Loading...

Table of Content

    22 December 2012, Volume 208 Issue 12
    算法分析与设计
    Application of Shortest Path Algorithm in Automatic Evaluation System
    CHEN Xuan-hua;YANG Ling;LI Xue-ya
    2012, 208(12):  1-3,7.  doi:10.3969/j.issn.1006-2475.2012.12.001
    Asbtract ( 522 )  
    Related Articles | Metrics
    In automatic evaluation there are several possible operation sequences from start to finish of the examinee operation. Extracting the minimal operation sequence as the correct answer is one of the key problems in the automatic evaluation system. Dijkstra algorithm is a classic algorithm for calculating the shortest path. This paper gives the solution of the minimal operation sequence based on the analysis of Dijkstra algorithm, and illustrates by an example. The solution is the foundation to judge correct operation of the examinee, and is been proved in the automatic evaluation system of MAP210 navigators.

    算法设计与分析
    Improved DV-Hop Algorithm Based on Hop Estimation
    HUANG De-kai;YOU Tian-tong
    2012, 208(12):  4-7.  doi:10.3969/j.issn.1006-2475.2012.12.002
    Asbtract ( 418 )  
    Related Articles | Metrics
    The estimation of average hop distance plays a dramatic important role in the DV-Hop localization algorithm and has great influence in the accuracy. In order to reduce the estimation error, taking into consideration global and local network circumstance, the hop estimation between unknown nodes and anchor is improved. Simulation results show that the proposed algorithm is effective in improving the accuracy of localization.
    Fetal Heart Rate Signal Denoise Algorithm Based on Wavelet Thresholdand Adaptive Spectral Line Enhancement
    DONG Ming-ming;WANG Jian-gang
    2012, 208(12):  8-10,1.  doi:10.3969/j.issn.1006-2475.2012.12.003
    Asbtract ( 479 )  
    Related Articles | Metrics
    The fetal heart rate is an important physiological index on clinical fetal monitoring, however, in the signal extraction process, the fetal heart rate accuracy is under a bad influence, because of its complex of the original signal component and the serious noise. In order to extract the fetal heart rate exactly, this paper proposes a new denoising algorithm based on the wavelet threshold and the adaptive line enhancement algorithm. Experimental results show that the new algorithm can reduce the calculations and noises, and the fetal heart rate value calculations are more accurate.
    Mission Planning Method of Satellite Ground Station Based on Ant Colony Algorithm
    ]JIN Yun-zhong;GAO Yang
    2012, 208(12):  11-15.  doi:10.3969/j.issn.1006-2475.2012.12.004
    Asbtract ( 538 )  
    Related Articles | Metrics
    There are an amount of visible windows between the satellite and the satellite group station. Only within the visible windows, the satellite group station can directly observe and operate the satellite. Therefore, it’s an important issue that how to schedule the resources of group station reasonably to get the maximum usable time of visible windows. In this issue, the visible windows between the satellite and the satellite group station are defined as task set. The ant colony algorithm is applied to construct effective task scheduling sequence, to get the maximum execution time of tasks which means the maximum usable time of the visible windows. The experimental data show that with the ant colony algorithm can get excellent scheduling results, while these scheduling results are also better than the FCFS’s and the greedy algorithm. It can be seen, the algorithm can effectively solve the mission planning of satellite ground stations.
    Real-time Scheduling Algorithm of Multiple Parameters Synthesis
    REN Hai-ming;ZHU Jiang
    2012, 208(12):  16-18.  doi:10.3969/j.issn.1006-2475.2012.12.005
    Asbtract ( 455 )  
    Related Articles | Metrics
    With the development of science and technology, the process of informationization is speeding up, and the real-time system is more and more used in production, management and other related fields. With a wide range of applications, the problem appears. Some classic algorithms using only a single key parameters as the scheduling basis, no longer adapt to current needs. For this problem, this paper proposes a multi-parameter real-time scheduling algorithm, and proves the algorithm is of better scheduling performance.
    Adaptive Niche Genetic Algorithm for Intelligent Test Generation
    ZHANG Xu-tao;ZHANG Yong;HUANG Hong-ping
    2012, 208(12):  19-22.  doi:10.3969/j.issn.1006-2475.2012.12.006
    Asbtract ( 540 )  
    Related Articles | Metrics
    The traditional genetic algorithm’s strategy of choice lacks of diversity protection mechanism, it easily appears premature convergence. To solve the problem of intelligent test generation, this paper adopts niche technology to complete the genetic operation of population’s evolution mechanism, setting the adaptive mutation operator to ensure the diversity of the population and prevent population from the local convergence by the size of the individual concentration; adding the threshold is to ensure that when the algorithm is close to the optimal solution, the algorithm returns to the adaptive genetic algorithm in order to simplify the algorithm and accelerate the convergence speed. This paper proposes an adaptive and niche technology combined genetic algorithm, in a balance of the global searching algorithm and local rapid development ability. Finally, an example verifies the effectiveness of the proposed algorithm.
    Dynamic Path Planning of Blind-aid Robot Under Internet of Things Environment
    WANG Zhen;CHEN Yue-peng
    2012, 208(12):  23-28.  doi:10.3969/j.issn.1006-2475.2012.12.007
    Asbtract ( 507 )  
    Related Articles | Metrics
    In recent years, blinds and low vision patients are increasing, the research for blinds and low vision patients becomes increasingly common. The robot based on RFID is an embedded product, it’s in order to solve the blinds household scavenger inconvenience. The system references blinds living space, constructs virtual simulation maps, and updates the simulation maps when it monitoring the realistic environment, dynamic programming algorithm for path. It references Dijkstra and A Star routing algorithm, constructs grid method to realize local optimum path planning; References ant colony algorithm, constructs the path storage correction algorithm. And together with the loop correction algorithm(userdefined), revises and adds the grid algorithm, and then realizes the global optimal path gradually. It reduces the memory space and improves the efficiency of the search path. It also reduces the power consumption and practice for physically realizable. The robot can accurate and efficient for the blind planning the optimal forward path, and lead the blinds to scavenger terminal.
    Design of Optimized ADRC Gun Control System Based on Generic Algorithm
    XU Zhen-hui
    2012, 208(12):  29-32,3.  doi:10.3969/j.issn.1006-2475.2012.12.008
    Asbtract ( 479 )  
    Related Articles | Metrics
    Aiming at the problem of numbers of adjust parameters which is selected depend on experience in ADRC gun control system, a method about the optimized design of ADRC gun control system based on generic algorithm is proposed. The paper introduces the mathematical model of gun control system and the steps of optimizing design parameters in ADRC gun control system based on generic algorithm. At last, the simulation result indicates that the optimized ADRC gun control system shows well dynamic and steadystate performances, short adjusting time and nearly have no excess adjustment.
    计算机控制
    Automatic Concrete Batching Control System Based on MCGS and PLC
    WU Xue-quan;GAO Mei-feng
    2012, 208(12):  33-36.  doi:10.3969/j.issn.1006-2475.2012.12.009
    Asbtract ( 538 )  
    Related Articles | Metrics
    In order to improve concrete quality and yield, the concrete batching control system is achieved by using weighing instrument to collect material weight, PLC to realize control function, configuration software MCGS to complete the system realtime monitoring, data management and alarm function. The system hardware and software design is introduced, and the raw material feeding control and PLC control flow are explained especially.
    Realization of Special Print Control in Electronic Medical Record Based on .NET
    JIANG Yu-lei;CHEN Ya-dong
    2012, 208(12):  37-39,4.  doi:10.3969/j.issn.1006-2475.2012.12.010
    Asbtract ( 438 )  
    Related Articles | Metrics
    In order to solve continuous printing and printing across multiple pages in electronic medical record, a special print control method in electronic medical record based on .NET is proposed and implemented. An electronic medical record editor inherited from RichTextBox control and added print function for clinical work is acheived. Print position of current record is located by the last position data saved in a database. And the key problem of printing across multiple pages is realized by logic data paging and physical printing across pages. The result shows the method can satisfy the need of hospital clinical work.

