Loading...

Table of Content

    24 February 2012, Volume 198 Issue 2
    算法设计与分析
    Comparison and Research on Algorithms of Three Chinese Text Classification
    CHEN Lin;WANG Jian
    2012, 198(2):  1-4.  doi:10.3969/j.issn.1006-2475.2012.02.001
    Asbtract ( 595 )  
    Related Articles | Metrics
    With the development of Internet and information technology, network information scale is explosively increasing. Among various type of information, the type of texts occupy a considerable proportion. Therefore, efficient and rapid classification and processing of text information in the network become a key issue. The paper analyzes and compares SVM algorithm, Bayes algorithm and KNN algorithm. By the experiments of the three algorithms in Chinese text classification, the results indicate SVM algorithm is superior than KNN algorithm and Bayes algorithm, SVM algorithm is an excellent Chinese text classification algorithm.
    Deficiencies of Support Vector Machines and Its Improved Algorithm
    GUO Guang-xu
    2012, 198(2):  5-7.  doi:10.3969/j.issn.1006-2475.2012.02.002
    Asbtract ( 662 )  
    Related Articles | Metrics
    Traditionary support vector machines (SVMs) usually focus on edge patterns of data distribution, and support vectors (SVs) usually generates from these patterns. This paper proposes an alternative algorithm, which generates SVs from all training patterns. The sparsity of the algorithm is validated on most data sets far better than typical SVMs. The complexity of the algorithm in multiclass problems is merely equivalent to two class SVMs, which greatly solves the problems of too many variables or too many binary classifiers in multi-class SVMs.
    An Incremental Mining Algorithm of Sequential Patterns Based on Frequent Sequence Tree
    LIU Jia-xin
    2012, 198(2):  8-10.  doi:10.3969/j.issn.1006-2475.2012.02.003
    Asbtract ( 617 )  
    Related Articles | Metrics
    This paper proposes an incremental mining algorithm of sequential patterns based on frequent sequence tree, called ISFST, in order to solve the problem that the existed incremental mining algorithms can not make full use of the results of the previous mining, when the database is updated, the algorithms need to mine the database once again. ISFST uses the frequent sequence tree as the storage structure of the algorithm. When the database is updated, ISFST is divided into two kinds of situations to update the frequent sequence tree, and finally gets all sequential patterns. Experiments show that ISFST outperforms PrefixSpan and IncSpan in time cost.
    Study of Automatic Scheduling Algorithm for Track and Field Sports 〖JZ〗Meeting in Colleges and Universities
    WANG Qiu-fen;YUAN Dong-feng
    2012, 198(2):  11-13.  doi:10.3969/j.issn.1006-2475.2012.02.004
    Asbtract ( 619 )  
    Related Articles | Metrics
    This paper analyzes the characteristics of scheduling for track and field sports meeting in colleges and universities, proposes an automation solving method about schedule of track and field sports meeting. The method is successfully implemented using C+〖KG-*2〗+ language. The experiments show that the method can give the athletes enough time to rest and attract viewers to watch matches. It reflects a kind of peopleoriented ideas.
    Robot Task Allocation Method in Robot Soccer Match System
    WANG Xing;YANG Yi-min
    2012, 198(2):  14-18.  doi:10.3969/j.issn.1006-2475.2012.02.005
    Asbtract ( 573 )  
    Related Articles | Metrics
    According to the problem in multirobot task allocation method based on genetic algorithm, that the initial population generated randomly is not well characterized the whole solution space, and it’s easy to fall into local optimal solution, this paper proposes a new multirobot task allocation method. This method is based on the utility value of the robot to determine the individual’s genes, resulting in the initial population, and by hierarchical genetic algorithm different groups with different optimal genes are evolution separately. Simulation results show that this method has higher efficiency and faster convergence.
    Power Load Forecasting Algorithm Based on Gene Expression Programming
    XU Yun-yan
    2012, 198(2):  19-21.  doi:10.3969/j.issn.1006-2475.2012.02.006
    Asbtract ( 526 )  
    Related Articles | Metrics
    This paper presents a power load forecasting algorithm based on gene expression programming (PLF-GEP), which combines theory of gene expression programming to improve precision of power load forecasting. PLF-GEP designed power load forecasting gene and fitness function for the characteristics of power load forecasting. Simulation experiments show that forecasting precision of PLF-GEP is improved about 99% in contrast with real precision.
    An Improved Algorithm for Constructing Phylogenetic Tree
    ZHANG Li-li;FENG Ping;GUO Ning
    2012, 198(2):  22-25.  doi:10.3969/j.issn.10062475.2012.02.007
    Asbtract ( 720 )  
    Related Articles | Metrics
    Neighbor-joining method is one of the most effective methods based on distance data constructing phylogenetic tree.But its clustering process may neglect some more reasonable topological structure and cause low accuracy.In order to advance the accuracy of neighborjoining method, this paper proposes an improved method. The method uses neighbor-joining method to generate an initial tree, and then searches for the maximum-likelihood phylogenetic tree according to RF distance. The experiment results show that the improved method is superior to neighbor-joining method.
