Traffic monitoring is of major importance for enforcing traffic management policies.To accomplish this task,the detection of vehicle can be achieved by exploiting image analysis techniques.In this paper,a solution is ...Traffic monitoring is of major importance for enforcing traffic management policies.To accomplish this task,the detection of vehicle can be achieved by exploiting image analysis techniques.In this paper,a solution is presented to obtain various traffic parameters through vehicular video detection system(VVDS).VVDS exploits the algorithm based on virtual loops to detect moving vehicle in real time.This algorithm uses the background differencing method,and vehicles can be detected through luminance difference of pixels between background image and current image.Furthermore a novel technology named as spatio-temporal image sequences analysis is applied to background differencing to improve detection accuracy.Then a hardware implementation of a digital signal processing (DSP) based board is described in detail and the board can simultaneously process four-channel video from different cameras. The benefit of usage of DSP is that images of a roadway can be processed at frame rate due to DSP′s high performance.In the end,VVDS is tested on real-world scenes and experiment results show that the system is both fast and robust to the surveillance of transportation.展开更多
Cloud computing is becoming an important solution for providing scalable computing resources via Internet. Because there are tens of thousands of nodes in data center, the probability of server failures is nontrivial....Cloud computing is becoming an important solution for providing scalable computing resources via Internet. Because there are tens of thousands of nodes in data center, the probability of server failures is nontrivial. Therefore, it is a critical challenge to guarantee the service reliability. Fault-tolerance strategies, such as checkpoint, are commonly employed. Because of the failure of the edge switches, the checkpoint image may become inaccessible. Therefore, current checkpoint-based fault tolerance method cannot achieve the best effect. In this paper, we propose an optimal checkpoint method with edge switch failure-aware. The edge switch failure-aware checkpoint method includes two algorithms. The first algorithm employs the data center topology and communication characteristic for checkpoint image storage server selection. The second algorithm employs the checkpoint image storage characteristic as well as the data center topology to select the recovery server. Simulation experiments are performed to demonstrate the effectiveness of the proposed method.展开更多
The paper puts forward a kind of online shopping system based on ASP. NET technology, including the establishment of data- base anti the design of the front web pages. The system uses Microsoft ASP. NEF as development...The paper puts forward a kind of online shopping system based on ASP. NET technology, including the establishment of data- base anti the design of the front web pages. The system uses Microsoft ASP. NEF as development platform, C as the server language, and Microsoft Visual Studio 2008 as the development tool. ADO. NET is used to connect with SQL SERVER 2000 database through the data- base controls. A variety of server controls are used to create the ASP. NET page to implonent the syste^n functions. The syston is designed in 3-Layer application which includes Presentation Layer (PL), Busi- ness Logic Layer (BLL) and Data Access Layer (DAL). The operation of the database is in DAL, the logic fimction is in BLL. So the amotunt of work in the development, the difficulty of system maintenance and the upgrading can be reduced. After being tested, the system meets the requirement of the users.展开更多
This article mainly introduces the multi-layer distributed C/S architecture of system design scheme. Its working principle is the client program runs automatically after the computer starts, and establish communicatio...This article mainly introduces the multi-layer distributed C/S architecture of system design scheme. Its working principle is the client program runs automatically after the computer starts, and establish communication with the application server. The network administrator can monitor and intelligent management of the client computer through the server program, the computer will execute the corresponding operation according to the server to send command instructions. The system realize the main module of the whole system framework, network monitoring data initialization module, network data transmission module, image coding and decoding module, the advantages of system make full use of existing LAN resources, timely delivery and manaRement information.展开更多
The paper analyze and design and implement a remote control system based on embedded web server network. A computer network remote control system mainly includes server, client and the control information. Server regi...The paper analyze and design and implement a remote control system based on embedded web server network. A computer network remote control system mainly includes server, client and the control information. Server registration information realize the user command; client provides network hardware, software and other system resources, the system response message and then feedback service instruction. The research results show that, the embedded web server can be assigned to the field device user information through the browser, field device data also can access to the browser through the web server. In order to achieve remote monitoring, control, diagnostics and configuration of the equipment.展开更多
