By Topic

Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on

Date 23-25 March 2012

Go

Filter Results

Displaying Results 1 - 50 of 178
  • [Front cover - Volume 3]

    Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (906 KB)  
    Freely Available from IEEE
  • [Title page i - Volume 3]

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (75 KB)  
    Freely Available from IEEE
  • [Title page iii - Volume 3]

    Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (125 KB)  
    Freely Available from IEEE
  • [Copyright notice - Volume 3]

    Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (111 KB)  
    Freely Available from IEEE
  • Table of contents - Volume 3

    Page(s): v - xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (167 KB)  
    Freely Available from IEEE
  • Welcome message - Volume 3

    Page(s): xv
    Save to Project icon | Request Permissions | PDF file iconPDF (79 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Committee Members - Volume 3

    Page(s): xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (89 KB)  
    Freely Available from IEEE
  • List of Reviewers - Volume 3

    Page(s): xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (60 KB)  
    Freely Available from IEEE
  • Research on Sensitivity of Component-Based Reliability

    Page(s): 3 - 7
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (175 KB) |  | HTML iconHTML  

    In complicated software system it is very important research task to improve software reliability by improving single component. This paper introduces a kind of sort method by calculating sensitivity of component-based reliability. Considering dynamic and static character of software and complexity, using frequency, dependent intensity of component, this method calculates and sorts sensitivity of component-based reliability to help system manager to allocate resource in developing and testing reasonably. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • One of Aerial Image Geometric Correction Methods Based on 3-D Projection

    Page(s): 8 - 11
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (159 KB) |  | HTML iconHTML  

    Visible images are always slantwise, simultaneity ground control points layout are not easy, so we must choose one method which can correct the slantwise image based on few reference points. When exterior orientation elements known, the paper can build a correction plane founded on collinearity equations, and then correct the slantwise image using gray interpolation. The corrective effect is very visible, and the speed is rapid. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Fault Diagnosis of Mixed-Signal Circuits Based on Genetic Algorithms

    Page(s): 12 - 15
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (175 KB) |  | HTML iconHTML  

    As the fault modes of mixed-signal circuits growing, aiming at the features for its signal are both analog and digital amount, the paper analyzed that the fault diagnosis program of mixed-signal circuits with genetic algorithms by using SABER simulation method to inject faults and data collection based on a brief discussion of basic principles and operation of genetic algorithms, focused on consideration for the fitness functions of genetic algorithms, and then selected an optimization genetic algorithm to a specific airborne DC converter circuit's fault diagnosis, verifying the effectiveness of the method, provided a new diagnostic method for mixed-signal circuits. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Researches of Test Nodes Selection of Analog Circuit

    Page(s): 16 - 19
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (167 KB) |  | HTML iconHTML  

    Test nodes selection of analog circuit has great significance on fast, accurate circuit diagnosis, reduce test cost. For the lack of the current test nodes selection method of analog circuit, a test nodes selection method of analog circuit based on chaos immune clone selection optimization algorithm is presented in this paper. This method improves the efficiency and accuracy of test node selection. Finally the validity of this method is presented through circuit simulation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis on Analytic Arithmetic of Oriented Warhead's Contact of Missile and Target

    Page(s): 20 - 22
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (132 KB) |  | HTML iconHTML  

    Rather than general warhead, oriented warhead asks for more accurate explode-time and explode-angle. For this problem, this paper analyzes the error of traditional analytic model in approximate calculation. The analysis is carried separately within and without the distance between guide and warhead. In Matlab simulation, it is concluded that the distance will affect the explode-time deeply but will affect the explode-angle hardly. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on QDFET Using for Single Photon Detection

    Page(s): 23 - 25
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (262 KB) |  | HTML iconHTML  

