
2024 Vol.44 No.3

Current Issue
Archive
Honorary Editor-in-Chief: ZHANG Jingzhong
Editor-in-Chief: XU Zongben
Associate Editor: SHEN Hengtao XIA Zhaohui
Domestic Post Distribution Code: 62-110
Foreign Distribution Code: M4616
Address:
No. 9, 4th Section of South Renmin Road, Chengdu 610041, China
Tel: 028-85224283-803
  028-85222239-803
Website: www.joca.cn
E-mail: bjb@joca.cn
WeChat
Join CCF