    Research on ID3Decision Tree Classification Algorithm Based on MapReduce
    QIAN Wang-wei
    2012, 198(2):  26-30.  doi:10.3969/j.issn.1006-2475.2012.02.008
    Asbtract ( 711 )  
    Related Articles | Metrics
    Decision tree is widely used in data mining which is one of the typical classification algorithms. Traditional ID3 tree learning algorithms require training data to reside in memory on a single machine, so they cannot deal with massive datasets. To solve this problem, this paper analyzes the parallel algorithm of ID3 decision tree based on MapReduce model, then proposes a parallel and distributed algorithm for ID3 decision tree learning. The experimental results demonstrate the algorithm can scale well and efficiently process large-scale datasets on commodity computers.
    A Text Clustering Algorithm for Short Message
    WU Yong;XU Feng
    2012, 198(2):  31-34.  doi:10.3969/j.issn.1006-2475.2012.02.009
    Asbtract ( 570 )  
    Related Articles | Metrics
    As to short message text clustering, this paper designs a hybrid clustering algorithm combining by frequent termsets and Ant-Tree algorithm. This algorithm takes the advantage of efficiency of processing text data based on the frequent termsets clustering, produces the initial cluster, then eliminates the overlap text documents by calculating silhouette coefficient. Further refines the cluster by Ant-Tree. Thus gets the high quality clustering results. And the results that retain the description and tree structure can provide wider applications.
    Implementation of Real-time Filtering Algorithms DSP-based ECG Instrument
    ZHU Xue-hui;LI Xiang-yuan
    2012, 198(2):  35-37.  doi:10.3969/j.issn.1006-2475.2012.02.010
    Asbtract ( 619 )  
    Related Articles | Metrics
    This paper introduces the ECG(electrocardiogram) real-time filtering algorithms for power-line interference, electromyography noise, and base-line drift, and implemented by a digital signal processor on digital ECG instrument. In order to get high quality ECG signal, a notch filter is used to eliminate the power-line noise with base-line shift and a low-pass filter is used to eliminate the muscle noise. The experiment results prove that the filtering algorithms have the advantages of fast speed and effectual effect.
    An Algorithm of Drawing Website Information Based on Webpage File Code
    ZHAO Xiao-feng;LING Tian-bin;PENG Bo;WANG Zhuan-ni
    2012, 198(2):  38-39.  doi:10.3969/j.issn.1006-2475.2012.02.011
    Asbtract ( 517 )  
    Related Articles | Metrics
    This paper designs an algorithm of drawing information through the analysis of webpage file code. The purpose of this paper is to obtain the website information automatically. First, it analyzes and ampares two kinds of website structure, then proposes the algorithm of drawing information on the two website structure, following this, realizes the algorithm with code taking the NHK website as an example, at the end, expects the information drawing system’s future on function expansion.
    计算机仿真
    Research on Software Reliability Prediction Simulation Modeling Based on Benchmarking Thinking
    LIU Jun-hui;LI Na
    2012, 198(2):  40-43.  doi:10.3969/j.issn.1006-2475.2012.02.012
    Asbtract ( 515 )  
    Related Articles | Metrics
    The quantitative assessment and the prediction of software reliability have become the focus of attention and research, because software reliability is an important characteristic of software quality. A software reliability prediction simulation model which can be used before software test is presented to study this problem. This simulation model examines factors which affects the process of software reliability and forecasts software reliability by means of the benchmarking thinking and the similarity of software process measurement data. The simulation model need only the support of the static historical data so that it can be used to estimate the number of remaining software defects before software testing, and forecast the software reliability which provides the basis for software process improvement and software test correction plan.
    Research on Methods of Coordinate Rotation and Interpolation Based on Quaternion
    LIU Ai-dong;HUANG Bin;LU Zhong-wu
    2012, 198(2):  44-47.  doi:10.3969/j.issn.1006-2475.2012.02.013
    Asbtract ( 579 )  
    Related Articles | Metrics
    This paper first introduces the basic mathematical properties and calculation rules of quaternion, then describes a method of transfer vector among all the methods of coordinate rotation, which is based on quaternion, and three methods of interpolation of it, and compares with the Euler angle. The paper also discusses the different effects of these algorithms to the coordinate conversion, and the differences in the time complexity for computer to finish them, and draws conclusions by simulation.
    Design and Implementation of Virtual Measurement for Interferometric
    HU Shao-bin;ZHOU Li;TANG Si-bao;
    2012, 198(2):  48-51.  doi:10.3969/j.issn.1006-2475.2012.02.014
    Asbtract ( 556 )  
    Related Articles | Metrics
    In order to achieve a pupose to virtual measure software program design for fiberoptic hydrophone, this paper uses characteristics of its output signals. Based on the nonNI acquisition card, the 3×3 coupler demodulation principle and its mathematical model are analysed and compared, and the interferometric fiberoptic hydrophone ITT virtual device detection program is designed. By calling a dynamic link library, the LabVIEWbased data collection program, the data processing and display program are developed, which makes up an ITT virtual detection system for fiberoptic hydrophone. Then, draws a conelusion that this virtual test system is of a good amplitude and frequency characteristics of the adaptive.
