Proceedings of the 2012 National Conference on Information Technology and Computer Science
271 articles
Proceedings Article
Parallel Processing Imaging Algorithm for Synthetic Aperture Radar based on pipeline
Zhili Hua, Chao Hui, Hongping Li
Parallel processing is an effective way to process Synthetic Aperture Radar (SAR) data quickly and realize realtime imaging. Based on the traditional serial Range-Doppler algorithm, a parallel SAR imaging processing scheme is present by using of pipeline technology, and partition approach of computing...
Proceedings Article
Study on the Fault Diagnosis for Scroll Compressor Based on Information Entropy
Tao Liu, Zai xin Wu, Yong wei Wang
In order to make a quantitative description for the running status of the scroll compressor, a fault diagnosis method combined with the theory of entropy and grey incidence degrees in information theory is set up. Based on singular spectrum entropy in time domain, power spectrum entropy in frequency...
Proceedings Article
The Research of Using Animation Design to Promote the tourism economy under the Guilin Folk Cultural Characteristics
Yu-ting Zhang, Zhi-hong Liu
Guilin is not only a minority living area that full of profound folk cultural but also a world famous tourism city. Research and analysis of the Guilin folk culture, give full play to its inheritance and creativity and display in the form of animation, it is a meaningful exploration and research for...
Proceedings Article
Study on Reconstruction of Heat Flux in Moving Boundary
Zhijian Wu, Jing Feng, Xueyan Zhang, Aixia Zhou
The initial boundary value problem for parabolic equation with Neumann boundary condition is a kind of classical problem in partial differential equations. In this paper,we consider a heat inverse problem with moving boundary. By introducing a density function for potential method, thisproblem is essentially...
Proceedings Article
SeqARM: An Association Rule Mining Algorithm Based on Sequence Constraint
Shenshen Bai
Sequence constraint mainly considers the occurrence time of item, which can determine whether an association rule is valid. This paper proposes a novel algorithm SeqARM that aims to mine strong association rule with sequence constraint and runs on the second phase of association rule mining. SeqARM employs...
Proceedings Article
Research of Workflow nets Application Based on the Petri nets
Dabin Qi, Jun Yao, Qiuju Li
This paper introduced basic knowledge of Petri nets and workflow, and invariant analysis technique of Petri nets models structure, and integrate the real application circumstances of the workflow of receive document in document management, constructs an integrated workflow model based on Petri net. Further...
Proceedings Article
The Application of Threshold Segmentation Algorithm in Loess Microstructure Image Analysis
Nian-dong Deng, Xiao Wang, Feng Wang, Yang Zhou
The image research on loess microstructure which has profound influence on loess engineering mechanics properties is a new subject of geotechnical, the loess microstructure information and its section of the occurrence can be reflected via CT or electron microscope technology. The loess microstructure...
Proceedings Article
Simulation and Analysis of Influence of Group Delay Distortion on Performance of DBF System
Hao Gao, Xiaohui Li
Group delay distortion between channels is one of the most important factors which affect the BER (bit error rate) performance of DBF (digital beam forming) System. The basic principles of DBF and the concept of group delay are first introduced, and a linear group delay filter is designed based on the...
Proceedings Article
An Efficient Solver for the Stokes equations with Random Inputs
Dong Qu, Jing Yang
In this paper we present a high order method to solve the Stokes equations with random coefficients numerically. A stochastic Galerkin approach, based on the truncated Karhunen- Loeve decomposition technique for the stochastic inputs, is used to reduce the original stochastic Stokes equations into a...
Proceedings Article
Analysis of the Performance about Actual Quantum Key Distribution System Based on BB84 Protocol
Kai-guo Huang, Yan-bo Wang, Qi-ye Zhang, Xiao Wang, Min He
Analyzed how did the fiber length, the attenuation and the average photon number of the pulse emitted by the single photon source affect the receive efficiency in the fiber channel quantum key distribution system based on the BB84 protocol. A theoretic model relative to the system was represented. It...
Proceedings Article
Arinc429 Bus-based Multi-Dsp, Fpga Component Program Serial Load
Yongchao Zeng, Jianhui Zhao, Fan Li
The load of DSP and FPGA program are usually accomplished by the way of JTAG. But in some occasions, the circuit of DSP and FPGA are sealed up in the equipment; it is not convenient to update the program by dismounting device. For example, certain aviation equipment left only one interface of ARINC429...
