scispace - formally typeset
Search or ask a question

Showing papers in "Computer Knowledge and Technology in 2011"


Journal Article•
TL;DR: The world of Internet enterprises and telecommunications companies in March Xiang Yun computing announced his" cloud security plan", cloud, cloud storage, internal,external, public cloud cloud cloud, private cloud.
Abstract: Google,Amazon,VMware,Microsoft,Oracle,IBM and other international giants announced his" cloud security plan",cloud,cloud storage,internal,external,public cloud cloud cloud,private cloud......A bunch of people see things in a blur concept in the constant impact on people's nerves.The world of Internet enterprises and telecommunications companies in March Xiang Yun computing.What is cloud computing? This article from the service mode,the application features and development potential of cloud computing has thorough research.

57 citations


Journal Article•
TL;DR: This article from standard, models, knowledge, and dynamic, and many other aspects of information systems risk assessment methods for parsing and pointed out that the method for quantitative and qualitative analysis of their respective advantages and disadvantages is pointed out.
Abstract: This article from standard,models,knowledge,and dynamic,and many other aspects of information systems risk assessment methods for parsing and pointed out that the method for quantitative and qualitative analysis of their respective advantages and disadvantages,finally on the development of risk assessment method of trend views are given

54 citations


Journal Article•
TL;DR: The idea of fabricating analog phase-locked loop with imported VCXO with feasibility and the possibility of circuit improvement is introduced.
Abstract: Aiming at the defects of the existing analog phase-locked loop,the idea of fabricating analog phase-locked loop with imported VCXO is introduced in this article.The article also puts forward the design and selection of elements of the circuit.Test with experiment shows that feasibility of such scheme and the possibility of circuit improvement.

42 citations


Journal Article•
TL;DR: The basic concept of IoT is discussed from the view point of the architecture and key technology, and some suggestions of IoT development are given.
Abstract: Internet of Things(IoT) combines sensor technology,embedded computing,Internet and wireless communication technology,distributed information processing technology,and has broad application prospects.Therefore,the revolution of the Internet of Things(IoT) has attracted highly attention of domestic and foreign government,academia and industry.There are still many open issues in the definition,architecture and key technologies of IoT.In this paper,firstly,based on analysis of existing literatures of IoT,the basic concept of IoT is dis-cussed from the view point of the architecture and key technology.Five essential factors which the IoT should have are summarized.Sec-ondly,the architecture is further proposed.its structure and functions are described.Thirdly,the key technologies of IoT are analyzed,in-cluding recognition technology,sensing technology,network technology and smart technology.Finally,this paper gives some suggestions of IoT development.

20 citations


Journal Article•
TL;DR: The improved algorithm uses the canny-operator to replace the laplace-operator, and uses the automatic segmentation algorithm in ITK to segment excess and can enhance the precision greatly.
Abstract: In view of the problems of the precision of segmentation and that the speed of interactive segmentation algorithm is slow,we have made the improvement to original Live-wire algorithm.The improved algorithm uses the canny-operator to replace the laplace-operator,and uses the automatic segmentation algorithm in ITK to segment excess.It can enhance operating sp eed,at the same time,can enhance the precision greatly.

18 citations


Journal Article•
Gu Peng1•
TL;DR: This article mainly focuses on the application of RFID technology and the advantages of the Internet of things technology, and pointed out that the current the Internetof things technology security, high reliability and cost issues.
Abstract: This article mainly introduces the concept of the Internet of things,present situation and prospect of the Internet of things devel-opment,focuses on the application of RFID technology and the advantages of the Internet of things technology,and pointed out that the current the Internet of things technology security,high reliability and cost issues.

