Loading...
主 管:江西省科学技术厅
主 办:江西省计算机学会
江西省计算中心
编辑出版:《计算机与现代化》编辑部
Toggle navigation
Home
About Journal
Editorial Board
Journal Online
Online First
Current Issue
Archive
Most Read Articles
Most Download Articles
Most Cited Articles
Subscription
FAQ
Self Recommendation
Contact Us
Email Alert
中文
Office Online
Submission or Manuscript
Peer Review
Editor-in-Chief
Office Work
Instruction
More>>
Instruction
Submit Flow
Template
Copyright Agreement
The Author Changes the Application
Highlights
More>>
Links
More>>
Visited
Total visitors:
Visitors of today:
Now online:
Table of Content
24 February 2012, Volume 198 Issue 2
Previous Issue
Next Issue
算法设计与分析
Comparison and Research on Algorithms of Three Chinese Text Classification
CHEN Lin;WANG Jian
2012, 198(2): 1-4. doi:
10.3969/j.issn.1006-2475.2012.02.001
Asbtract
(
595
)
Related Articles
|
Metrics
With the development of Internet and information technology, network information scale is explosively increasing. Among various type of information, the type of texts occupy a considerable proportion. Therefore, efficient and rapid classification and processing of text information in the network become a key issue. The paper analyzes and compares SVM algorithm, Bayes algorithm and KNN algorithm. By the experiments of the three algorithms in Chinese text classification, the results indicate SVM algorithm is superior than KNN algorithm and Bayes algorithm, SVM algorithm is an excellent Chinese text classification algorithm.
Deficiencies of Support Vector Machines and Its Improved Algorithm
GUO Guang-xu
2012, 198(2): 5-7. doi:
10.3969/j.issn.1006-2475.2012.02.002
Asbtract
(
662
)
Related Articles
|
Metrics
Traditionary support vector machines (SVMs) usually focus on edge patterns of data distribution, and support vectors (SVs) usually generates from these patterns. This paper proposes an alternative algorithm, which generates SVs from all training patterns. The sparsity of the algorithm is validated on most data sets far better than typical SVMs. The complexity of the algorithm in multiclass problems is merely equivalent to two class SVMs, which greatly solves the problems of too many variables or too many binary classifiers in multi-class SVMs.
An Incremental Mining Algorithm of Sequential Patterns Based on Frequent Sequence Tree
LIU Jia-xin
2012, 198(2): 8-10. doi:
10.3969/j.issn.1006-2475.2012.02.003
Asbtract
(
617
)
Related Articles
|
Metrics
This paper proposes an incremental mining algorithm of sequential patterns based on frequent sequence tree, called ISFST, in order to solve the problem that the existed incremental mining algorithms can not make full use of the results of the previous mining, when the database is updated, the algorithms need to mine the database once again. ISFST uses the frequent sequence tree as the storage structure of the algorithm. When the database is updated, ISFST is divided into two kinds of situations to update the frequent sequence tree, and finally gets all sequential patterns. Experiments show that ISFST outperforms PrefixSpan and IncSpan in time cost.
Study of Automatic Scheduling Algorithm for Track and Field Sports 〖JZ〗Meeting in Colleges and Universities
WANG Qiu-fen;YUAN Dong-feng
2012, 198(2): 11-13. doi:
10.3969/j.issn.1006-2475.2012.02.004
Asbtract
(
619
)
Related Articles
|
Metrics
This paper analyzes the characteristics of scheduling for track and field sports meeting in colleges and universities, proposes an automation solving method about schedule of track and field sports meeting. The method is successfully implemented using C+〖KG-*2〗+ language. The experiments show that the method can give the athletes enough time to rest and attract viewers to watch matches. It reflects a kind of peopleoriented ideas.
Robot Task Allocation Method in Robot Soccer Match System
WANG Xing;YANG Yi-min
2012, 198(2): 14-18. doi:
10.3969/j.issn.1006-2475.2012.02.005
Asbtract
(
573
)
Related Articles
|
Metrics
According to the problem in multirobot task allocation method based on genetic algorithm, that the initial population generated randomly is not well characterized the whole solution space, and it’s easy to fall into local optimal solution, this paper proposes a new multirobot task allocation method. This method is based on the utility value of the robot to determine the individual’s genes, resulting in the initial population, and by hierarchical genetic algorithm different groups with different optimal genes are evolution separately. Simulation results show that this method has higher efficiency and faster convergence.