    As an new pattern single photon detector, quantum-dot based single photon detector have good performance potential. In this paper, we first introduce the mechanism of photo-conductive gain of quantum-dot field effect transistor(QDFET), which is more suitable for quantum telecommunications compared to traditional mechanism. Then, QDFET in the form of a quantum point contact is mainly discussed, including its sensitivity and transport characteristics. This method is feasible and effective. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Remote Surveillance System Based on the Processor -- S3C2410

    Page(s): 26 - 29
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (133 KB) |  | HTML iconHTML  

    This thesis brings forward to a resolution of embedded remote surveillance based on the demand of reality. The system is centering on the embedded Linux and S3C2410, and basing on the Wi-Fi network to build the embedded remote surveillance, which can capture video signal from USB digital camera and transport the signal to client through Wi-Fi network. The way of remote surveillance based on Wi-Fi network makes the traditional way trend toward digitalization, networking and intelligence. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing Algorithms of Information Security

    Page(s): 30 - 33
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (136 KB) |  | HTML iconHTML  

    Nowadays, Network information security problem has been increasingly considered. There are a number of ways proposed to tackle this issue, such as dynamic programming algorithm, fuzzy-C means algorithm, but they still have some disadvantages, in this paper, we will use the genetic algorithm to solve the security problem efficiently. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Effective Pattern Matching Algorithm for Intrusion Detection

    Page(s): 34 - 38
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (342 KB) |  | HTML iconHTML  

    In this paper, an improved algorithm based on the BM algorithm: BMD is proposed. BMD algorithm can reduce the space complexity and maintain the time complexity by reducing a pretreatment function and recording the number of times that a bad char found in the pattern. Experiments indicate that the space complexity is reduced by 36% at most. Therefore, the improved algorithm can provide significant improvement in pattern matching performance when using in an IDS. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research for Spatial Interpolation Based on Cloud Computing

    Page(s): 39 - 42
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (273 KB) |  | HTML iconHTML  

    In view of shortage of traditional spatial interpolation calculation needs a lot of time, putting forward spatial interpolation calculation method based on cloud calculation. This paper builds cloud computing platform of space interpolation calculation, discusses the key technologies of the cloud computing in realization spatial interpolation calculation, emphases load balancing schedule between client's Map/Reduce and client. Tests show that cloud-based spatial interpolation improves the efficiency of execution time, it is conducive to parallel computing, and it has some theoretical significance and application value. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of the Data Mining Technique in Case Information Systems

    Page(s): 43 - 46
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (149 KB) |  | HTML iconHTML  

    This paper inquires into the application technique of the data mining in the case information systems. The related cases, the classifying characteristic regulations and the discovery models of the tendency analysis are presented. The ways of put them into practice are discussed which play a very important rule in the public security information analysis, mining and utilizing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Kalman Filter in the RoboCup 3D Positioning

    Page(s): 47 - 52
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (464 KB) |  | HTML iconHTML  

    In this paper, we introduced the positioning theory of robot in the RoboCup 3D simulation system, and proposed two improved orientation methods, it completed the robot walking path model, used the kalman filtering to track,and analysed the error of filter. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Method for Solving Inverse Kinematics of an Industrial Robot

    Page(s): 53 - 56
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (195 KB) |  | HTML iconHTML  

    The kinematics model of robot is established based on the specific structure of 6R robot. In consideration of the robot base movement and the actuators replacement, the key problem of robot inverse kinematics is separated and a new simple method for deriving inverse kinematics without complex matrix inversion is developed. Furthermore, by analyzing the procedure of solution, the author optimizes the solution algorithm in favor of programming realization to satisfy the demand of off-line programming and real-time control. Finally, the validity of the solution of forward and inverse kinematics is verified by simulation experiments. And the result can be used on the robot which has similar mechanical configurations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Optimized Path Planning Method for Off-Line Programming of a Industrial Robot

    Page(s): 57 - 60
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (236 KB) |  | HTML iconHTML  