Introduced a Web-based real-time network monitoring and control system design methods, the 3-D VR was applied in a remote monitor system based on browser/server structure, and a VRML and Java based 3-D remote monitor ...Introduced a Web-based real-time network monitoring and control system design methods, the 3-D VR was applied in a remote monitor system based on browser/server structure, and a VRML and Java based 3-D remote monitor system was realized. Meanwhile, give possible solutions of the real-time data transmission and the stability of the system.展开更多
文摘Traffic monitoring is of major importance for enforcing traffic management policies.To accomplish this task,the detection of vehicle can be achieved by exploiting image analysis techniques.In this paper,a solution is presented to obtain various traffic parameters through vehicular video detection system(VVDS).VVDS exploits the algorithm based on virtual loops to detect moving vehicle in real time.This algorithm uses the background differencing method,and vehicles can be detected through luminance difference of pixels between background image and current image.Furthermore a novel technology named as spatio-temporal image sequences analysis is applied to background differencing to improve detection accuracy.Then a hardware implementation of a digital signal processing (DSP) based board is described in detail and the board can simultaneously process four-channel video from different cameras. The benefit of usage of DSP is that images of a roadway can be processed at frame rate due to DSP′s high performance.In the end,VVDS is tested on real-world scenes and experiment results show that the system is both fast and robust to the surveillance of transportation.
基金supported by Beijing Natural Science Foundation (4174100)NSFC(61602054)the Fundamental Research Funds for the Central Universities
文摘Cloud computing is becoming an important solution for providing scalable computing resources via Internet. Because there are tens of thousands of nodes in data center, the probability of server failures is nontrivial. Therefore, it is a critical challenge to guarantee the service reliability. Fault-tolerance strategies, such as checkpoint, are commonly employed. Because of the failure of the edge switches, the checkpoint image may become inaccessible. Therefore, current checkpoint-based fault tolerance method cannot achieve the best effect. In this paper, we propose an optimal checkpoint method with edge switch failure-aware. The edge switch failure-aware checkpoint method includes two algorithms. The first algorithm employs the data center topology and communication characteristic for checkpoint image storage server selection. The second algorithm employs the checkpoint image storage characteristic as well as the data center topology to select the recovery server. Simulation experiments are performed to demonstrate the effectiveness of the proposed method.
文摘The paper puts forward a kind of online shopping system based on ASP. NET technology, including the establishment of data- base anti the design of the front web pages. The system uses Microsoft ASP. NEF as development platform, C as the server language, and Microsoft Visual Studio 2008 as the development tool. ADO. NET is used to connect with SQL SERVER 2000 database through the data- base controls. A variety of server controls are used to create the ASP. NET page to implonent the syste^n functions. The syston is designed in 3-Layer application which includes Presentation Layer (PL), Busi- ness Logic Layer (BLL) and Data Access Layer (DAL). The operation of the database is in DAL, the logic fimction is in BLL. So the amotunt of work in the development, the difficulty of system maintenance and the upgrading can be reduced. After being tested, the system meets the requirement of the users.
文摘This article mainly introduces the multi-layer distributed C/S architecture of system design scheme. Its working principle is the client program runs automatically after the computer starts, and establish communication with the application server. The network administrator can monitor and intelligent management of the client computer through the server program, the computer will execute the corresponding operation according to the server to send command instructions. The system realize the main module of the whole system framework, network monitoring data initialization module, network data transmission module, image coding and decoding module, the advantages of system make full use of existing LAN resources, timely delivery and manaRement information.
文摘The paper analyze and design and implement a remote control system based on embedded web server network. A computer network remote control system mainly includes server, client and the control information. Server registration information realize the user command; client provides network hardware, software and other system resources, the system response message and then feedback service instruction. The research results show that, the embedded web server can be assigned to the field device user information through the browser, field device data also can access to the browser through the web server. In order to achieve remote monitoring, control, diagnostics and configuration of the equipment.
文摘Introduced a Web-based real-time network monitoring and control system design methods, the 3-D VR was applied in a remote monitor system based on browser/server structure, and a VRML and Java based 3-D remote monitor system was realized. Meanwhile, give possible solutions of the real-time data transmission and the stability of the system.