Power Load Forecasting Algorithm Based on Gene Expression Programming
XU Yun-yan
2012, 198(2): 19-21. doi:
10.3969/j.issn.1006-2475.2012.02.006
Asbtract
(
526
)
Related Articles
|
Metrics
This paper presents a power load forecasting algorithm based on gene expression programming (PLF-GEP), which combines theory of gene expression programming to improve precision of power load forecasting. PLF-GEP designed power load forecasting gene and fitness function for the characteristics of power load forecasting. Simulation experiments show that forecasting precision of PLF-GEP is improved about 99% in contrast with real precision.
An Improved Algorithm for Constructing Phylogenetic Tree
ZHANG Li-li;FENG Ping;GUO Ning
2012, 198(2): 22-25. doi:
10.3969/j.issn.10062475.2012.02.007
Asbtract
(
720
)
Related Articles
|
Metrics
Neighbor-joining method is one of the most effective methods based on distance data constructing phylogenetic tree.But its clustering process may neglect some more reasonable topological structure and cause low accuracy.In order to advance the accuracy of neighborjoining method, this paper proposes an improved method. The method uses neighbor-joining method to generate an initial tree, and then searches for the maximum-likelihood phylogenetic tree according to RF distance. The experiment results show that the improved method is superior to neighbor-joining method.
Research on ID3Decision Tree Classification Algorithm Based on MapReduce
QIAN Wang-wei
2012, 198(2): 26-30. doi:
10.3969/j.issn.1006-2475.2012.02.008
Asbtract
(
711
)
Related Articles
|
Metrics
Decision tree is widely used in data mining which is one of the typical classification algorithms. Traditional ID3 tree learning algorithms require training data to reside in memory on a single machine, so they cannot deal with massive datasets. To solve this problem, this paper analyzes the parallel algorithm of ID3 decision tree based on MapReduce model, then proposes a parallel and distributed algorithm for ID3 decision tree learning. The experimental results demonstrate the algorithm can scale well and efficiently process large-scale datasets on commodity computers.
A Text Clustering Algorithm for Short Message
WU Yong;XU Feng
2012, 198(2): 31-34. doi:
10.3969/j.issn.1006-2475.2012.02.009
Asbtract
(
570
)
Related Articles
|
Metrics
As to short message text clustering, this paper designs a hybrid clustering algorithm combining by frequent termsets and Ant-Tree algorithm. This algorithm takes the advantage of efficiency of processing text data based on the frequent termsets clustering, produces the initial cluster, then eliminates the overlap text documents by calculating silhouette coefficient. Further refines the cluster by Ant-Tree. Thus gets the high quality clustering results. And the results that retain the description and tree structure can provide wider applications.
Implementation of Real-time Filtering Algorithms DSP-based ECG Instrument
ZHU Xue-hui;LI Xiang-yuan
2012, 198(2): 35-37. doi:
10.3969/j.issn.1006-2475.2012.02.010
Asbtract
(
619
)
Related Articles
|
Metrics
This paper introduces the ECG(electrocardiogram) real-time filtering algorithms for power-line interference, electromyography noise, and base-line drift, and implemented by a digital signal processor on digital ECG instrument. In order to get high quality ECG signal, a notch filter is used to eliminate the power-line noise with base-line shift and a low-pass filter is used to eliminate the muscle noise. The experiment results prove that the filtering algorithms have the advantages of fast speed and effectual effect.
An Algorithm of Drawing Website Information Based on Webpage File Code
ZHAO Xiao-feng;LING Tian-bin;PENG Bo;WANG Zhuan-ni
2012, 198(2): 38-39. doi:
10.3969/j.issn.1006-2475.2012.02.011
Asbtract
(
517
)
Related Articles
|
Metrics
This paper designs an algorithm of drawing information through the analysis of webpage file code. The purpose of this paper is to obtain the website information automatically. First, it analyzes and ampares two kinds of website structure, then proposes the algorithm of drawing information on the two website structure, following this, realizes the algorithm with code taking the NHK website as an example, at the end, expects the information drawing system’s future on function expansion.
计算机仿真
Research on Software Reliability Prediction Simulation Modeling Based on Benchmarking Thinking
LIU Jun-hui;LI Na
2012, 198(2): 40-43. doi:
10.3969/j.issn.1006-2475.2012.02.012
Asbtract
(
515
)
Related Articles
|
Metrics
The quantitative assessment and the prediction of software reliability have become the focus of attention and research, because software reliability is an important characteristic of software quality. A software reliability prediction simulation model which can be used before software test is presented to study this problem. This simulation model examines factors which affects the process of software reliability and forecasts software reliability by means of the benchmarking thinking and the similarity of software process measurement data. The simulation model need only the support of the static historical data so that it can be used to estimate the number of remaining software defects before software testing, and forecast the software reliability which provides the basis for software process improvement and software test correction plan.