    计算机仿真
    Simulation Analysis of Electromagnetic Safety of Single-drag VLFAirborne Antenna Without Installed State
    LI Xiang-ping;ZHU Yong-xin;ZHANG Dong-xing;LI Rui
    2012, 208(12):  40-43.  doi:10.3969/j.issn.1006-2475.2012.12.011
    Asbtract ( 420 )  
    Related Articles | Metrics
    This paper aims at the near-field radiation characteristics of airborne VLF drag antenna, analyzes the correctness of the model of VLF single-drag antenna by modeling and simulation without installed state.

    Application and Simulation of Matlab Neural Network Tool NNTool
    TANG Zhong;XIE Tao
    2012, 208(12):  44-47,5.  doi:10.3969/j.issn.1006-2475.2012.12.012
    Asbtract ( 812 )  
    Related Articles | Metrics
    This article introduces NNTool’s function of the neural network toolbox of Matlab, describes how to use NNTool to realise the design, train, analysis and simulate of neural network. On this basis, it takes the prediction of coal blending as an example, setting up a BP neural network to achieve the approximation and simulation of a non-linear function.
    Research and Implementation of Virtual Campus Roaming System Based on Virtools
    TUO Wei;LIU Jia-long;CHEN Chao-chao;JI Shun-ru
    2012, 208(12):  48-50,5.  doi:10.3969/j.issn.1006-2475.2012.12.013
    Asbtract ( 497 )  
    Related Articles | Metrics
    Based on the 3DS Max and Virtools development tools, this paper mainly studies the interactive function of virtual campus roaming system through the scene model creation and the use of virtual reality design method. According to virtual target geographical characteristic, the technique completes the data processing with interactive control, overcomes the shortcomings that the traditional VRML technologies on virtual target design cannot provide design target specific geographic information. Therefore, it is of the advantages of simply and easily realizing.