    Prediction Model on Influence of Teacher Quantity on Teaching Result
    HAN Wei;YUE Kui-zhi;YANG Fan;SHI Jian-guo
    2012, 198(2):  52-55.  doi:10.3969/j.issn.1006-2475.2012.02.015
    Asbtract ( 510 )  
    Related Articles | Metrics
    This paper builts the stock and flow diagrams about every element of impacting on teaching result with the change of teacher quantity on the basis of system dynamics, establishes the prediction model about teaching result in college, and simulates with Vensim PLE 5.9 to solve the bad influence on the teaching experience and teaching result when the teacher quantity has changed in a college. The simulation test shows that the model can make prediction on the teaching result trend and provide theoretical evidence for making plan of hiring and firing teachers with consideration of teaching result.
    计算机控制
    Chaos Suppression Control for Freefloating Space Redundant Manipulator during Avoidance Singularity
    YUAN Wen-chong;WANG Cong-qing;WU He-lei;LIU Xiu-chao
    2012, 198(2):  56-60.  doi:10.3969/j.issn.1006-2475.2012.02.016
    Asbtract ( 549 )  
    Related Articles | Metrics
    A Generalized Jacobian Matrix of the freefloating space redundant manipulator is derived. The kinematics manipulable measuring for avoidance singularity is used as a target function based on gradient projection. Avoidance singularity planning is realized by joint space selfmotion in null space. Numerical computing results show the selfmotion is chaos state, which can be suppressed by state delayed feedback control. The joint movement is to stabilize a cyclic trajectory during avoidance singularity motion planning.
    Research and Application of PLC Software Redundancy in Continuous Supply of N2
    ZHANG Xiao-hui;YUAN Min
    2012, 198(2):  61-65.  doi:10.3969/j.issn.1006-2475.2012.02.017
    Asbtract ( 539 )  
    Related Articles | Metrics
    This paper introduces a lowcost PLC redundancy system——the application of Siemens PLC software redundancy in a continuous supply of N2. The paper also provides a detailed description and illustration for the composition of the system and the software configuration, finally it introduces the design and realization of the software redundancy programming.
    图像处理
    Color Image Quantization Algorithm Based on KD-tree and NBS Distance
    HOU Yan-li
    2012, 198(2):  66-68.  doi:10.3969/j.issn.1006-2475.2012.02.018
    Asbtract ( 605 )  
    Related Articles | Metrics
    Aiming at the problem of giving the number of quantization in advance and poor in-time performance of the conventional K-mean clustering, this paper proposes a color image quantization algorithm based on KD-tree clustering and NBS distance. Firstly, the original image is quantized using the middlecut algorithm. Secondly, based on the quantitative relation of the NBS distance and the color difference of human visual, the initial clustering centers and number are determined automatically. Thirdly, the K-mean clustering algorithm using the KD-tree data structure is applied to the color quantization, and then, a fast color image quantization effect is achieved. At last, simulations are performed on the presented algorithm, and the simulation result shows that the presented algorithm performs better in quantization effect and faster in running time.
    Mineral Recognition Software Modules Development Based on Spectral Absorption Index
    LI Hai-sheng;ZHOU Ping;HAN Meng-xiao;HUO Hong-yuan;CUI Yan-mei;GENG Ling-peng
    2012, 198(2):  69-72.  doi:10.3969/j.issn.1006-2475.2012.02.019
    Asbtract ( 618 )  
    Related Articles | Metrics
    According to SAI mineral absorption index model (Jinnian Wang, 1996), this paper analyzes gold, copper spectral curves of the main alteration mineral parameters and quantifies their spectral absorption characteristics. The main quantitative indicators are as follows: SAI, absorption width, absorption depth, absorption position, absorption symmetry. Synthesizing the ENVI function and the IDL language based on ENVI platform develops alteration mineral extraction module MineralExtractModule. In addition the experiment proves that the module can be quickly and accurately identify mineralizationrelated alteration minerals using the spectral absorption features, so realizes the goal of using imaging spectroscopy to extract alteration minerals quickly and automatically.
    Research on Application of Software Refactoring and Design Patterns in Camera Information-card Review System
    XU Ting;SUN Yong;ZHANG Jian-min
    2012, 198(2):  73-76.  doi:10.3969/j.issn.1006-2475.2012.02.020
    Asbtract ( 567 )  
    Related Articles | Metrics
    This paper designs and implements a camera-based informationcard review system, which consists of a series of image process operations such as image acquisition, converting RGB into grayscale image, binary image, optic aberrance revising, skew angle correction, locating and identifying of image. Then optimized and refactored the framework of the system according to the systematic research of software refactoring and design patterns. This paper makes full refers to design patterns and improves the quality of existing code by the refactoring technology, and increases the system’s maintainability and reusability.