Proceedings Article
Studies on College English Writing Teaching Based on Blog
Zefen Zhang
Different from traditional Internet communication manner, the Blog has its own advantages and features. It can increase communication between teachers and students, expand the field of study, the blog used in the teaching of English writing helps improve students English writing ability, students should...
Proceedings Article
Communication Signal Source Development in Contactless IC Card
Xinyu Liu, Mingquan Lin
Contactless IC card is a new technology in IC field. It is the combination of radio frequency identification and IC. Especially, in bank system, magnetic stripe cards will give place to IC smart card in the near future. Therefore, an increasing number of contactless IC cards will be required to test...
Proceedings Article
Comparison and Analysis of the Performance on Measurement Matrix to Spectrum Estimation
Keqing Wang, Yong-gang Zhu, Jian-zhong Chen, Ying-tao Niu
In the spectrum estimation algorithm based on Compressed Sensing, the selection of measurement matrix has significant influence on whether can estimate the signal power spectrum with high precision. In the article, it briefly describes the basic principles of spectrum estimation algorithm and the common...
Proceedings Article
Trust-Based Service Matching Access Control Model
Yongsheng Zhang, Yuanyuan Li, Mingfeng Wu
By the research of Web service architecture, the article puts forward a new trust-based access control model, which is based on service-oriented architecture (SOA) and combines with service matching. The model puts the trust as matching criterion. Transaction is divided into three grades according to...
Proceedings Article
Study on feature extraction method of Han Dynasty stone carving images
Juan Wang, Man Tang
Han Dynasty stone carving is Chinese nation's outstanding cultural heritage, how to protect and promote it is an historical responsibility. In recent years, there has been a lot of research on the Han Dynasty stone carving, and has achieved certain results. But the digital research on it is still very...
Proceedings Article
A Cooperative Spectrum Sensing Information Transmission Scheme Based on Cyclic Delay Diversity
Yanru Liu, Dechao Hu, Xiaohui Li
To improve the reliability of spectrum sensing, a cooperative spectrum sensing information transmission scheme is discussed in this paper. Pre-coding and cyclic delay diversity (CDD) techniques are fully considered and properly combined to obtain diversity gains. Simulation results show that the proposed...
Proceedings Article
Research on the Pairwise Test Case Generation of Two-Dimensional Expansion
Shuai Yuan, Gang Ye, Jingyan Cui, Shilong Ma
The recently widely-spreading usage of combinatorial interaction testing is dramatically improving the effectiveness of highly-configurable software. Conventional techniques based on greedy or heuristic algorithms can lead to suboptimal result in the size of the built test suite with unstability. In...
Proceedings Article
A Design of Remote Monitoring System based on 3G and Internet Technology
Shouxian Wen, Lei Xu, Xingguo Sun, Xiaohui Li
Aiming at the low-rate and short-distance communication in existing temperature and humidity monitoring system, this paper designs a remote monitoring system based on 3G and Internet technology. This system consists of data acquisition module and data remote transmission module. Atmega128 is used to...
Proceedings Article
Analysis of Channel Model for GEO Satellite Mobile Communication System
Lu Lu, Daoxing Guo, Aijun Liu, Maoqiang Yang
In GEO satellite mobile communication system, a line-of-sight (LOS) component exists as well as multipath component, which are influenced by buildings or foliage that causing shadowing effect. Satellite mobile channel is described as fading model based on Markov process for channel properties in large...
Proceedings Article
The research on personalized service of digital library based on data mining
Nan Pang, Feng Yan
In recent years, with the deepening of information technology, people facing increasing amounts of information resources. At the same time, people's demand of information is more and more. For digital library, with a wealth of information resources, how to give readers a deeper level of personalized...
Proceedings Article
Research On the Legal Protection of the Network Virtual Propeity
Xuejng Ren
Along with the rapid development of the network games in China, the disputes around the virtual property occur frequently, but our country's existing law doesn't have clear rules to solve the problems. To speed up the related legal system construction in order to protect the healthy development of the...
Proceedings Article
Analysis on the Teaching Reform of Programming Courses of the Specialized Computer Science in Agriculture and Forestry Universities
Ying Zhang, Yingze Ye
At present, there are many problems in the core programming curriculums of the specialized computer science such as low coordination with other courses, insufficient fusion and poor integration with the overall development of special discipline. The present study is mainly focused on programming curriculums...