Research on Methods of Coordinate Rotation and Interpolation Based on Quaternion
LIU Ai-dong;HUANG Bin;LU Zhong-wu
2012, 198(2): 44-47. doi:
10.3969/j.issn.1006-2475.2012.02.013
Asbtract
(
579
)
Related Articles
|
Metrics
This paper first introduces the basic mathematical properties and calculation rules of quaternion, then describes a method of transfer vector among all the methods of coordinate rotation, which is based on quaternion, and three methods of interpolation of it, and compares with the Euler angle. The paper also discusses the different effects of these algorithms to the coordinate conversion, and the differences in the time complexity for computer to finish them, and draws conclusions by simulation.
Design and Implementation of Virtual Measurement for Interferometric
HU Shao-bin;ZHOU Li;TANG Si-bao;
2012, 198(2): 48-51. doi:
10.3969/j.issn.1006-2475.2012.02.014
Asbtract
(
556
)
Related Articles
|
Metrics
In order to achieve a pupose to virtual measure software program design for fiberoptic hydrophone, this paper uses characteristics of its output signals. Based on the nonNI acquisition card, the 3×3 coupler demodulation principle and its mathematical model are analysed and compared, and the interferometric fiberoptic hydrophone ITT virtual device detection program is designed. By calling a dynamic link library, the LabVIEWbased data collection program, the data processing and display program are developed, which makes up an ITT virtual detection system for fiberoptic hydrophone. Then, draws a conelusion that this virtual test system is of a good amplitude and frequency characteristics of the adaptive.
Prediction Model on Influence of Teacher Quantity on Teaching Result
HAN Wei;YUE Kui-zhi;YANG Fan;SHI Jian-guo
2012, 198(2): 52-55. doi:
10.3969/j.issn.1006-2475.2012.02.015
Asbtract
(
510
)
Related Articles
|
Metrics
This paper builts the stock and flow diagrams about every element of impacting on teaching result with the change of teacher quantity on the basis of system dynamics, establishes the prediction model about teaching result in college, and simulates with Vensim PLE 5.9 to solve the bad influence on the teaching experience and teaching result when the teacher quantity has changed in a college. The simulation test shows that the model can make prediction on the teaching result trend and provide theoretical evidence for making plan of hiring and firing teachers with consideration of teaching result.
计算机控制
Chaos Suppression Control for Freefloating Space Redundant Manipulator during Avoidance Singularity
YUAN Wen-chong;WANG Cong-qing;WU He-lei;LIU Xiu-chao
2012, 198(2): 56-60. doi:
10.3969/j.issn.1006-2475.2012.02.016
Asbtract
(
549
)
Related Articles
|
Metrics
A Generalized Jacobian Matrix of the freefloating space redundant manipulator is derived. The kinematics manipulable measuring for avoidance singularity is used as a target function based on gradient projection. Avoidance singularity planning is realized by joint space selfmotion in null space. Numerical computing results show the selfmotion is chaos state, which can be suppressed by state delayed feedback control. The joint movement is to stabilize a cyclic trajectory during avoidance singularity motion planning.
Research and Application of PLC Software Redundancy in Continuous Supply of N
2
ZHANG Xiao-hui;YUAN Min
2012, 198(2): 61-65. doi:
10.3969/j.issn.1006-2475.2012.02.017
Asbtract
(
539
)
Related Articles
|
Metrics
This paper introduces a lowcost PLC redundancy system——the application of Siemens PLC software redundancy in a continuous supply of N
2
. The paper also provides a detailed description and illustration for the composition of the system and the software configuration, finally it introduces the design and realization of the software redundancy programming.
图像处理
Color Image Quantization Algorithm Based on KD-tree and NBS Distance
HOU Yan-li
2012, 198(2): 66-68. doi:
10.3969/j.issn.1006-2475.2012.02.018
Asbtract
(
605
)
Related Articles
|
Metrics
Aiming at the problem of giving the number of quantization in advance and poor in-time performance of the conventional K-mean clustering, this paper proposes a color image quantization algorithm based on KD-tree clustering and NBS distance. Firstly, the original image is quantized using the middlecut algorithm. Secondly, based on the quantitative relation of the NBS distance and the color difference of human visual, the initial clustering centers and number are determined automatically. Thirdly, the K-mean clustering algorithm using the KD-tree data structure is applied to the color quantization, and then, a fast color image quantization effect is achieved. At last, simulations are performed on the presented algorithm, and the simulation result shows that the presented algorithm performs better in quantization effect and faster in running time.