    数据库
    Application of Modeling Technology in Design and Implementation of Manufacture Sale Service Management Information System Architecture
    HUANG Jun-nan;LI Xiao-li;JIANG Mian-mian
    2012, 198(2):  77-81.  doi:10.3969/j.issn.1006-2475.2012.02.021
    Asbtract ( 571 )  
    Related Articles | Metrics
    Management Information System has the history of 30 years, which is applies to various fields. In recent years, many software companies use the increasingly sophisticated modeling techniques to aid the design and development of software. To aid the design and realize the manufacturing industry sale service system framework by modeling technology and to design the corresponding data model, Which can break through the limitations of the system development expansion and extension. At the same time, mature data model plays a good guidance function to the related application and design, which has certain reference value and practical significance. Modeling technology in system development can play role in reducing development difficulty, enhance team communication skills, improve the efficiency of software development, improve software development portability advantages.
    Implementation of Methods for Converting Word File Image into Database
    WANG Xiang-ju
    2012, 198(2):  82-85.  doi:10.3969/j.issn.1006-2475.2012.02.022
    Asbtract ( 624 )  
    Related Articles | Metrics
    This article starts with a Word file example and analyzes the issues about the Word file components, application interval of objects in VBA, Delphi supporting Word, designs a method of conversion between picture information in Word files and SQL server database. By this way information in Word files can be read automatically using a program, and picture information in Word files can be extracted and saved in relative database files. Testing results show automatic transformation method converting Word files with picture information to database become effective in OA process, implementing fast and high efficiency information conversion and improving efficiency.
    Study of Text Classification Method Based on Rough Set and Improved KNN Algorithm
    SHAO Li
    2012, 198(2):  86-89.  doi:10.3969/j.issn.1006-2475.2012.02.023
    Asbtract ( 531 )  
    Related Articles | Metrics
    The KNN algorithm is a common method in the field of automatic text classification. It has high classification accuracy for texts with low dimensional vectors. However, when it deals with large numbers of highdimensional texts, the traditional KNN algorithm, due to the need to process considerable the training samples, result in increased similarity calculation and reduced classification efficiency. To solve ensuing problems, this paper uses the rough set method to reduce the attributes of decision table and remove redundant attributes, and then the improved clusterbased KNN algorithm is used to classify texts. Simulation results show that the method can improve the precision and accuracy rate of text classification.
    Synchronization Technology of Distributed Database Based on Facade
    JIANG Jie-bao;ZHOU Qi-yun;WEN Shui-sheng;ZHANG Ren-long;HU Bin
    2012, 198(2):  90-91.  doi:10.3969/j.issn.1006-2475.2012.02.024
    Asbtract ( 563 )  
    Related Articles | Metrics
    Data synchronization is a key technology with distributed environment that each node keep data consistency of the database approach. This article for Oracle multidatabase application environment, proposes a similar facade for enterpriselevel database synchronization technology. It describes the basic working principle of transaction synchronization under distributed database, from database links, synonyms to transaction synchronization. In practice projects, it shows that a distributed database transaction based on facade is feasibility of the application and has good features.
    Design and Development for Enterprise Human Resources Management System of Web Version
    JIANG Dong-jie;CHEN Shan-shan
    2012, 198(2):  92-94.  doi:10.3969/j.issn.1006-2475.2012.02.025
    Asbtract ( 606 )  
    Related Articles | Metrics
    The rapid development of network provides a good condition for the communication between employees and enterprises, the paper designs and develops a Web version of enterprise human resource management systems and passes the test operation, the system aims to make the enterprises manage the information of their employees effectively, make employees check their salaries and other information confidentially, and can make employees and enterprises communicate with each other freely on line by this system. Theoretic argument and example analysis demonstrate that the system is feasibility and validity.
    Design and Implementation of Course Management System Based on Typed Dataset
    ZHOU Zhi-peng;JIANG Yu-fang
    2012, 198(2):  95-97.  doi:10.3969/j.issn.10062475.2012.02.026
    Asbtract ( 718 )  
    Related Articles | Metrics
    This paper describes how to develop a course management system in universities using Visual Studio 2008 IDE and C# programming language. It accesses database by typed dataset, supporting Windows controls data binding, using visual design tools to generate SQL query statement and definition of data view. These methods can reduce writing code and increase developing effeteness.
    Application of Data Warehouse and OLAP in Preference Data Analysis 〖JZ〗on Communication Line State Statistics
    LIU Shu-juan;YUE Peng
    2012, 198(2):  98-101.  doi:10.3969/j.issn.1006-2475.2012.02.027
    Asbtract ( 552 )  
    Related Articles | Metrics
    In recent years, with the rapid development of the communication industry, more and more broadband accessed. Customers on the bandwidth and broadband quality put forward higher requirement, how to reduce the operation and maintenance costs, and improve network quality are the biggest problem for corporations. So corporations must have a whole understanding for the communication line state. As the above problems, this paper according to the enterprise to communication line state statistics demand, through the application of data warehouse and OLAP technology for the original communication lines state statistics the multidimensional data analysis, makes a practical scheme for line state statistical. This plan can offer reference in telecommunications companies in line state statistics.