    Modeling and Simulation of Crosslayer Flow Control Mechanism for FCIP
    CAI Zhao-quan;ZHANG Zong-ping;LUO Wei;QIN Lei-hua
    2012, 208(12):  51-54.  doi:10.3969/j.issn.1006-2475.2012.12.014
    Asbtract ( 472 )  
    Related Articles | Metrics
    SAN based on fibre channel technology provides data access for storage application with great performance. For the purpose of study mixed flow control method between fibre channel protocol and TCP protocol, this paper builds up a crosslayer flow control simulating model of FCIP based on OPNET, and the paper also analyses the simulation results of FCIP protocol based on cross-layer.
    图像处理
    Application of Joint Relevance Feedback in Medical Image Retrieval
    JIANG Shao-feng;YANG Shu-qin
    2012, 208(12):  55-59.  doi:10.3969/j.issn.1006-2475.2012.12.015
    Asbtract ( 477 )  
    Related Articles | Metrics
    To promote the medical image retrieval performances based on content, this paper integrates image retrieval based on the fuzzy regional feature into the relevance feedback algorithm based on support vector machine, and proposes a new joint relevance feedback algorithm. This algorithm uses fuzzy regional feature based on the algorithm for regional feature, the global wavelet energy features use both of the relevant images and the irrelevant images based on relevance feedback algorithm of SVM. Experiment shows that the hybrid algorithm performs better.
    Survey of Face Detection and Tracking Technology
    ZHANG Ya-nan;ZHANG Zuo
    2012, 208(12):  60-65.  doi:
    Asbtract ( 498 )  
    Related Articles | Metrics
    Face detection and tracking are the research hotspots of computer vision, which is gradually investigated in this paper. To begin with, the difficulties of this issue are briefly introduced. In addition, the widespread use of face detecting and tracking in the fields of video monitoring, human-computer interaction and information security is demonstrated in detail. Finally, the research status of face detection is analyzed, upon which the long-term and realtime face tracking in random environments and the tracking framework of TLD(Tracking-Learning-Detection) are profoundly illustrated.
    Research on Pedestrian Edge Detection Application Based on Active Contour Models
    CHEN Kang;HUANG Ying-ping;ZHANG Ren-jie
    2012, 208(12):  66-68,7.  doi:10.3969/j.issn.1006-2475.2012.12.017
    Asbtract ( 489 )  
    Related Articles | Metrics
    This paper uses the active contour models to extract the outline of a pedestrian and obstacles in a road scene accurately, provides an effective means for potential obstacles classification which based on visual auxiliary driving system. First, the paper discusses the active contour models, then uses GVF-snake and level set model to make extraction experiment for pedestrian contour edge, and the experimental results are analyzed.
    网络与通信
    Design of Remote Intelligent Detecting Controlling System Based on PLC
    MENG Sha-sha;WANG Tao-tao
    2012, 208(12):  69-72.  doi:10.3969/j.issn.1006-2475.2012.12.018
    Asbtract ( 525 )  
    Related Articles | Metrics
    Using the controlling system S7-300 and monitoring software WinCC 6.0 of SIMATIC PCS7, this paper proposes to design an intelligent detecting system, which solves the existed problem because of using traditional method to detect electronic products parameter. It realizes automatic detecting and remote monitoring. Finally, taking a detection of UPS as an example, it realizes intelligent detecting, increases detection efficiency, and saves the human resource.
    Research on Enterprise Marketing Based on Microblog
    CHEN Jian-xin
    2012, 208(12):  73-76.  doi:10.3969/j.issn.1006-2475.2012.12.019
    Asbtract ( 450 )  
    Related Articles | Metrics
    This paper first introduces the meaning of microblog, and bases on microblog inherent characteristics and application function, combines with Sina microblog and microblog platform etc enterprise marketing case using microblog, analyses the microblog matrix marketing, micro-synchronization marketing, micro-brand marketing and micro-PR marketing four kinds of marketing model, and finally from the perspective of enterprise marketing personnel, it puts forward the microblog marketing problems requiring attention and suggestions.
    控制技术
    Research and Design of EPON Network Alarm Management System Based on SNMP
    LI Xin;CHEN Liang
    2012, 208(12):  77-79,8.  doi:10.3969/j.issn.1006-2475.2012.12.020
    Asbtract ( 510 )  
    Related Articles | Metrics
    This paper firstly introduces the SNMP network management model, then describes EPON technology. At last, discusses the steps of alarm management, and based on this, an alarm management system is designed. This alarm management system can quickly locate alarm, then submits for the alarm by the dialog box, and filters out alarm according to the requirement of the users, and finally administrator processes them.

    网络与通信
    A Layer-based Unequal Clustering Routing Protocol for Wireless Sensor Networks
    HONG Wei;HU Jian;GONG Dai-sheng;DAI Yu-wen
    2012, 208(12):  80-84.  doi:10.3969/j.issn.1006-2475.2012.12.021
    Asbtract ( 448 )  
    Related Articles | Metrics
    In order to mitigate the “hot spot” problem in wireless sensor networks, which is caused by the multi-hop transmission mode, this paper proposes a layer-based unequal clustering protocol. In this protocol, the network is partitioned into several layers based on the distance to the sink of each node. The election of cluster heads in each layer is accomplished by a weight-based distributed competition, which is taken into account the residual energy and position of the candidates. In addition, multi-hop routes are established for both intra-cluster and inter-cluster data transmission. Simulation results show that the proposed protocol is effective in balancing the energy consumption and prolonging the network lifetime.