    Aimed at satisfying the demand of complex path programming for industrial robot, a computer-aided programming system based on DXF file is developed. By analyzing storage information of the graphic elements in DXF file, we develop a method to extract lines, arcs and circles, and then come up with a connect algorithm, which rearranges and connects the original isolated graphic elements in drawing order to some continuous paths. Guaranteeing assigned working paths, this system can not only raise working efficiency by reducing spare travels, but also avoid position error in one continuous path between graphic elements caused by relocation. The paths after rearrangement can be converted into robot's working file directly, hence increasing the programming efficiency. The results of both simulation and field experiment prove the system's feasibility in cutting, gelatinizing, arc welding, grinding and etc. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Realization of Grain Seed Quality Testing System Based on Particle Image Processing Technology

    Page(s): 61 - 65
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (140 KB) |  | HTML iconHTML  

    How to quickly and accurately identify the quality of grain seed, grain type and other basic indicators and improve the efficiency of breeding quality, wheat production and quality in the work of selection or breeding have become a serious problem. The project developed the necessary software and hardware detection device platform, carried out research on the segmentation and counting algorithms of particle images for the system, and designed and implemented image processing techniques based on particle quality grain seed of the determination system. The result of the research has broad application prospects. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent and Active Defense Strategy of Cloud Computing

    Page(s): 66 - 68
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (129 KB) |  | HTML iconHTML  

    Cloud's development has entered the practical stage, but safety issues must be resolved. How to avoid the risk on the web page, how to prevent attacks from hacker, how to protect user data in the cloud. This paper discusses some satety solution :the credit level of web page, Trace data, analyze and filter them by large-scale statistical methods, encryption protection of user data and key management. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrated Navigation System Design Based on DSP

    Page(s): 69 - 71
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (164 KB) |  | HTML iconHTML  

    Integrated navigation system has wide application prospect in the military and civilian. Navigation system directly affects the performance of direct flight control accuracy in the high-altitude unmanned flight. In this paper, micro-navigation system has been studied, based on the TMS320C6713 hardware and software design, which has a broad application prospect in field of UAV. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Evaluation of Turbo Product Codes over the PPM-based Satellite Optical Channel

    Page(s): 72 - 75
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (199 KB) |  | HTML iconHTML  

    Atmospheric turbulence produces fluctuations in the irradiance of the transmitted optical beam, which is known as at-mospheric scintillation, severely degrading the link performance. Turbo product codes (TPC) has attracted much attention for its high coding rate and strong abilities of defeating long burst errors, which is a good choice for the highly correlated optical channel. In this paper, a scheme combining turbo product codes (TPC) and pulse-position modulation (PPM) has been analyzed for the temporally correlated satellite-to-ground optical channel with an avalanche photodiode (APD) receiver and Gaussian thermal noise. The results indicate that TPC is capable of defeating long burst errors and it can offer enough temporally diversity for the free-space optical communication (FSOC) system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D FEM Calculation for the Temperature Field of the Aluminum Electrolysis Cell Using Ansys

    Page(s): 76 - 79
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (896 KB) |  | HTML iconHTML  

    The mathematical model of a three-dimensional temperature field in the full 300 kA aluminum electrolysis cell was calculated with ANSYS. The calculated results revealed that the thermal gradients strongly concentrated in the lateral freeze profile of the aluminum electrolysis cell, and the sharp temperature gradient in the insulating material under the cathode carbon block were also found, the temperature of liquid aluminum was between 1174-1233 K, the lowest temperature of bottom cell wall was about 322 K, which indicated that the temperature of the aluminum electrolysis cell bottom was overcooled, so the 300 kA aluminum electrolysis cell need to be redesigned to get the reasonable temperature field. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on the Method of Parallel Robot Mechanism Modeling in Parallel

    Page(s): 80 - 83
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (146 KB) |  | HTML iconHTML  