Proceedings Article
Miner Face Recognition Based on Improved Singular Value Decomposition
Chao Jiang, Guyong Han, Lin Zhu, Jun Zhou, Weixing Huang
This paper depended on that video monitoring and video images in the coal mine were susceptible to dust, light and miner's safety helmet and other special environmental impact. In order to realize the real-time and accurate face recognition rate, and lay good foundation for miners behavior characteristics...
Proceedings Article
The Development and Application of High Compression Ratio Methanol Engine ECU
Bin Hong, Yang Wang, MingZhi Song, Feiyu Song, Yajun He, Xiaolong Li
A total design scheme for the high compression ratio methanol engine electronic control unit (ECU) was developed. Chosen the ARM Cortex-M3 based microcontrollers LPC1766 as the main controller of electronic control system, then the signal processing circuit module, main controller system circuit module,...
Proceedings Article
The Research of Semantic Retrieval Model Based on Idiom Literary Quotation Ontology
Jie Ran, Li-juan Qi
Aiming at the problem that users often can not retrieve useful information or retrieved information is inaccurate, in this paper we put forward an information retrieval model based on Idiom Literary quotation Ontology. The model and its characteristics were analyzed in detail. Through a systematic in-depth...
Proceedings Article
A Novel Grouping Aggregation Algorithm for Online Analytical Processing
Wei Chen, Yongshan Liu, Ning Wang
As regard to improve the efficiency of grouping aggregation calculation, the data is compressed by using binary encoding, and the dimension hierarchical grouping attribute set encodings of each dimension table are calculated by using the dimension hierarchy tree. Then different encodings are put into...
Proceedings Article
Design and Implementation of A Bicycle Parking System Based on Internet-of-things
Yujia Huang, Zhongliang Yang, Shuhua Xiong
How to manage increasing bicycles in a university campus is a challenging problem. To solve the problem, we design and implement an intelligent bicycle parking system based on the Internet of things. The system architecture is described, and the system modules are introduced. Moreover, we present the...
Proceedings Article
Effecitive Extrange Rate and International Trade
Shen Li, Liping Xu
In 2005 China began to implement a managed floating exchange rate system on the basis of market supply and demand with reference to a basket of currencies. since 2010, the RMB exchange rate began to appreciate sharply, till now, the pressure of RMB appreciation is still huge, and has great impact on...
Proceedings Article
A Satellite Heterogeneous Network Selection Algorithm Combining AHP and TOPSIS
Long Yang, Daoxing Guo
Against the satellite heterogeneous network optimal selection problem, in this paper we propose a network selection algorithm based on the Analytic Hierarchy Process (AHP) method and the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) method. The algorithm considers the parameters...
Proceedings Article
A Variable Step Size RPE Algorithm for Echo Cancelation
Hongxing Yuan, Renxiang Zhu, Shaoqun Wu, Li Guo
Acoustic echo cancellation (AEC) algorithms are widely used in communication devices. One of the main design problems is double-talk issue. The recursive prediction error (RPE) algorithm based on autoregressive (AR) model has been proven to be more attractive to traditional approaches. However, it adapts...
Proceedings Article
The Semi-join Query Optimization In Distributed Database System
Lin Zhou, Yan Chen, Taoying Li, Yingying Yu
In distributed database system, the distributed deposition and redundancy data brought convenient to fault recovery, but they make distributed query processing more complicated at the same time. Query optimization and processing is one of the key technologies in distributed database system. It generally...
Proceedings Article
FPGA Design of Switch Module with Multicast Function on the Satellite Onboard Switch
Zemin Shen, Lufeng Qiao, Menglei Wang
This paper implements a shared memory switching structure with multicast function due to the demand of multicast function on the satellite onboard switch, introduced each module of the ideas and working process in detail. Key modules are programmed and realized with Verilog HDL. The results of ModelSim...
Proceedings Article
A Graph-Based Text Similarity Algorithm
Zuoguo Liu, Xiaorong Chen
This paper is trying to research a text similarity algorithm which based on graph theory. A text is mapped into a graph which consists of terms as its nodes and term sequences as its undirected edges. The Maximum Common Subgraph (MCS) of two graphs is useful for analyzing their similarity and the similarity...
Proceedings Article
An Improved MELP Algorithm for Transition Frames
Tian Qiu, Feifei Wang, Weitao Du
The MELP vocoder has a good performance at 2.4 kb/s and is selected as the Federal Standard Vocoder of the United States. However, due to the simple U/V decision of MELP, desired synthesis performance is not achieved in transition frames. This paper presents an improved MELP algorithm in which transition...