    Research on Ajax Technology Application in Distance Education Platform
    XU Yao-li;KANG Mu-ning;QI Wan-hua
    2012, 208(12):  85-88,9.  doi:10.3969/j.issn.1006-2475.2012.12.022
    Asbtract ( 510 )  
    Related Articles | Metrics
    There is a full-page refresh problem on the distance education platform based on “click, wait” interactive mode. Ajax principle and some typical Ajax frameworks are studied. Ajax is applied in the examination module, inputting questions module, visitors book module of the distance education platform to avoid information without change being send from the server to the client through the Internet. It makes the application more rapid response to user action. Performance tests show that: Ajax technology really improves the response speed of the system.

    Design and Implementation of Chain Operation Network LayoutManagement System Based on WebGIS
    YUAN Jian-feng
    2012, 208(12):  89-92.  doi:10.3969/j.issn.1006-2475.2012.12.023
    Asbtract ( 479 )  
    Related Articles | Metrics
    Finding the location of the best stores, retail store is the first element of a chain, joined business to achieve success, it will be capable of development the greatest potential of using the investors’, manpower, financial resources and material, therefore the network layout and location become the one of the important elements in field of management strategy. However the establishment of Web model of electronic map is subject to the commercial software, and the price is too high. Based on the WebGIS technology principle, this paper using the mainstream Struts2 framework in Java camp, and combines with GeoServer, OpenLayers and other open source technology architecture model, realizes the chain store distribution information management system.
    Design and Implementation of Regional Government Information Exchange System Based on SOA Framework
    LUO Tie-jun
    2012, 208(12):  93-95.  doi:10.3969/j.issn.1006-2475.2012.12.024
    Asbtract ( 468 )  
    Related Articles | Metrics
    This paper uses the front-end SOA architecture design, achieves a data sharing system with a variety of data exchange, support multiple switching protocol, flexible business rules defined, based on the XML message standards, comprehensive transaction monitoring and statistics, a visual user interface features such as customized data sharing and exchanging system, finally realizes the information of loose coupling butt joint.

    Design of Temperature Monitoring Module of Energy Self-sufficiency
    WANG Xiu-yong;SUN Qiang;YANG Zhao;LIU Hui-cui;LIU Xiang-ping;KUAI Nai-jie
    2012, 208(12):  96-98,1.  doi:10.3969/j.issn.1006-2475.2012.12.025
    Asbtract ( 512 )  
    Related Articles | Metrics
    The generated heat and the temperature in the run-time of many important industrial equipment are important indicators reflecting its running situation, they are now often monitored by temperature monitoring module. However, ordinary the temperature monitoring module needs to install the battery or layout line data transmission wire, so there are great restrictions on the use. This paper designs an energy self-sufficiency temperature monitoring module. The module uses wireless transmission technology, combines semiconductor thermoelectric power generation technology to solve the problem of the power supply. The module can achieve real-time monitoring of temperature data and get enormous economic and social benefits.
    Design and Implementation of Printing Management System Based on ASP.NET Technology
    LU Yang;ZHANG Guang-tao
    2012, 208(12):  99-102,.  doi:10.3969/j.issn.1006-2475.2012.12.026
    Asbtract ( 525 )  
    Related Articles | Metrics
    With the increasingly fierce competition in the printing industry, the traditional model of the management system has been unable to meet the needs of the market development. Based on Web B/S model, using SQL Server 2008 database and the development technology of ASP.NET, this paper designs a set of information management system integrated marketing, production, storage, billing as one, achieves truly paperless level management of production.
    信息安全
    Research and Design of Multi-network Domain Technology in Video Surveillance System
    CHEN Min-rong;ZENG Qing-hao;ZHANG De-lei
    2012, 208(12):  103-105.  doi:10.3969/j.issn.1006-2475.2012.12.027
    Asbtract ( 432 )  
    Related Articles | Metrics
    The application of video surveillance system is becoming more and more widespread in the specialized industry, in which there exists some phenomenons such as complicated network structure, the applying of different type of network, the nonuniformity of network security rank dividing, the limitation of IP address capacity, and the text presents a model of multi-network domain design to handle this. The model uses unified configuration, and every client in each network domain can automatically match the proper network domain application pattern through the IP address of local domain. In the same time, the text also gives a detailed description of the system framework and the implementation solution of the model, and proves up the feasibility of the solution. The actual facts and application show that the model is simple and effective in solving the application problems of multi-network domain.
    Network Security Protection Design of Intelligent Terminal
    HUANG Yi-bin;LÜYang;YANG Wei-yong
    2012, 208(12):  106-109.  doi:10.3969/j.issn.1006-2475.2012.12.028
    Asbtract ( 474 )  
    Related Articles | Metrics
    In recent years, along with the development of wireless communication technology such as GPRS/3G/WiFi, more and more collective terminal uses wireless communication for their information transfer. These meet the intelligence and interactive request, but bring up security problem. This paper through the analysis of some existing wireless transmission security hidden danger, combines with the application of intelligent terminal environment and its characteristics, an economic and appropriate security protection scheme of intelligent terminal is designed.