    The modeling method of parallel robot mechanism has been extensively studied based on the Single Open Chain theory (SOC) in this paper. According to the characteristics of the parallel robot mechanism's, ideas and general methods of parallel robot mechanism modeling in parallel has been proposed and typical parallel robot mechanism's modeling has been performed. Study shows that the parallel modeling approach can dramatically increase the modeling and analysis efficiency for parallel manipulators. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Distance Property Analysis Algorithm for FTFs in DFH Systems

    Page(s): 84 - 88
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (262 KB) |  | HTML iconHTML  

    By considering the frequency transition as a coding process, a new state diagram based distance property analysis algorithm for frequency transition function (FTF) is derived in this paper. In this new algorithm the distance property can be quickly obtained by solving the state equations derived from the transition process of the state diagram. It is confirmed that the BER performances of DFH systems which are decided by the distance properties of FTFs can be easily and effectively acquired. The new algorithm provides an efficient distance property analysis tool for the construction of FTF, it can help to optimize the design of a DFH system. Numerical simulation results support the theoretical analysis result of our algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Grid Parallel Computing in Information Retrieval Research and Application

    Page(s): 89 - 93
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (202 KB) |  | HTML iconHTML  

    This paper describes in detail construction of The Grid Parallel Computing of books and documents, system solves the problems and methods, as well as design to realization of MDS module. Scientific data grid software adopt SOA, through the standardization of metadata and metadata-based resource discovery to make users can be achieved uniform access to distributed heterogeneous data resources in two phases of query. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of Teaching Management Systems Integrated of Vocational College Based on SOA

    Page(s): 94 - 97
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (188 KB) |  | HTML iconHTML  

    Teaching Management Systems is the center work of Vocational College. The paper discuss exist some problems of the current teaching management systems, according to theoretical system based on service-oriented architecture, we propose a sort of architecture and hierarchical model SOA-based about academic management system, develop a integrated platform of teaching information system on web service of J2EE-based. The phenomenon is solved about data islands of teaching management system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structural Finite Element Method Based on Cloud Computing

    Page(s): 98 - 101
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (149 KB) |  | HTML iconHTML  

    The structural finite element method has been widely used in modern architecture high-performance computing. And a lot of finite element tools based on parallel computing model have emerged. This paper analyzes and compares the difference between MPI and Map Reduce programming model. The combination of MPI and Map Reduce has been presented for the parallel finite element analysis based on the cloud computing environment. In this way, the existing structural software resources of parallel finite element analysis can be used with the advantages of cloud computing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Density-Based Clustering Algorithm for Uncertain Data

    Page(s): 102 - 105
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (159 KB) |  | HTML iconHTML  

    As the development of the data acquisition technology, the research of the uncertain data has been the center of people's attention, and at the same time, the cluster of the uncertain data has been in use widely. In this paper, after studying the cluster of the uncertain data, considering characters of the uncertain data, we propose a improved algorithm. We called it En-DBSCAN. In order to adapt the request of uncertain data's clustering we add probability factors and the theory of information entropy. The algorithm brings in a conception of probability radius to adjust uncertain data's scope of EPS neighborhood and information entropy to reduce center point's indeterminacy. Besides, this paper gives an analysis and confirmation about the algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Screen Luminance, Subtitle, and Viewing Angle on Viewing Distance of Liquid Crystal Display High-Definition Television

    Page(s): 106 - 109
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (163 KB) |  | HTML iconHTML  

    This study explored the effect of screen luminance, subtitle, and viewing angle on preferred viewing distance for liquid crystal display high-definition television (LCD-HDTV). The results showed the mean preferred viewing distance was 3246 mm, about 4 times of television width. Preferred viewing distance increased as the scale of screen luminance went upward from scale 10 to scale 60, then decreased from scale 60 to scale 90. Whether there was subtitle or not did not have significant effect on viewing distance. Moreover, viewing angle was highly correlated with preferred viewing distance. The more deflected from the direct front view, the shorter the viewing distance was. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chromaticity and Luminance on Visual Performance and Subjective Performance for Imagery on LCD

    Page(s): 110 - 112
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (144 KB) |  | HTML iconHTML  