Proceedings Article
Indexing Coded Stripe Patterns Based on De Bruijn in Color Structured Light System
Cheng Han, Zhengang Jiang
The problem of relating projected and captured stripes, here called the Indexing Problem, has proved to be difficult to overcome reliably for stripe patterns in color structured light, due to color fidelity of the projector and the camera, the ambient light, texture of measured object and other factors....
Proceedings Article
A Detection Method of Network Intrusion Based on SVM and Ant Colony Algorithm
Jianfeng Pu, Lizhi Xiao, Yanzhi Li, Xingwen Dong
This paper researches the intrusion detection problem of the network defense, pointing at the problem of low fitting defects in the traditional detection algorithm of high precision and low forecasting accuracy under the situation of small sample training, and puts forward the algorithm of Support Vector...
Proceedings Article
Medical Equipment Manufacturing Enterprise Informatization Management System Review
Yingge Lou, Shuo Yang
This paper is based on the analysis of the unified standards, the main construction contents, the model and steps that an informatization system should take during its construction and implementation, which medical equipment manufacturing enterprises face in the process of informatization. In this paper,...
Proceedings Article
Studies on Multimedia English Teaching from Students Angle of View
Zefen Zhang
This paper is based on the investigation and interview methods to probe on multimedia English teaching from the students angle of view and cognitive psychology. The author achieves results after conducting a preliminary comparison into the relationships between traditional English teaching and multimedia...
Proceedings Article
Marker Technique and Its Application in the Source Address Recognition Research
Zhiyu Zhu, Huiliang Duan
SPi is an end system of validation technique, in which routers mark packets, and end system performs filtering. we construct the simulation with various network topologies to verify the effectiveness and the filtering accuracy of the SVA architecture. The simulation results show that, SVA can respond...
Proceedings Article
Research on Life Prediction Method for Gyroscope Based on PACE
Haodong Ma, Rui Li, Kai Luo, Hongzheng Fang
Gyroscopes are widely applied in weapon system and other high precision system. During the using course, the reliability and performance of gyroscope are influenced by environment and using condition. The performance of gyroscope degenerates periodically, and the remaining useful life (RUL) is payed...
Proceedings Article
The Study of the Spacecraft Telemetry Data Credibility Calculation Method based on the Probability Statistics and Fuzzy Algorithm
Hongzheng Fang, Haodong Ma, Liming Han, Kai Luo, Rui Li
The credibility of the spacecraft telemetry data can be used to characterize the confidence degree of telemetry data and improve the accuracy of the spacecraft condition monitoring and diagnosis system. This paper proposed the telemetry data credibility calculation methods based on the probability statistics...
Proceedings Article
A Clustering Algorithm towards Microblogs based on Vector Space Model
Guoyou Chen, Jiajia Miao, Handong Mao, Le Wang, Siyu Jiang
Weibos have become wildly popular in China in recent years, and state media reports that there are more than 300 million registered users. The Real Name Policy[1] requires all users on Chinese weibo websites to register with the name that corresponds with their government issued ID card. With the rapid...
Proceedings Article
A Private Cloud Document Management System with Document Clustering Algorithm
Jiajia Miao, Zhongjun Fan, Guoyou Chen, Handong Mao, Le Wang
Recently, more and more enterprises use virtualization technology and cloud computing technology to improve the level of information management. Private cloud document management system from the lab to practical application. We launched a private cloud file management system is characterized by the automatic...
Proceedings Article
A Public Opinions Monitoring System based on Similarity of Microblogs
Jiajia Miao, Xuelin Fang, Guoyou Chen, Handong Mao, Le Wang
Public opinion is the development and changes in certain social space around the intermediary social events, public social managers and held social and political attitudes. In order to improve the efficiency of text clustering, this paper proposes a new similarity measure model OFM. In the first stage,...
Proceedings Article
Numerical Simulation of Muti-jet ejector
Lin Jiang, Song-ping WU
The influence of nozzle location on the efficiency of ejector was discussed according to lots of calculated results. Changing nozzle location will have influence on the efficiency of ejector without modifying ejector structure
Proceedings Article
A process-oriented evaluation framework for cyber-attacker's capability
Baofeng Luo, Junhu Zhu
Accurately and reasonably evaluating cyber-attacker's capability can help to scientifically forecast following attacks in order to give tailor-made defense tactics. At present, the evaluation measures of cyber-attacker's capability are primarily based on attack effect and the related achievements are...
