Volume 12 Issue 2 April 2014


Research on the Application of SIFT Algorithm in UAV Remote Sensing Image Feature Extraction

Debao Yuan, Ximin Cui, Wangyang Xu, Xueqian, Hong, Shiwei YU

https://doi.org/

Abstract UAV remote sensing is characterized by fast speed and flexibility and applied widely. The extraction and matching for feature point of UAV image is a foundational work in the application of UAV remote sensing. SIFT is a currently widely used feature point extraction algorithm that keeps invariant as the scale changes. It is also invariant as image changes in other... Read More


Soft-404 Pages, A Crawling Problem

Víctor M. Prieto, Manuel Álvarez, Fidel Cacheda

https://doi.org/

Abstract During its traversal of the Web, crawler systems have to deal with multiple challenges. Some of them are related with detecting garbage content to avoid wasting resources processing it. Soft-404 pages are a type of garbage content generated when some web servers do not use the appropriate HTTP response code for death links making them to be incorrectly identified. Our... Read More


Acupuncture System Based on Computer Techniques and Database Diagnosis

Sheng-li Pei

https://doi.org/

Abstract The paper introduces the EA (electric acupuncture) treatment system based on expert database diagnosis technique. The system is a expert database of automatic reasoning diagnosis by the combining the maximum likelihood method and relation database. It integrates symbolic measurement theory, computer technology and electronic technology, which develops EA needling method by imitating classical acupuncture techniques. The system effectively achieves the... Read More


A SEIR Model Epidemic of Virus on the Online Social Network

Yang Min, Li Qianmu, Song Yaoliang

https://doi.org/

Abstract Vigorous development of computer technology has made computers play an integral role in people's lives, but at the same time propagation of the virus on a computer network also cost a great loss to the people. So the research on the mechanism of computer virus propagation and pointing out the key factors in the propagation of the virus has a... Read More


Evaluation Model for Internet Cloud Data Structure Audit System

Wang Fan

https://doi.org/

Abstract As economic globalization and information industry develop at top speed, Internet has penetrated into all walks of life rapid, with an immeasurable impact on all aspects of people's life. Computer technology is an integral part in the evaluation of audit system, technically prepared for application of cloud data structure in the evaluation of audit system. Based on the concept of... Read More


Research on Ontology Construction and Information Extraction Technology Based on WordNet

Hu Hua

https://doi.org/

Abstract Introducing ontology in the field of information extraction can effectively improve the performance of information extraction. Ontology of college teachers resumes are constructed in the form three layers of ontology framework structure on the basis of exploring the related technologies and criterion for building ontology, the Racer inference engine is used for realizing the consistency and accuracy detection. WordNet similarity... Read More


Research on Analysis of Factors Influencing Terrestrial Transmission Efficiency of Satellite Data Files

Zhang Jing

https://doi.org/

Abstract The paper firstly proposes two factors influencing transmission rate of satellite data file, the number of files and threads. The paper uses the control variate method to design the test scheme of the transmitting satellite data file, and changes the values of variables for lots of repeated tests to achieve the mean transmission time. And the paper compared the file... Read More


CAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture

Yuan-ni Liu Hong Tang, Guo-feng Zhao

https://doi.org/

Abstract In the social network, people with same interest construct a group, where people can share their interesting contents. With the popularity of the mobile devices, mobile users can connect to the internet for services such as downloading videos, music and pictures anywhere at any time, which may cause heavy traffic burden on the core network. The service content (eg. video,... Read More


Analysis of Information Management and Scheduling Technology in Hadoop

Ma Weihua, Zhang Hong, Li Qianmu, Xia Bin

https://doi.org/

Abstract Development of big data computing has brought many changes to society and social life is constantly digitized. How to handle vast amounts of data" has become a more and more fashionable topic. Hadoop is a distributed computing software framework, which includes HDFS and MapReduce distributed computing method, make distributed processing huge amounts of data possible. Then job scheduler determines the... Read More


An Indirect Security Trust Method Based on Credibility Evaluation

Wei Xianghe, Zhang Hong, Liu Zhen, Li Qianmu, Xia Bin

https://doi.org/

Abstract In existing trust models, the recommending services often provide a single trust value (computed by them during their interaction with the unknown entity in question) as a recommendation. However, a single trust value recommended by a recommender represents its subjective opinion about the unknown entity and cannot depict the real trust level very well under certain circumstances. To solve this... Read More