    A Model of Information Security Device Linkage Protocol Based on Core Node
    CHEN Wen-jing
    2012, 208(12):  110-113.  doi:10.3969/j.issn.1006-2475.2012.12.029
    Asbtract ( 435 )  
    Related Articles | Metrics
    With the flourishing development of information and network technologies, the network information security appears the diversification and complication along with the implementation and popular of informatization. The traditional information protection systems take various independent security protection technologies, equipments as the core. It is not enough to build effective whole defend and incident response ability. Based on the ideal of distributed computing, this paper puts forward a linkage protocol model to schedule all kinds of independent information security equipments for dynamic collaborative response.

    Research and Implementation of SOAP Multilevel Security Model
    HU Jie-qing;WANG Fu-xi;XU Dong-hua
    2012, 208(12):  114-118.  doi:10.3969/j.issn.1006-2475.2012.12.030
    Asbtract ( 391 )  
    Related Articles | Metrics
    In order to realize the Web services security in the multilevel security and special cipher environment, based on the modification and expansion of WS-Security specification, SOAP multilevel security polices expand protocol and SOAP multilevel security protocol are proposed, and SOAP security model based on the above protocols is designed and implemented. Relying on the use of multilevel cipher services access technology, this model uses security polices to ensure the SOAP multilevel security. Using the model can validate the integrity and availability of above protocols.
    Web Attacks and Defense Methods Based on Ajax
    WANG Jing-chao;LIU Guang-yao
    2012, 208(12):  119-122,.  doi:10.3969/j.issn.1006-2475.2012.12.031
    Asbtract ( 467 )  
    Related Articles | Metrics
    Ajax as a core technology of Web 2.0, can send request to server asynchronously and make partial page refresh, which has been an essential technology for developing Web applications. Along with this technology booming, more and more security issues also emerge. This paper analyzes several Ajax Web-based attack and defense methods, and carries out case analyses based on one of the attacks, to verify the effectiveness of the proposed defense methods.

    应用与开发
    Design and Implementation of Power Marketing Information Integration Platform
    WANG Xue-mei;CONG Jun
    2012, 208(12):  123-126.  doi:10.3969/j.issn.1006-2475.2012.12.032
    Asbtract ( 485 )  
    Related Articles | Metrics
    In order to eliminate “information island” in Heilongjiang electric power company, the power marketing information integration platform is developed, the platform’s information comes from different business system. Servers are distributed in different cities of Heilongjiang province. The network situations are each not same. Platform analyses and processes the complicated condition in detail, and realizes the information integration efficiently and accurately in three branches which are from administration of power supply, electric power bureau to provincial bureau, providing the comprehensive and accurate data to assist the analysis and decision.
    Subjectivity Sentence Identification Based on Topic Model
    WU Chao-rong;LIAO Xiang-wen
    2012, 208(12):  127-130,.  doi:10.3969/j.issn.1006-2475.2012.12.033
    Asbtract ( 454 )  
    Related Articles | Metrics
    Subjectivity sentence identification aims to detect the opinionated sentences in text. This paper proposes mixing topics and subjectivity sentence identification model based on probabilistic topic model. Through considering the topics, the model can detect the subjective sentences, and can also extract the subjective topics from texts simultaneously. The proposed model is a weaklysupervised generative model, which only needs a small set of domain independent subjectivity lexicon to modify prior of model. The experiment results demonstrate that the model can highly improve the sentence subjectivity identification recall and the Fvalue, and the extracted subjectivity topics are semantically informative.