Proceedings Article
A Cellular Automata Model of Pine Wilt Disease Spread and Its Simulation Tool for Application
Mingxiang Huang, Chaohui Yu, Dali Zhou, Fang Bei
In the study a cellular automata (CA) was applied to model the spread process of pine wilt disease (PWD), and a PWDCASim tool was developed to simulate PWD spread based on the CA model using VC++6.0 platform. For the further understanding of PWD spread with the CA model, a case study was implemented...
Proceedings Article
Application Study of Information Visualization in Digital Library
Zhijiang Liao, Min Gao, Feng Yan
Information visualization in digital library can solve some problems faced during its development. In formation visualization consists of four parts: determine the object, visualization mapping, space structure and graphics rendering. This article introduces application of information visualization in...
Proceedings Article
Analysis on Event Delay in Event-Driven Wireless Sensor Networks
Rong Zhou, Luqun Li, Jun Zhang
In this paper, we consider an event-driven wireless sensor network (WSN) scenario, in which the events arrive with a certain probability in a time of interval. Firstly, we analyze the event delay in a single node in an M/G/1 vacation queueing model. Then, considering the limited buffer space, channel...
Proceedings Article
Recognition of Cyclostationary Signals Smoothed
Gaohui Liu, Zhiping Zhang, Yuan Yang
In the identification process of modulated signal based cyclic spectrum, it is chief to be synchronized for the received signal. The article focuses on the reception signal which is not synchronized. When uniform distribution variable delay exists, it will not have cyclostationary, namely it is converted...
Proceedings Article
A Video Service Cloud Platform with Multi-Network Convergence Application
Hong Liu, MinLu Dai, Gang Li, FangChun Yang
With network technology advances, how to take advantages of different networks to provide users with creative and convergence service experience is of great strategic significance to tri-play service providers. A new video service cloud platform iVideo platform is proposed in this paper. The overall...
Proceedings Article
A New Method of Predicting the SOC of Lithium-ion Batteries
Liangcheng Fu, Yutian Feng, Chunming Chen
The most important parameters of the battery management system are the state of charge(SOC) and state of health(SOH). The traditional method of estimating the SOC and SOH is to take measurement of the discharge current and the open circuit voltage. This paper proposed a new method of predicting the SOC...
Proceedings Article
3D Dynamic Target Simulation Experiments Based On the OpenGL
Su-Yue Zhang, Yong Zhu, Jin Duan, Tian-Tian Ma
The simulation technology saves the cost of test, improves efficiency and in favor of the image acquisition. This article based on the OpenGL simulates the real-time dynamic 3D target, the physical characteristics of the target and the notion characteristics in the real world. The target images collected...
Proceedings Article
Empirical Study of High-tech Industry Cluster in Shaanxi Province
Wenyuan Wang, Jin Yang
The development of the high-tech industry, is an important foundation for the country to enhance industrial competitiveness, and is also one of the important manifestation of a country's composite national power. In order to research mechanisms, which promoted high-tech industrial cluster, this paper...
Proceedings Article
Shadow Suppression Based on Adaptive Gaussian Mixture Model
Yun Liu, Wen Zhao
According to the HSV color space characteristics , changes the modeling space in the process of Gaussian mixture model, based on the setting of each component, deals with shadow casted by using the Gaussian mixture model algorithm detecting the moving objects. Morphological operators are used to compensate...
Proceedings Article
The Algorithm of Gravity Master Sensor Game Based on the Android Platform
Ahui Yang, Yunming Pu
The ball game is designed with 3D physical sensor technology based on the Android platform. There are three modules in the game, the presentation layer module, the background logic module and mobile phone posture calculation module, and the classes in the module are introduced, the algorithm of gravity...
Proceedings Article
Pivot Selection Methods Based on Covariance and Correlation for Metric-space Indexing
Kewei Ma, Yuanjun Liu, Honglong Xu, Pang Yue, Fuli Lei, Sheng Liu, Rui Mao, Jiaxin Han
Metric-space indexing is a general method for similarity queries of complex data. The quality of the index tree is a critical factor of the query performance. Bulkloading a metricspace indexing tree can be represented by two recursive steps, pivot selection and data partition, while pivot selection dominants...
Proceedings Article
Automatic Face Segmentation Based on the Level Set Method
Chaoyi Zhang, Yanning Zhang, Zenggang Lin
Face segmentation is a crucial problem in face recognition and other areas like pedestrian detection. Level set methods have been widely used in image segmentation. In this paper, the modified level set evolution equation is used in the level set method to segment the face. Based on the signed pressure...