14 citations


Journal Article•
TL;DR: A software project risk assessment model based on Fuzzy theory is proposed that provides a way to effectively reduce the risk probability and increase the rate of the success of software development.
Abstract: Many uncertainties always exist in the development and management process of software project,To handle with the complexity and uncertainty of software project,the paper proposes a software project risk assessment model based on Fuzzy theoryUsing the model,we can assess the consequences and the loss of the risk,besides,it can measure a combination of impact of a certain risk from a variety of risk and the combined effects of the overall consequences from individual riskPractice proves that the model can predict risks and identify the sources of riskIn a word,it provides a way to effectively reduce the risk probability and increase the rate of the success of software development

10 citations


Journal Article•
Wang Zhen1•
TL;DR: With introduction of the technology related to clustering routing protocol for wireless sensor network and merits of clusteting routing protocol, some representative clustering algorithms and main desgin principles are emphatically analyzed.
Abstract: With introduction of the technology related to clustering routing protocol for wireless sensor network and merits of clusteting routing protocol,some representative clustering algorithms and main desgin principles are emphatically analyzed.Firstly,the related technology to clustering algorithms and it's merits are presented.Then a comprehensive survey with analysis is made to different methods and representative protocols.In the end,the related protocols are compared,moreover the open research problems and possible solution are pointed out.

8 citations


Journal Article•
TL;DR: This paper points out the characteristics of NoSQL datebase and the current application situations, and describes how to use in combination with NoSQL database and the traditional relational database in some scenes and illustrates with some examples.
Abstract: This paper introduces a database called NoSQL,thoughout the descriptions of the traditional relational database and its present problems,meanwhile,points out the characteristics of NoSQL datebase and the current application situations;finally,summarizes how to use in combination with NoSQL database and the traditional relational database in some scenes and illustrates with some examples.

8 citations


Journal Article•
TL;DR: This paper study the fault management issue in wireless sensor networks by listing and comparing the general fault management architecture and presents benefit to the application of Wireless sensor networks.
Abstract: By considering the resource limited of wireless sensor networks,this paper study the fault management issue in wireless sensor networks.Focus on listing and comparing the general fault management architecture.The result we present is benefit to the application of wireless sensor networks.

8 citations


Journal Article•
TL;DR: This paper analyzes the main methods of automatic face recognition and elaborates the evolution history and the current situation of the relevant research.
Abstract: This paper analyzes the main methods of automatic face recognition and elaborates the evolution history and the current situation of the relevant research.Several promising directions for future research are also proposed in this paper.

Journal Article•
TL;DR: Based on greedy algorithm, the mathematical model is constructed and then algorithm for the problem is implemented and optimum combination results are obtained and indicates the method can improve utilization of chamber area efficiently.
Abstract: The arranging of lock chamber is a two-dimensional packing problem.Based on greedy algorithm,this paper studies on how to reduce two-dimensional packing problem to one-dimension,the mathematical model is constructed and then algorithm for the problem.Last,running in Visual C++ platform,optimum combination results is obtained and indicates the method can improve utilization of chamber area efficiently.

Journal Article•
TL;DR: A brief review of researches onVision-based human motion analysis concerns the detection, recognition, description and tracking of people, and the understanding of human behavior patterns.
Abstract: Human motion analysis is currently one of the most hot research topics in computer vision.This interesting issue is widely used in different areas such as virtual reality,video surveillance,human machine interface,etc.Vision-based human motion analysis concerns the detection,recognition,description and tracking of people.Furthermore,it also concerns the understanding of human behavior patterns.In the past years,various methods and applications for these issues are discussed.This paper provides a brief review of researches on vi sion-based human motion analysis recently.Finally,this paper gives some challenges and future directions of this topic.

Journal Article•
TL;DR: Several commonly used image segmentation algorithms and theory are discussed and to study the aggregate asphalt mixture characteristics of the background, experimental results are shown to compare histogram threshold, iteration method and the Otsu.
Abstract: Image segmentation is a key step for image analysis,Is also the basis for further understanding of the imageIn this paper,discusses several commonly used image segmentation algorithms and theory,and to study the aggregate asphalt mixture characteristics of the background,experimental results are shown to compare histogram threshold,Iteration method and the Otsu

Journal Article•
TL;DR: The secondary development for Solidworks in Visual Basic and established a parametric system is given and it has been proved that the system can satisfy the market rapidly.
Abstract: Based on the method of Solidworks and its application Programming interface function for further development,this paper gives the secondary development for Solidworks in Visual Basic and established a parametric system.Based on key parts library and the instance of chassis's product,this paper introduces the course of developing part and enhances the quality and efficiency.By the method of developing the key product for automobile chassis,it has been proved that the system can satisfy the market rapidly.