    Research on Application of Electronic Medical Record Document Multi-signature Based on XML
    GENG Biao
    2012, 208(12):  131-135.  doi:10.3969/j.issn.1006-2475.2012.12.034
    Asbtract ( 450 )  
    Related Articles | Metrics
    Based on the semi-structured characters of electronic medical record document, the article constructs the XML electronic medical record document. For a large calculation of the original multi-signature, and how to make meaningful subdocuments, on the basis of the Wu’signature algorithm, the article improves the multi-signature algorithm, by optimizing the signature rules. It solves problem of the signature efficiency and evaluates the multisignature. Based on the structure features of XML electronic medical record, the article constructs the medical keywords index database which makes a meaningful decomposition of the subdocument. Based on XML-signature specification, the article realizes the new multi-signature scheme, and the expansibility can be obtained to some extent.
    Research on Class-level Test Methods for State Diagram
    QU Chi-wen
    2012, 208(12):  136-138,.  doi:10.3969/j.issn.1006-2475.2012.12.035
    Asbtract ( 446 )  
    Related Articles | Metrics
    Object-oriented software is implemented by the classes and the association between its classes. Class testing is the key to objectoriented software testing. The paper studies a method of class level software testing that how the state diagram containing hierarchy and concurrent structure is transformed into extended finite state machine(EFSM)and obtains the corresponding test spanning tree, then uses the test spanning tree to produce software testing data. Experiments show that the test method is feasible and effective, and better results could be achieved in practice.
    Design and Application of Line Monitoring System for Gases Dissolved in Oil Based on Goahead
    ZONG Qi-zhen;HE Feng;LI Zhi-jun;
    2012, 208(12):  139-142.  doi:10.3969/j.issn.1006-2475.2012.12.036
    Asbtract ( 499 )  
    Related Articles | Metrics
    In order to further improve the existing oil dissolved gas monitoring device for harsh environment adaptability, remote management and monitoring, this paper proposes a design scheme on line monitoring system for gas dissolved in oil based on Goahead by studying the Vxworks operating system, combining Ethernet technology and using the B/S framework. First, the paper introduces the basic characteristics and the operation environment of hardware/software of Goahead Web Server, then discusses the key technology and design idea of Goahead Web Server in the development process in detail. With the HTML language, ASP language, JavaScript language and vector graphics library, achieves the dynamic webpage data interaction and information graphical real time monitoring function. The experiment results show that, this technology have good application value and market prospects.
    Research and Implementation of Moving Containers Among Container Bays
    LIU Lei
    2012, 208(12):  143-144,.  doi:10.3969/j.issn.1006-2475.2012.12.037
    Asbtract ( 477 )  
    Related Articles | Metrics
    Graphical container shell tone box method for end user application is simple and convenient, and the error rate is very low, the .NET Framework packags perfect drawing methods, this paper describes the container shell tone box algorithm and the application method of drawing the visual adjustment container Bay of end user.
    Design and Implementation of RAID Management Based on Storage Management Initiative Specification
    XIAO Zheng;WU Bi-wei;ZHOU Ning
    2012, 208(12):  145-148.  doi:10.3969/j.issn.1006-2475.2012.12.038
    Asbtract ( 505 )  
    Related Articles | Metrics
    The network storage technique such as SAN or IP SAN is widely used, the complicated system architecture and multi-vendor are also bringing difficulties to interoperability and management. The fundamental principles of the SMI-S are introduced firstly. In terms of SMI-S, the management of RAID is realized by means of acquirement of basis information of RAID, configuration of parameters and RAID5 operation on a specified disk group.
    Design and Implementation of CDROM Attached with Book Database Management System Based on Tuscany SCA
    TANG Qing;
    2012, 208(12):  149-152,.  doi:10.3969/j.issn.1006-2475.2012.12.039
    Asbtract ( 453 )  
    Related Articles | Metrics
    This paper introduces the basic developing principle of Tuscany SCA, this project is to assemble the four conventional functions: add, delete, edit, and inquire, into four service components by Tuscany SCA, and with the help of Tomcat, service components are deployed the standard Web Service for third-party’s calling.
    A Kind of High-availability Scheduled Task Management Method
    HOU Zeng-jiang;WANG Yong;RAO Lei
    2012, 208(12):  153-156,.  doi:10.3969/j.issn.1006-2475.2012.12.040
    Asbtract ( 502 )  
    Related Articles | Metrics
    To the flaws of managing scheduled task, a kind of high-availability managing scheduled task method is proposed. It uses cluster technology, which don’t lose scheduled tasks and recover running as soon as possible when hardware or software breaks down. On the basis of researching the crontab and at in Linux, it improves the accuracy of tasks execution, implements the unity of managing periodic and aperiodic scheduled task by classifying scheduled tasks according to execution time. The prototype experiments show that the method has higher availability and performance.
    Research on Design Information Management Platform of Service-oriented Architecture
    LUAN Yong-hong;WU Jun
    2012, 208(12):  157-160.  doi:10.3969/j.issn.1006-2475.2012.12.041
    Asbtract ( 437 )  
    Related Articles | Metrics
    Design information systems integration helps to enhance the core competitiveness of the knowledge-based real estate development enterprises. Service-oriented architecture model has characteristics of easy to extend the versatility, convenience to integrate with other systems, suitable for the needs of real estate knowledge management. This paper introduces the conception of the service-oriented architecture, builds a service-oriented architecture design information management system framework and the framework for indepth discussion, discusses the functional design of the platform system to achieve various business systems, business data, business processes without seam integration.
    Design and Implementation of Port Electronic Gate System Based on SOA Framework
    CHEN Qi;LUO Min;YANG Guo-qiang
    2012, 208(12):  161-163,.  doi:10.3969/j.issn.1006-2475.2012.12.042
    Asbtract ( 478 )  
    Related Articles | Metrics
    Aiming at the variability and complexity of business demand in the current software system development, this paper introduces a service-oriented architecture (SOA) framework for the design, and takes a port electronic gate system as an example, introduces the business process execution engine structure, a detailed description of the SOA structure design. The port electronic gate system is of good extension condition.
    Research on Real-time Multimedia Traffic Classification Method
    ZHOU Hua-lei;ZHANG Ya-nan
    2012, 208(12):  164-167.  doi:10.3969/j.issn.1006-2475.2012.12.043
    Asbtract ( 393 )  
    Related Articles | Metrics
    As the precondition of improving end-user’s voice and video experience, multimedia traffic classification has become a hot research area in the past years. This paper analyzes recent related research of multimedia traffic classification area, and proposes some advice for future development of this area.
    Research on Method to Reclaim Storage in Thin-Provisioning Storage Systems
    HAN Pu-jie;KANG Mu-ning;ZHANG Xiao
    2012, 208(12):  168-173,.  doi:10.3969/j.issn.1006-2475.2012.12.044
    Asbtract ( 494 )  
    Related Articles | Metrics
    Thin-Provisioning serves effectively to improve storage utilization in a storage system by allocating space on demand. Nevertheless, in the environment of Storage Area Network (SAN), it is difficult to reclaim the storage released from applications on thinprovisioning storage devices. The paper presents a method to reclaim free space for most file system on a thin-provisioning storage device. The method includes recognizing the format of the file system, monitoring the modification to the metadata of the file system to determine unused storage and reclaiming the space after a test based on data consistency. The prototype experiments show that the method can indeed reclaim free space for NTFS effectively, and moreover, the impact on the business applications is greatly reduced.
    Design and Implementation of Hospital Internal Management System Based on Smart One-card-through System
    CHEN You-sheng
    2012, 208(12):  174-177.  doi:10.3969/j.issn.1006-2475.2012.12.045
    Asbtract ( 433 )  