    网络与通信
    High Performance TCP Vegas Revised Algorithm
    LU Yao;CHEN Shu-yu;YAO Zhang-jun;LIU Xiao-wei
    2012, 198(2):  102-107.  doi:10.3969/j.issn.1006-2475.2012.02.028
    Asbtract ( 685 )  
    Related Articles | Metrics
    Due to the slow-start phase of TCP Vegas stop prematurely and the adjustment cycle of congestion avoidance phase is too long, TCP vegas can not share the available bandwidth when it coexists with TCP Reno. Because Vegas is too conservative in a competitive environment, this paper proposes a TCP Revised Vegas algorithm of high-performance, this congestion window control algorithm uses a smoothing dispose and incremental factor, increases Vegas aggressive. Through numerical analysis and simulation experiments show that performance and fairness of the new algorithm are improved whether in the single environment or the mixed environment.
    Research on Image Transmission Technology Based on ZigBee
    SUN Xiao-dong;MO Guo-qing
    2012, 198(2):  108-110.  doi:10.3969/j.issn.1006-2475.2012.02.029
    Asbtract ( 661 )  
    Related Articles | Metrics
    The emerging IEEE 802.15.4 (ZigBee) standard is used for low data rate, low power consumption and low cost wireless personal area networks (WPANs). Image transmission over such networks is considered an issue since image traffic contains a large amount of information that requires high data rates. ZigBee, in general, uses a single channel for data transmission. The aggregate throughput of ZigBee network can be improved by using multiple channels. The main focus of the paper is on the image transmission over ZigBee networks using multiple channels and multiple radio interfaces, which aims to improve the total throughput of networks. The results show that the image transmission over the proposed method is feasible.
    Design and Implementation of Online Judge System
    JIANG Hui;WANG Da-ju
    2012, 198(2):  111-115.  doi:10.3969/j.issn.1006-2475.2012.02.030
    Asbtract ( 612 )  
    Related Articles | Metrics
    In the process of examining results of the college students, learning program design course, only the examination paper score can not reflect the true effect of students’ learning. The nature and features of program design course determines its evaluation measure——let students practice to test the learning effect. For this reason, on the basis of understanding and learning many automatic judge systems, this paper develops online judge system independently which can basically satisfy students’ based on practice learning.
    Research on Loading Balance in Structured P2P Network
    LOU Mei-ming;JIN Bo
    2012, 198(2):  116-119.  doi:10.3969/j.issn.1006-2475.2012.02.031
    Asbtract ( 575 )  
    Related Articles | Metrics
    In structured P2P network, loading imbalance results in the problem of single failure, network congestion, request delay and even worst problems. This paper proposes an effective loading balance algorithm to prevent hot spots based on the analysis of requested datas and nodes processing difference. Through experiments and simultaed results, the proposed algorithm can effectively improve loading unbalance in structured P2P network.
    Research on Trace Method Traversing Technology in OpenH323 Network Video Conference
    CHEN Ming-dong
    2012, 198(2):  120-123.  doi:10.3969/j.issn.1006-2475.2012.02.032
    Asbtract ( 543 )  
    Related Articles | Metrics
    Network video conference system is a collection of audio, video, data exchange as one method, audio and video for traversing firewall technology is one of the key technology of the realization of network video conference system. Audio and video firewall traversal techniques are to solve the port mapping problem between public and private network, in the limited test conditions without additional hardware and auxiliary equipment, efforts is mode to seek a solution and simulation test, finally, this paper proposes the firewall traversal trace method and successfully applies to the network video conference system. In heterogeneous network, it can realize the audio and video NAT firewall traversing, hold the vido conference with desktop level and large screen in the condition of lacking the bandwith resource, and achieves the effect of HD. It is successfully applies to a certain group video conferencing project, the operation effect is good.
    Collision-avoiding for Real-time Communication in IEEE 802.15.4 Cluster--tree Networks
    TANG Zhong;XU Fang-yuan
    2012, 198(2):  124-127.  doi:10.3969/j.issn.1006-2475.2012.02.033
    Asbtract ( 529 )  
    Related Articles | Metrics
    Wireless cluster-tree networks can support real-time and deterministic communications. But for the device deployments in practical applications, communication collisions can occur between clusters and influence real-time performance of the systems. Based on IEEE 802.15.4 standard, this paper studies the collision problem of real-time communication in wireless clustertree networks, proposes a superframe collision avoiding mechanism between clusters. The example analysis shows that the algorithm can solve the collision of real-time communications in wireless cluster-tree networks and improve performance.