    This study investigated the effects of chromaticity and luminance on legibility and subjective preference for imagery presented on LCD. The results showed that chromaticity and luminance had little effect on legibility speed. Both chromaticity and luminance significantly affected subjective preference. Chromaticity seemed to be more important than luminance for subjective preference. Participants appeared to prefer medium luminance, they also showed less preference for achromatic imagery. Regression equations for legibility speed and subjective preference were constructed. Correlation analysis showed that the equations were better than Lippert's ?GE (CIE Y, u', v'). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of a Capture Technique to the 3D Harbor Construction

    Page(s): 113 - 117
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (737 KB) |  | HTML iconHTML  

    The main purpose of this paper is to design an innovative ship handling simulation program by combining the development of Quest3D software and the Google earth harbor terrain software. The paper describes the usage of the Google earth program to retrieve the latitude and longitude elevation, through GIS conversion and 3D graphical model to generate the Quest 3D harbor construction blueprint. Projectors display the image with build-in formula calculated angle settings to achieve a better perspective for the projectors installation. A 3D virtual reality scene was built by using the Maya Model, and then we overlap with the harbor module to complete the famous world ports. The results will be tested in the ship handling simulator machine at the 3D virtual reality software development laboratory. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Crack Image Extraction Using a Radial Basis Functions Based Level Set Interpolation Technique

    Page(s): 118 - 122
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (313 KB) |  | HTML iconHTML  

    The extraction of crack images is an important process in the area of structural health monitoring for determining the severity of the damage induced by cracks. In this paper, a radial basis functions (RBFs) based level set interpolation technique is proposed to extract the images of cracks in structures. In the proposed method, the level set in the form of radial basis functions with an ellipse constraint can represent accurately various shapes without requiring building interior and exterior layers for the sparse mesh grid of RBFs centers or using information on contour/surface normal. The initial distance function embedded in the ellipse-constrained RBFs can be interpolated on a much coarser grid. Its deformation is considered as an updating of the RBFs coefficients by solving an ordinary differential equation (ODE) and a non-convex quadratically constrained quadratic programming (QCQP). The use of a semi-definite relaxation technique in solving the non-convex QCQP problem has shown that initialization and re-initialisation are no longer necessary. The images of a number of cracks have been extracted using the proposed method. It has been shown that the proposed method can extract crack images efficiently with coarse grid of RBFs centers and is also less sensitive to the distribution of the crack images in the domain. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Interval-Valued Fuzzy Analytical Hierarchy Process Approach and Its Application

    Page(s): 123 - 128
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (337 KB) |  | HTML iconHTML  

    Project evaluation and selection is a complex multi-attribute decision-making problem. With the information uncertainty and inaccuracy considered, a new model for project evaluation and selection is proposed, which combines the fuzzy analytic hierarchy process (AHP) and technique for order performance by similarity to ideal solution (TOPSIS). The hybrid method is based on interval-valued triangular fuzzy numbers. An index system for selecting the optimal project is established. The weights of criteria and sub-criteria are derived by fuzzy AHP. The relative closeness is drawn from the calculation of the distance between the alternatives and positive ideal solutions or negative ones. Also, the ranking of alternatives can be based on their relative closeness. Finally, a case study is given adopting the proposed method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Optimization of Ethernet Access System for Receiving Frames of Ethernet Based on FPGA

    Page(s): 129 - 133
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (232 KB) |  | HTML iconHTML  

    The purpose of this paper is to design and develop an implementation for the underlying data reception on Field Programmable Gate Arrays (FPGA) by top-down structured design. In this paper, we optimize the receiving data function of underlying Ethernet access device, reducing the requirement of the Inter-Packet Gap (IPG) for flow control. It is shown by the test that Ethernet access device don't need IPG for flow control any longer after our optimization. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Petri Net Modeling of SIP of Traversing NAT Based on STUN