Journal Article•
TL;DR: Combining the Fuzzy control quickness, very small over shoot, and classical PIC control, the resistance furnace temperature control system is designable which is able to process data and control function in this paper.
Abstract: With SCM as the principal part,the resistance furnace temperature control system is designable which is able to process data and control function in this paper.The system features auto-measurement,gathering data real time,dealing with and control result display,and print.This thesis applies MCS-51 as the center unit to design the fuzzy controller.The fuzzy controlling arithmetic is used in software. Self-adaptive PID parameters are modified on line,fuzzy self-tuning is made.Combining the Fuzzy control quickness,very small over shoot,and classical PIC control,the system eliminates the stable error.

Journal Article•
TL;DR: Aim at the safe status of domestic coal mine, analyse and prospect the application of IoT in coal mine industry, and provide a new insight for the safety production.
Abstract: The internet of things(IoT) has been paid more and more attention by the government,academe and industry all over the worldWith the analysis of the development and conformation of IoT technology,this paper introduced the concept of IoT,the basic char acteristics and attributesIt also described the development phases,system structure and the key technologies of IoTAim at the safe status of domestic coal mine,analyse and prospect the application of IoT in coal mine industry,provides a new insight for the safety production

Journal Article•
TL;DR: Function optimization experiments show that, the cloud genetic algorithm con-vergence requires fewer generations, and convergence rate is faster than the standard genetic algorithm.
Abstract: Genetic algorithm is an optimization technology which is based on the theory of evolution,and using design method of the ge-netic combination,genetic mutation and natural selection.The selection of Genetic algorithm’s crossover probability and mutation proba-bility are the key which is influenced the behavior and performance of genetic algorithm,directly affects the convergence of the algorithm.This paper combines the normal cloud model cloud droplets of randomness and stable tendency,by X condition cloud generator to gener-ate adaptive crossover probability and mutation probability.Function optimization experiments show that,the cloud genetic algorithm con-vergence requires fewer generations,convergence rate is faster than the standard genetic algorithm.

Journal Article•
TL;DR: This paper will show how to under this environment of data collection modes, and based on the data collection process of possible surprises, the data fault-tolerant aspects the cloud's approach are analyzed.
Abstract: Computing clouds is a kind of when the Internet is center,with open standards and service is our foundation,provide safe and reliable calculation service computer technologyThis paper will be based on the special cloud environment,how to under this environment of data collection modes,and based on the data collection process of possible surprises,analyzed the data fault-tolerant aspects the cloud's approach

Journal Article•
TL;DR: Experiments show that the improved algorithm reduces the amount of computation, improve efficiency, while a certain improvement of clustering results is shown.
Abstract: By studying the KNN algorithm,I proposed the method a training set of text clustering results using KNN algorithm to im prove,first the training set using text DBSCAN algorithm to cluster together,the text is divided into a number of training set clusters,then using KNN algorithm test document for testing,and finally with the nearest cluster of n number of training set in the text text using KNN algorithm to classify the test.Experiments show that the improved algorithm reduces the amount of computation,improve efficiency,while a certain improvement of clustering results.

Journal Article•
TL;DR: An improved watershed algorithm based on pre-processing is proposed aiming to human brain MRI image, showing that this method can effectively restrain the over-segmentation of traditional watershed algorithm.
Abstract: With regard to the over-segmentation of traditional watershed algorithm,an improved watershed algorithm based on pre-processing is proposed aiming to human brain MRI image.Noise is considered as direct factor of over-segmentation in this paper.Firstly,morphological opening operation and closing operation are used to denoise.Then,calculate the gradient image for the denoised image.Subsequencely,amend the gradient image according to inside and outside marks.Finally,implement watershed transformation on the amended gradient image.The results show that this method can effectively restrain the over-segmentation of traditional watershed algorithm.