    A Method of Web Page Purification Based on Single Model
    GAN Wen-min;LI Jun;LI Jian
    2012, 198(2):  128-130.  doi:10.3969/j.issn.1006-2475.2012.02.034
    Asbtract ( 543 )  
    Related Articles | Metrics
    In order to obtain and handle with the information in Web pages effectively, this paper proposes the algorithm of Web page purification based on improved DOM tree and BP neural network.This algorithm establishes block tree by DOM tree and Web content using HTMLParser.Because of the evident numerical characteristics in subblocks of Webpages, it can establish noisy purifymodel by BP neural network. As a result, it can make the Webpage purification more modelling, also it can get a more effective result.
    Research and Implementation of Website Framework for Asynchronous Data Transmission
    ZHANG Yue;LIU Wen-bin
    2012, 198(2):  131-134.  doi:10.3969/j.issn.1006-2475.2012.02.035
    Asbtract ( 529 )  
    Related Articles | Metrics
    As the Ajax framework does not have unified standard, programming complexity, does not meet the W3C standards and other issues, this paper presents a set of documentbased object model and a JavaScript website framework for asynchronous data transmission. The framework program is simple, data transmission is high efficient, full compliance with W3C standards. Test results show that, the framework is of following features, such as excellent asynchronous data transmission for webpage request, platformindependent, good scalability, high security, and which can be easily applied in different types of Web applications.
    Application of Critical Path Method in Risk Management System for Large Aircraft Project
    TAO Yun-shuang
    2012, 198(2):  135-138.  doi:10.3969/j.issn.1006-2475.2012.02.036
    Asbtract ( 532 )  
    Related Articles | Metrics
    By identifying the critical path, people can effectively identify the key activities that impact the project progress. Taking appropriate human and material resources and allocate them to key activities can shorten the project duration. This paper first analyzes the importance of using risk management in large aircraft project. Then it introduces how to find out the critical path in a Gantt graph generated by Microsoft Project from the perspective of data structures and algorithms, verifies the method by two examples. Finally, the paper analyzes the insufficient of CPM and proposes some suggestions about how to improve it.
    Analysis and Debugging Technique in Application of High-speed Transceiver Logic
    WEI Wei;LI Li;TANG Zhen
    2012, 198(2):  139-141.  doi:10.3969/j.issn.1006-2475.2012.02.037
    Asbtract ( 572 )  
    Related Articles | Metrics
    This article mainly analyzes the internal structure and the principle of high-speed transceiver logic. Based on high-speed transceiver logic application in the agglutinative RF acquisition system, from application and debugging of this interface, the paper puts forward some problems and solutions which should pay attention to, and eventually gets the correct simulation waveform.
    Research and Implementation of External Equipment 〖JZ〗Data Transmission Based on B/S Structure
    HU Bin;ZHOU Qi-yun;ZHANG Ren-long;WEN Shui-sheng;JIANG Jie-bao
    2012, 198(2):  142-144.  doi:10.3969/j.issn.1006-2475.2012.02.038
    Asbtract ( 577 )  
    Related Articles | Metrics
    This paper proposes three external equipment data transmission methods based on B/S structure, HTTPbased data transmission, anticonnection based on FTP, based on OCX, discusses the basic principles of realization and compares them on transmission performance and transmission quality, the results of experiments show that the method based on OCX is better than others, and it is successfully applied to the marketing management platform of municipal utilities group.
    Research on Access Control Policy Description Method Based on Ponder2 Language
    ZHOU Jie;YU Ming-gang
    2012, 198(2):  145-148.  doi:10.3969/j.issn.1006-2475.2012.02.039
    Asbtract ( 524 )  
    Related Articles | Metrics
    Currently, Ponder2 policy language mainly applies on QoS of network management, but the research of security is fewer.This paper analyzes the description method of obligation policy in Ponder2. Combining the character of access control policy, an access control policy description method based on Ponder2 language is proposed.
    Design and Implementation of Remote Disaster Tolerant System
    LIU Dong;XIA Qing-guo;ZHANG Yan-geng
    2012, 198(2):  149-152.  doi:10.3969/j.issn.1006-2475.2012.02.040
    Asbtract ( 554 )  
    Related Articles | Metrics
    This paper designs and implements a remote disaster tolerant system, the system uses a structure which combines local tolerant system with remote tolerant system, separates services and storage, it uses local control center as event processing center and data forwarding cache. In addition, it schemes with synchronization and asynchronism for data backup, ensures data integrity and reliability, it uses staged deployment failure detection to detect system, and uses dynamic failure detection algorithm to reduce the erroneous decision and accelerate the speed of service restoration. Through tests, the system’s data recovery and service switching have been significantly improved. In practical application, the system runs stable, performs well and reaches a high level of disaster tolerant system requirements.
    信息安全
    Research on Differential Power Analysis Attack Technology for AES
    ZHOU Guo-xin;YIN Hui-lin
    2012, 198(2):  153-155.  doi:10.3969/j.issn.1006-2475.2012.02.041
    Asbtract ( 614 )  
    Related Articles | Metrics
    This paper gives the realization of differential power analysis attack of the decrypt encrypted circuits with DES. And the paper also gets the key of AES on the AtmelAES plat by using DPA attacks. The paper confirms the vulnerability of the AES algorithm facing the PDA attacks. And it is very necessary to improve the performance of the antiDPA attacks of AES.