    Related Articles | Metrics
    According to the actual conditions of hospitals, a hospital internal management system based on smart one-card-through is designed, which integrates entrance guard system, catering system, and books management system. The system can improve the management efficiency and management level of hospitals.
    Research on Risk Evaluation Model of MIS Project Based on D-S Evidence Theory
    LI Peng;WANG Chen
    2012, 208(12):  178-183.  doi:10.3969/j.issn.1006-2475.2012.12.046
    Asbtract ( 475 )  
    Related Articles | Metrics
    This paper analyses the analyses, design and implementation three stages of the process of software development, from the three aspects of technology, cost, schedule of MIS project risk. Achieves the answers given by the MIS project developers on the basis of knowledge, experience, preferences, collects the greater risk indicators in each factor. Makes use of the theory of D-S evidence fuse according to the assurance given by experts on the risk indicators of risk probability and risk loss. Finally, gets a comprehensive evaluation of risk for the MIS project. An example illustrates the validity for the MIS evaluation of risk.
    Design and Implementation of Dam Concrete Constructing Temperature Information 〖JZ〗Monitoring Platform Based on Struts and Hibernate
    LIU Shu-wen;YANG Jin-sheng;CUI Bo
    2012, 208(12):  184-188.  doi:10.3969/j.issn.1006-2475.2012.12.047
    Asbtract ( 442 )  
    Related Articles | Metrics
    Dam concrete temperature is the characterization of dam hot state. Because dam concrete temperature has many kinds of information and complex data sources, monitoring of the dam concrete temperature is a problem in the dam construction monitoring projects. The monitoring of dam concrete platform solution based on Struts and Hibernate is proposed. The development platform bases on J2EE, with the classic MVC design pattern, Java is adopted as the main development language, used of the popular Struts and Hibernate frameworks in the Web system development, improves speed and system robustness. The platform provides users functions of realtime to find and edit temperature data, selectively output data files and temperature charts, reduces the risk of traditional manual operation mode, improves the efficiency of the temperature monitoring in practical applications, and becomes a part of indispensability digital dam.
    Optimization of Sliding Window Technology in Continuous Data Protection
    WAN Ying;LIN Yi;YOU Hong-tao
    2012, 208(12):  189-192,.  doi:10.3969/j.issn.1006-2475.2012.12.048
    Asbtract ( 390 )  
    Related Articles | Metrics
    Continuous data protection technology is an important method to reduce the damage of enterprise data. As per I/O capacity of backup, storage space becomes the main factors that limit the length of the CDP effective backup time. However, for most applications, the peak is not very commonly, serious waste of storage resources. This paper takes traditional sliding window mechanism as the foundation to optimize the window automatically adjust based on the I/O load changes, effectively improve storage resource utilization, so that users can take advantage of limited resources, in most cases, they have better data protection. The experiments show that the program not only improves the utilization of the backup disk, but also reduces the maximum data loss data recovery.
    Study on Application of Intelligent Security Management System
    YAO Qing-sheng;HU Jian;GONG Dai-sheng
    2012, 208(12):  193-196.  doi:10.3969/j.issn.1006-2475.2012.12.049
    Asbtract ( 407 )  
    Related Articles | Metrics
    This article introduces the importance and shortcomings of security system, based on it, puts forward the intelligent security management system. Then detailedly describes system functionality and some implementation details from the overall architecture, security management office subsystem architecture, unified platform control subsystem architecture.
    Design and Implementation of Announcement Management System Based on JEE Platform
    JIANG Yu-fang;DAI Wei
    2012, 208(12):  197-199.  doi:10.3969/j.issn.1006-2475.2012.12.050
    Asbtract ( 427 )  
    Related Articles | Metrics
    This article introduces the development of notice management system of enterprise and organization. This system based on JEE platform, uses JSP, Servlet and Java Bean technology to implement. The mainly function of this system is user authentication and notice information management. The whole system adopts MVC design pattern. Model layer implements using Java Bean, view layer using JSP and control layer using Servlet. Application of this system will help to improve the management level of enterprise and organization.
    Design and Implementation of Point to Point Simulation Command Drilling Platform
    ZHAO Xin;YI Li
    2012, 208(12):  200-203,.  doi:10.3969/j.issn.1006-2475.2012.12.051
    Asbtract ( 488 )  
    Related Articles | Metrics
    In order to improve the commander make decision and deployed timeliness and accuracy in the alert occurs, this paper designs and researches the point to point simulation command drilling platform. From the operational, stability, authenticity the three aspects of this platform make detailed design, and during the research and development process, the technical difficulties of the corresponding solutions are analysed and contrasted, to choose the optimal scheme to meet the authenticity of the platform. Through the integrated application of the policing skill training system , the simulation shows that the drilling platform plays a role in improving the personnel participation of the basic skills and tactics accomplishment and action ability.
    Research on Spring Framework Transactional Processing Technology
    MENG Qiong
    2012, 208(12):  204-206.  doi:10.3969/j.issn.1006-2475.2012.12.052
    Asbtract ( 525 )  
    Related Articles | Metrics
    Spring is an important application framework on development of JEE. This paper introduces the working principle of Spring transactional processing, describes how to use the transactional processing features of Spring to implement transactional processing in enterprise applications. The paper introduces the key parts of the XML configuration files, discusses the transactional rollback and transactional propagation in Spring at last.
    Research on Method of Automatic Weather Station Real-time
    GENG Huan-tong;FENG Hui-jing;XUE Feng-chang
    2012, 208(12):  207-210,.  doi:10.3969/j.issn.1006-2475.2012.12.053
    Asbtract ( 474 )  
    Related Articles | Metrics
    Although the automatic weather station data has high precision and strong spacetime resolution, but it’s expression is simple in current forecast application and the traditional meteorological data processing method can’t express the spatial character of automatic meteorological station data effectively and real-time intuitively, the availability of automatic weather station data is restrictive. In order to play the space-time advantage of the automatic weather station data, using the powerful capabilities of GIS in spatial data management and analysis can realize the real-time display of automatic weather station and GIS visualization expression of meteorological elements of query results and so on. It provides a stable, fast and convenient data platform and improves the efficiency of the meteorological operations. The GIS system has been applied in Jiading meteorological administration in Shanghai, significantly enhanced the level of use of meteorological data.
    Design and Implementation of Community Residents Health Records Management System
    XU Yi-han
    2012, 208(12):  211-215.  doi:10.3969/j.issn.1006-2475.2012.12.054
    Asbtract ( 467 )  
    Related Articles | Metrics
    Standardization, electronic community resident health records establishment and management, it is the emphasis and difficulty of current community health information construction. This paper combines with the ministry of health health record about the related data standard and the actual situation of project implementation, focuses on community residents health archives management system main function, system architecture, database design and main realizing technology, etc.
    Design and Implementation of Decision Support System ofPostal Savings Bank Based on OLAP
    WANG Gang;YANG Hao
    2012, 208(12):  216-221,.  doi:10.3969/j.issn.1006-2475.2012.12.055
    Asbtract ( 420 )  
    Related Articles | Metrics
    Through the analysis and research, this paper particularly explains the key technologies of OLAP in decision support system. For the OLAP in the postal savings decision support system application, it gives a solution, which is of much value and significance to the construction of the client management system in postal savings.