    Page(s): 134 - 138
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (188 KB) |  | HTML iconHTML  

    Petri net is widely used in the simulation and analysis of the discrete event systems because of the features such as intuition, simplicity and understandability. The paper used Petri net to model and analyse SIP protocol of traversing NAT. Firstly the paper proposed using STUN to implement the NAT traversal of SIP protocol and simply introduced the advantages of Petri net modeling, then introduced the related knowledge of SIP and NAT and pointed out the impact of NAT on SIP protocol, and then detailedly described the SIP session interaction process of traversing NAT based on STUN, finally this process was modeled using Petri net and further made the reach ability analysis. In this way, the paper clearly and intuitively showed the voice communication process between the private network hosts by SIP protocol. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Self-Rollback System for Vulnerability Attack

    Page(s): 139 - 143
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (349 KB) |  | HTML iconHTML  

    In the paper attacks in view of the procedure loophole, proposed when the procedure movement from restores and returns draws back the method. First knows in the method to the procedure entrance point returns as the procedure draws back the spot , next when procedure collapse distinguishes and locates the procedure loophole, finally analyzes between the loophole input and exterior input dependent relations distinguishes the triggering procedure loophole the procedure entrance point, and returns to this input point correspondence procedure draws back an achievement this procedure from to restore returns draws back the condition to carry on to the procedure draws back, causes the procedure to be possible to continue the normal operation. The experimental result indicated that, the method can succeed the recognition to attack to the realistic software loophole and completes the procedure from to restore draws back. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interactive Genetic Algorithms with Grey Modeling for Individuals Fitness

    Page(s): 144 - 147
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (155 KB) |  | HTML iconHTML  

    In order to apply the interactive Genetic Algorithms (GA) into complicated optimization problem, an interactive Genetic Algorithms with grey prediction for fitness of evolutionary individuals is proposed, in which the uncertainty of evolutionary individuals is measured by gery modeling. By predicting the grey modeling, the reliableness which reflecting the measurement is abstracted. On this basis, the formulation of fitness adjustment is proposed. The algorithm is applied to a fashion evolutionary design system, test results show that it can find more satisfactory solutions per generation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring Speculative Procedure Level Parallelism from Multimedia Applications

    Page(s): 148 - 151
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (165 KB) |  | HTML iconHTML  

    Multimedia applications are fast becoming one of the dominating workloads for modern computer systems. How to make use of multicore computing resources to accelerate multimedia applications has become a common concern problem. However, potential speculative procedure level parallelism in multimedia applications has not yet been explored thoroughly. This paper proposes a procedure level speculation architecture for accelerating multimedia applications, including its speculative mechanism and analysis method. It also takes several applications from Media bench to analyze their coverage parallelism, thread size, inter-thread data dependence feature and potential speedup. The experimental results show that: (1) the best adpcm application can get a 12.2x speedup in procedure level speculation, (2) limited parallelism coverage and severe inter-thread data dependence violations badly affect speculative procedure level parallelism in some multimedia applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hybrid Diff-SerV Pricing Scheme for Wireless Data Services

    Page(s): 152 - 156
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (360 KB) |  | HTML iconHTML  

    With the development of wireless mobile communication, more and more wireless data services have gradually emerged, calling for effective pricing mechanism due to the nonapplicable traditional one. In this paper, a novel hybrid Diff-SerV pricing method for wireless data services is proposed, which considers radio resources, service characteristics as well as quality of service (QoS). The kernel of our algorithm is to distinguish service types and related the resource cost with QoS level. Therefore, it could be viewed as a method for resources scheduling, which can effectively exploit the scare radio resources to support more service users and meanwhile provide better QoS. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of the Platform for Mobile Service Support Based on Massive Signaling Mining

    Page(s): 157 - 160
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (263 KB) |  | HTML iconHTML  