    Study on System and Model of Coordinated Defense for Campus Network Security
    PANG Cong;HAN Xiu-ling
    2012, 198(2):  156-160.  doi:10.3969/j.issn.1006-2475.2012.02.042
    Asbtract ( 618 )  
    Related Articles | Metrics
    Aiming at the security issues of the new style campus network, this paper proposes a multilevel and stereoscopic systems scheme of collaborative defense for campus network security. Based on the scheme, in combination with the latest distributed firewall and intrusion detection systems, actually built the corresponding coordinated defense model. After the integration of Agent technology, the communication protocol between the various security subsystems are respecification and redesign. Studies show that the model is feasible, and thereby the safety of the campus network is ensured to the maximum.
    Research on Large Aircraft Project Risk Monitoring and Design of System
    XU Wen-long
    2012, 198(2):  161-164.  doi:10.3969/j.issn.1006-2475.2012.02.043
    Asbtract ( 599 )  
    Related Articles | Metrics
    When the project risks are identified, it needs to track and control them, and monitor their development situations. The risk monitoring process is an important part of a successful implementation of risk management. This paper studies the relevant contents of project risk monitoring process, and designs a risk monitoring subsystem using the comprehensive risk monitoring scheme, and finally gives an application example.
    Design and Realization of Dynamic Rule Sets of Snort Based on Threshold of Statistics
    REN Bing-zhong;KONG Wen-huan
    2012, 198(2):  165-167.  doi:10.3969/j.issn.1006-2475.2012.02.044
    Asbtract ( 604 )  
    Related Articles | Metrics
    Snort is an opensource intrusion detection system. It detects intrusion with the static rule sets. The paper analyses the rationale and model of intrusion detection system. It introduces how to configure the static rule sets of Snort, describes a method of making dynamic rule sets according to the threshold of statistics flow and the threshold of alert frequency, this method improves and enhances the deployment of flexibility Snort should have.
    Research on Obfuscation Technique Based on Branch Functions
    CAO Shu-qin;ZHENG Cheng-long
    2012, 198(2):  168-170.  doi:10.3969/j.issn.1006-2475.2012.02.045
    Asbtract ( 540 )  
    Related Articles | Metrics
    The process of reverse engineering is an executable program typically begins with static disassembly that translates machine code to assembly code, which creates opportunities for theft of intellectual property and discoveries of vulnerabilities of the program. In order to disrupt the static disassembly process so as to make programs harder to disassemble correctly, after a deep research on the static disassembly obfuscation technique based on branch functions and its weakness on invisibility and code execution speed, this paper proposes an improved obfuscation technique based on branch functions which not only can hide the jump instructions efficiently but also enhance the code execution speed, and make the analysis of reverse engineering more difficult at the same time.
    Research on Obfuscation Technique Based on Branch Functions
    CAO Shu-qin;ZHENG Cheng-long
    2012, 198(2):  168-170.  doi:10.3969/j.issn.1006-2475.2012.02.045
    Asbtract ( 394 )  
    Related Articles | Metrics
    The process of reverse engineering is an executable program typically begins with static disassembly that translates machine code to assembly code, which creates opportunities for theft of intellectual property and discoveries of vulnerabilities of the program. In order to disrupt the static disassembly process so as to make programs harder to disassemble correctly, after a deep research on the static disassembly obfuscation technique based on branch functions and its weakness on invisibility and code execution speed, this paper proposes an improved obfuscation technique based on branch functions which not only can hide the jump instructions efficiently but also enhance the code execution speed, and make the analysis of reverse engineering more difficult at the same time.
    应用与开发
    Research and Implementation of Web-based Information Dissemination System
    XIA Da-wen
    2012, 198(2):  171-175.  doi:10.3969/j.issn.1006-2475.2012.02.046
    Asbtract ( 539 )  
    Related Articles | Metrics
    In view of the existing problems of static information dissemination and management in Egovernment websites and based on studies of system need analysis, system general design, system programming, system security and key techniques, this paper realizes a Webbased information dissemination system by employing B/S+LAMPP for application, which will satisfy the effective information dissemination and management of Egovernment and also enhance the efficiency of information business and convenience in service of government.
    Parallel Computing of Dynamic Pattern Recognition Based on OpenMP
    SUN Shan
    2012, 198(2):  176-179.  doi:10.3969/j.issn.1006-2475.2012.02.047
    Asbtract ( 545 )  
    Related Articles | Metrics
    Given that the realization of dynamic pattern recognition of deterministic learning theory is timeconsuming, a multicore parallel computation technique suitable for recognition process is proposed. Firstly, based on the classical Mansoux compressor model, the acquirement of patterns and the process of recognition are described in brief. Secondly, parallel computing is applied to dynamic pattern recognition by using OpenMP programming on four cores PC hardware platform. Factors which influence the performance of program are discussed by setting different thread numbers. The result shows that the only way to design parallel recognition program with high performance is taking kinds of elements into account.