Journal Article•
TL;DR: The article presents and analyzes the type of network for a typical key management scheme of wireless sensor networks used for military target tracking, environmental monitoring, tracking and other aspects of patient condition.
Abstract: Wireless sensor networks used for military target tracking,environmental monitoring,tracking and other aspects of patient condition,when its deployment in a hostile environment,subject to different types of malicious attacks,protect their safety is extremely important.Strictly limited resources of sensor nodes,traditional network security mechanisms do not apply to wireless sensor networks.Protect the security of wireless sensor network is used to encrypt the transmission of data,the article presents and analyzes the type of network for a typical key management scheme.

Journal Article•
TL;DR: This article analyzes computer network security risks and introduces a list of guard measures for computer networkSecurity.
Abstract: With the rapid development of computer network technology,the network has not only brought unprecedented convenience,but also more security issues.This article analyzes computer network security risks and introduces a list of guard measures for computer network security.

Journal Article•
TL;DR: The MATLAB experiments demonstrate that the image enchancement based on histogram equalization and specification actually make the image better in vision.
Abstract: Image enhancement which is also called image pre-processing,can improve the visual quality of the whole and partial image,by transforming the image's data according to some special methods.The image enchancement based on histogram equalization and specification can improve the contrast details and the dynamic range of gray level of the image.The MATLAB experiments demonstrate that the image enchancement based on histogram equalization and specification actually make the image better in vision.

Journal Article•
TL;DR: The computer network is analyzed for security hidden danger to the security strategy, and for safety hazard, in the context of several potential safety hazard and security hidden Danger.
Abstract: Twenty-first Century is a new era of global information,and the Internet technology will play an important role in it,it is wide ly used in the fields of economy,politics,culture,education and military and other fields,it brings great convenience for people at the same time,are also subject to increasingly serious security threat from the networkThis paper briefly analyses the computer network in the pres ence of several potential safety hazard,and for security hidden danger to the security strategy

Journal Article•
TL;DR: The paper introduces the practical application of parking reservations, parking guidance, parking monitoring and control, and intelligent parking management system mode based on RFID, wireless sensor networks, ultrasonic sensors and other technologies of the internet of things.
Abstract: Based on RFID,wireless sensor networks,ultrasonic sensors and other technologies of the internet of things proposes intelligent parking management system mode.By the whole process description of the vehicle's entry and exit from the parking.The paper introduces the practical application of parking reservations,parking guidance,parking monitoring and control.

Journal Article•
TL;DR: Two types of pattern recognition of the problem of research are focused on, under some kind of a stock method, and the vague and class methods of traditional mode of the application recognize are discussed.
Abstract: Fuzzy clustering method are using fuzzy pattern recognition of the basic theory,the basic ideas is the need to identify the templates,with a vague to be the classas a model identification using fuzzy mathematics of the basic concepts,principles of settling the classification identification of problemsthis article,it focus on two types of pattern recognition of the problem of research,under some kind of a stock method,and discussed the vague and class methods of traditional mode of the application recognize

Journal Article•
TL;DR: The article introduce the reminded problems of Hadoop data processing platform and Illustra Configuration parameters imization the hadoop performace to increase the system performace and efficiency.
Abstract: Hadoop technology had been wildly used and research around the internet and academics.The article introduce the reminded problems of Hadoop data processing platform and Illustra Configuration parameters imization the hadoop performace to increase the system performace and efficiency.

Journal Article•
TL;DR: A system architecture of a new generation of smart phone software development platform named android is introduced that can not only download music on the website, but also support the music playing while downloading more importantly, and eventually meet the needs of the client user.
Abstract: This paper introduces a system architecture of a new generation of smart phone software development platform named android.For the current situation of the streaming media on android platform is underdeveloped,multimedia and caching technology are studied to design a music-playing software and achieve it in the mobile client simulator.This software can not only download music on the website,but also support the music playing while downloading more importantly,and eventually meet the needs of the client user.

Journal Article•
TL;DR: The basic theory, the construction of the model, and some kinds of improved algorithm forms of ACO are introduced, which help solve the discrete or continual optimization problems of the Ant Colony Optimization.
Abstract: The Ant Colony Optimization(ACO) is a new evolution algorithm with a widely application for solving the discrete or continual optimization problems.This paper briefly summarizes the research state of this algorithm,and introduces the basic theory,the construction of the model,and some kinds of improved algorithm forms of ACO.