    On the basis of the research of massive signaling mining, obtain user track, analyze user behavior, mine user preference, and then utilize 3G mobile communications network technology to design a platform of mobile service support, which generalizes the signaling information for all types of customers and makes statistics, and reasons customized information intelligently, extracts effective data though technology of data mining, analyses user behavior and makes intelligent of processing, then selects services for the customer they need most automatically. It is personalized, precise and intelligent. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of an Intelligent Information Integration System Based on Android Mobile Terminals

    Page(s): 161 - 165
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (428 KB) |  | HTML iconHTML  

    The development of mobile terminals, 3G and networks, has brought strong momentum and broad prospects to the development of applications based on mobile internet [1][2][3]. On the other hand, users hope to get the information they want at anytime, anywhere through mobile devices rather than relying on a PC. This paper puts forwards an e intelligent information integration system based on Android mobile devices. Using middleware technology [4][5], web service technology [6] and lightweight XML parsing technology, the system takes individual needs of customers as the center, setting up a "digital application of Mobile Box" for each user, providing users with a variety of mobile multimedia applications and service that meet personal needs. The intelligent information integration system has been realized on the Android platform, and runs well providing intelligent space for users' personalized service. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and Implementation of Jacobi Algorithm Based on MPI with Checkerboard Decomposition

    Page(s): 166 - 169
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (314 KB) |  | HTML iconHTML  

    In order to achieve parallel algorithm ported from serial algorithm, this paper proposes a simplified model based on MPI checkerboard decomposition. The process of analysis, design and implementation of parallel program will be speed up, by emphasizing data and calculation decomposition. Jacobi algorithm is used as an example to explain this simplified model. The example results show that simplified model is more suitable for implementation of parallel program than Foster's task/channel model, and checkerboard decomposition has better speedup than row/column decomposition. Furthermore, this simplified model applies to design not only Jacobi algorithm but also other parallel algorithms based on checkerboard decomposition. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • J2EE-based Online Video Retrieving System Design and Implementation

    Page(s): 170 - 173
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (459 KB) |  | HTML iconHTML  

    Most video contents on the Internet are regularly watched online, but it is also necessary for users to download them to local storage for further processing. Currently, many online video websites provide their own service for website specific video retrieving, it is difficult to build an integrated web retrieving system adapted for all online video website due to different protocols. This paper presents an online video address discovery and retrieving system which supports multiple online video protocols and formats, parallel retrieving task scheduling, vast amounts of unstructured data and video file storage management, it is suitable for integration in high load, large scale enterprise applications to provide video retrieving service. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of the Digital Frame Extractor Based on OMAP-L138 Application Processor

    Page(s): 174 - 177
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (602 KB) |  | HTML iconHTML  

    The OMAP-L138 application processor is a dual core SOC(ARM926EJ-S and C6478VIEW DSP) chip developed by the Texas Instruments. In the paper, the performance features of the OMAP-L138 chip is introduced and a design scheme of the digital frame extractor based on the OMAP-L138 is proposed. The video input module and output module, the SATA hard disk module, the network module of the digital extractor are configured in detail. The application software design flow based on the hardware platform is proposed in the paper. The playback of the video data based on the network interface and LCD interface is designed. The image files stored in the SATA hard disk are transferred to the personal computer for broadcasting through the network. On the other hand, the image files can also be displayed through the LCD interface of the OMAP-L138. Taking advantages of the ARM core and the digital processing capabilities of the DSP core, low power high-performance is exerted. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Two-step Discretization Algorithm Based on Rough Set

    Page(s): 178 - 182
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (177 KB) |  | HTML iconHTML  

    A two-step discretization algorithm by dynamic clustering based on Rough set is proposed. The algorithm first discretization for decision table using dynamic clustering algorithm, then discrete again using cut importance discretization algorithms, and obtain the final cut sets, because the dynamic clustering algorithm processing speed is quickly and it impel a lot of breakpoint be screened, thus the operation efficiency of algorithm is increase notable. Finally, simulation results show that the proposed algorithm is correct and high efficiency. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.