Proceedings Article
Research on the Anonymity Method Based-on kanonymity for Electronic Commerce
Gaizhen Yi, Zhenglong Xie
According to the model of K-anonymity, the attributes of information tables in Electronic Commerce have been divided into three parts: identifier, Quasi Identifier, sensitive information. To conceal privacy information for consumer, the paper adopted a recode method to protect the name and cell-phone...
Proceedings Article
Rating the Raters A new statistical method for evaluating
Yong Li
In this paper, with the actual data of a lecture contest'prevailing method's defects to remove a maximum score and a minimum score, average of the rest to determine the ranking of the contestants are found. Comparison of three methods of evaluation that prevailing method, calculating raters weight once...
Proceedings Article
Design and Implementation of Positioning and Navigation System Based on Android
YuanYuan Yuan, LiJun Zhang
With the development of mobile Internet, more and more people begin to get convenient service by mobile phones. Obtaining one's current location by GPS positioning or network positioning has become one of the important foundations in most applications of location based service. In this paper, we designed...
Proceedings Article
A new DFT based channel estimation method for OFDM systems over multipath channels
Jing Wang, Yuehong Qiu
Channel estimation is one of the most significant technologies in the orthogonal frequency division multiplexing (OFDM) system and its accuracy will influence the performance of the whole system directly. Among all kinds of channel estimation algorithms, the least square'LS'estimation and the linear...
Proceedings Article
Research on Online Education Teacher Evaluation Model based on Opinion Mining
Caiqiang Li, Junming Ma
This paper analyzes the current common teacher evaluation methods, and points out the shortcoming of current methods of using the rubrics: they rely on the fixed rubric rules, and take less into account students opinion text published in the LMS (learning management system). The paper provides an online...
Proceedings Article
The computer-aided design of the multiplexer
Meng Pan, HongJuan Tang
The difficult of multiplexer design is to eliminate residual susceptance. In order to eliminate residual susceptance obtaining impedance matching ,this paper designs the computeraided design software of star-point diplexer, star-point triplexer and constant impedance diplexer based on the Matlab development...
Proceedings Article
LLE Based Pivot Selection for Similarity Search of Biological Data
Kewei Ma, Honglong Xu, Pang Yue, Fuli Lei, Sheng Liu, Ru Mao, Jiaxin Han
Distance-based indexing is a widely used technique for general purpose search. Pivot selection is the most crucial step of bulkloading a metric-space indexing tree. Current pivot selection methods are mainly based on linear methods. A non-linear method based on Locally Linear Embedding is proposed. Empirical...
Proceedings Article
Protocol of Steganography in Streaming Media on VOIP Network Based on Variable Length Coding
Zhen Yang, Huaizhou Tao, Yongfeng Huang, Wanxia Yang
Based on the three-layer model theory for steganography communication system, this paper designs a new steganography transmission protocol, to achieve a more effective frame structure, more reliable transmitting mechanism. Both text message dialogue and file transmission communication based on the proposed...
Proceedings Article
On the Combination Between Information Technology and t Sports Industry
Lan-hui Wu
In the network information technology as the role of the media, sports fitness and entertainment industry in social demand will be greater, have a more broad market prospects, at the same time it has the organic composition of capital is low, less investment, quick returns characteristics, is more industry...
Proceedings Article
SWOT Analysis of Forest Carbon-Sink Market Transaction in China
Ying Yang, Li Jia
Recently, abnormal changes of global climate, represented by earth warming, has become a common threat and challenge faced by the world, and has directly affectted the existence of the human society and its sustainable development. Kyoto Protocol allowed developed countries to provide developing countries...
Proceedings Article
Alarm Correlation Analysis in SDH Network Failure
Zhen-dong Zhao, Nan Huang, Zi-han Li
According to the characteristics of alarm data and the alarm spread in SDH system, and the existence of various shortcomings of the classical algorithm, this paper presents the FP-Growth of non-temporal association rule mining algorithm. We join the relationship between network topology as a constraint...
Proceedings Article
Research of Load Testing and Result Application Based on LoadRunner
Hui-li Zhang, Shu Zhang, Xiao-jie Li, Pei Zhang, Shao-bo Liu
In this paper, we made the plan of a load testing, and got results by means of the LoadRunner which is an automatic testing tool. We fully considered the characteristics of the electronic commerce application, designed the reasonable test cases, and simulated the practical scenario. In the process of...