    Design and Implementation of Energy Conservation Management 〖JZ〗Platform Based on .Net & Ajax
    ZHOU Li-jie
    2012, 198(2):  180-184.  doi:10.3969/j.issn.1006-2475.2012.02.048
    Asbtract ( 523 )  
    Related Articles | Metrics
    The Energy Conservation Supervision Information Management Platform(ECSIMP) is summarized. Using .Net framework and Ajax technology and 3-tier access framework, a prototype of ECSIMP is designed successfully. The overall planning, main function and specific implementation are given. The advantages of asynchronous processing are fully utilized, so that high quality service can be provided for users.
    Design of Intelligent Gobang Based on Xcode
    WANG Ting;YU Jin-ke;
    2012, 198(2):  185-186.  doi:10.3969/j.issn.1006-2475.2012.02.049
    Asbtract ( 675 )  
    Related Articles | Metrics
    AI(Artificial Intelligence) is a kind of newly emerging frontier science that is developed from many sciences’ interinfiltration, in this field often is studied on game playing.This paper uses Xcode as development tool, according to the algorithm of game playing tree’s heuristic researching, designs a game of gobang, realizes game playing between human and computer.
    Programmable Auto-transformation from MS Word to PDF
    HU Xiao-yan;LIU Pei-xun;LIU Li-qiang
    2012, 198(2):  187-189.  doi:10.3969/j.issn.1006-2475.2012.02.050
    Asbtract ( 663 )  
    Related Articles | Metrics
    Microsoft Word is largely applied in editing documents in daily work. But the documents of PDF format is favored by file clerk and publisher for its character, such as security, platform independence and so on. This paper introduces a method of transformation from MS Word to PDF manually. And then it summarizes the principle of the transformation briefly. In order to convert MS Word format documents to PDF automatically and large, the process of creating transformation component and program for different application is presented in detail.
    Design of Marine Beidou Avigation Terminal Based on Android
    LONG Chang-sheng;CHEN Shu-yu;XIA Fan
    2012, 198(2):  190-193.  doi:10.3969/j.issn.1006-2475.2012.02.051
    Asbtract ( 525 )  
    Related Articles | Metrics
    This paper mainly introduces the research of marine Beidou navigation terminal, using the S3C6410 ARM11 development board, Linuxbased Android open source operating system, and the Beidou positioning system receiver. Designs a marine navigation software to receive location information and extract the location data, providing marine navigation parameters to achieve the analysis and calculations.
    SSH Codes Generating Based on MDA
    XING Hai-hua;SHI Bing;HU Yuan
    2012, 198(2):  194-197.  doi:10.3969/j.issn.1006-2475.2012.02.052
    Asbtract ( 648 )  
    Related Articles | Metrics
    In recent years, as the development of software developing technologies, the software development steps are more standardized than ever before, which makes the management and maintenance more convenient, but it also brings an unavoidable problem: developers have to write more repeated code, one good example of which is the software development based SSH. To solve this problem, this article proposes a new code generating method called sMDA base on MDA(Model Driven Architecture) and framework of SSH. sMDA solves the problem of writing repeated code which are copied and pasted again and again. sMDA will generate key codes of system automatically, while codes are copied and pasted in the past.
    Design of Wireless Pulse Signal Monitoring System Based on STM32
    LI Miao-miao;DONG Qi
    2012, 198(2):  198-201.  doi:10.3969/j.issn.1006-2475.2012.02.053
    Asbtract ( 703 )  
    Related Articles | Metrics
    Pulse signal contains important information of heart and blood vessels status. At present, China’s for cardiovascular disease monitoring to cable way, have bulky and expensive shortcomings, not easy to community health and family health care. This paper integrates application of mobile communication technology, embedded technology and electronic information processing technology, develops a visualization, wireless pulse monitoring system. The system includes pulse transducer, intelligent terminal users and remote monitoring center three parts. Pulse sensors collect pulse signal; intelligent terminal processes, and storages signal, with GPRS to finish data upload and receiving; remote monitoring center analyzes data, and uploads terminal diagnosis and recommendations issued by wireless means to user terminals. This system can be used as a family care and remote medical auxiliary equipment, it is suitable for the community and the family health care, so it have broad application prospect.
    Research and Application of OLAM Based on SQL Server
    WANG Wan-chuan;WU Chen
    2012, 198(2):  202-206.  doi:10.3969/j.issn.1006-2475.2012.02.054
    Asbtract ( 614 )  
    Related Articles | Metrics
    OLAM (On-line Analytical Mining) is current hot technology and a new mining method which fuses the advantages of OLAP and data mining. This paper focuses on the OLAP and data mining technology which are the core technologies and primary content of business intelligence. OLAM is introduced on the basis of the two technologies, and the basic principles and core technologies are expounded. A data warehouse for a business case is built based on SQL Server platform, and a sales cube is built by OLAP using Analysis Services. The combination of OLAP and clustering mining is realized by means of OLAM model, the conclusion is that a good clustering result of customer is obtained with the aid of superiority of OLAP and clustering mining.