    Design of Power Quality Monitoring System Based on Dual CPU Structure
    GU Gao;TAN Dai-lin;LI Chang-yong;WU He-lei
    2012, 208(12):  222-225.  doi:10.3969/j.issn.1006-2475.2012.12.056
    Asbtract ( 503 )  
    Related Articles | Metrics
    Power quality monitoring management and power pollution the management work are more and more important. This paper introduces the design of TMS320F28335 for data processing by DSP core and the single chip microcomputer to control the core C8051F340 scheduling model of double CPU power quality monitoring system , realizes the real time power quality monitoring and parameter analysis, provides reliable basis for the power quality monitoring management and the management of electric power pollution. Comparing the domestic and international similar products, this system is of good cost performance. Practical application shows that the system measures accurately, accords with the country electric power quality monitoring standards, can be widely used in the power sector and large and medium power enterprises.
    Application of Principal Component Clustering Analysisin Combat Repertory Material Alternation
    HU Xin-tao;ZHANG Zuo-gang;LIU Wang
    2012, 208(12):  226-229.  doi:10.3969/j.issn.1006-2475.2012.12.057
    Asbtract ( 403 )  
    Related Articles | Metrics
    In allusion to the shortage of traditional alternation measure in combat repertory material alternation, from the point of important degree of material, a method of combat repertory material alternation based on principal component clustering analysis is proposed. The shortage of traditional measure and character of material management are comprehensive considered, the paper builds a new index method. Base on the new index, principal component analysis method is used to reduce dimensions, and hierarchical clustering method is used to clustering analysis. At last, base on the outcome, the right alternation measure is used. The simulation proves that the result is effective and reasonable.