Mineral Recognition Software Modules Development Based on Spectral Absorption Index
LI Hai-sheng;ZHOU Ping;HAN Meng-xiao;HUO Hong-yuan;CUI Yan-mei;GENG Ling-peng
2012, 198(2): 69-72. doi:
10.3969/j.issn.1006-2475.2012.02.019
Asbtract
(
618
)
Related Articles
|
Metrics
According to SAI mineral absorption index model (Jinnian Wang, 1996), this paper analyzes gold, copper spectral curves of the main alteration mineral parameters and quantifies their spectral absorption characteristics. The main quantitative indicators are as follows: SAI, absorption width, absorption depth, absorption position, absorption symmetry. Synthesizing the ENVI function and the IDL language based on ENVI platform develops alteration mineral extraction module MineralExtractModule. In addition the experiment proves that the module can be quickly and accurately identify mineralizationrelated alteration minerals using the spectral absorption features, so realizes the goal of using imaging spectroscopy to extract alteration minerals quickly and automatically.
Research on Application of Software Refactoring and Design Patterns in Camera Information-card Review System
XU Ting;SUN Yong;ZHANG Jian-min
2012, 198(2): 73-76. doi:
10.3969/j.issn.1006-2475.2012.02.020
Asbtract
(
567
)
Related Articles
|
Metrics
This paper designs and implements a camera-based informationcard review system, which consists of a series of image process operations such as image acquisition, converting RGB into grayscale image, binary image, optic aberrance revising, skew angle correction, locating and identifying of image. Then optimized and refactored the framework of the system according to the systematic research of software refactoring and design patterns. This paper makes full refers to design patterns and improves the quality of existing code by the refactoring technology, and increases the system’s maintainability and reusability.
数据库
Application of Modeling Technology in Design and Implementation of Manufacture Sale Service Management Information System Architecture
HUANG Jun-nan;LI Xiao-li;JIANG Mian-mian
2012, 198(2): 77-81. doi:
10.3969/j.issn.1006-2475.2012.02.021
Asbtract
(
571
)
Related Articles
|
Metrics
Management Information System has the history of 30 years, which is applies to various fields. In recent years, many software companies use the increasingly sophisticated modeling techniques to aid the design and development of software. To aid the design and realize the manufacturing industry sale service system framework by modeling technology and to design the corresponding data model, Which can break through the limitations of the system development expansion and extension. At the same time, mature data model plays a good guidance function to the related application and design, which has certain reference value and practical significance. Modeling technology in system development can play role in reducing development difficulty, enhance team communication skills, improve the efficiency of software development, improve software development portability advantages.
Implementation of Methods for Converting Word File Image into Database
WANG Xiang-ju
2012, 198(2): 82-85. doi:
10.3969/j.issn.1006-2475.2012.02.022
Asbtract
(
624
)
Related Articles
|
Metrics
This article starts with a Word file example and analyzes the issues about the Word file components, application interval of objects in VBA, Delphi supporting Word, designs a method of conversion between picture information in Word files and SQL server database. By this way information in Word files can be read automatically using a program, and picture information in Word files can be extracted and saved in relative database files. Testing results show automatic transformation method converting Word files with picture information to database become effective in OA process, implementing fast and high efficiency information conversion and improving efficiency.
Study of Text Classification Method Based on Rough Set and Improved KNN Algorithm
SHAO Li
2012, 198(2): 86-89. doi:
10.3969/j.issn.1006-2475.2012.02.023
Asbtract
(
531
)
Related Articles
|
Metrics
The KNN algorithm is a common method in the field of automatic text classification. It has high classification accuracy for texts with low dimensional vectors. However, when it deals with large numbers of highdimensional texts, the traditional KNN algorithm, due to the need to process considerable the training samples, result in increased similarity calculation and reduced classification efficiency. To solve ensuing problems, this paper uses the rough set method to reduce the attributes of decision table and remove redundant attributes, and then the improved clusterbased KNN algorithm is used to classify texts. Simulation results show that the method can improve the precision and accuracy rate of text classification.
Synchronization Technology of Distributed Database Based on Facade
JIANG Jie-bao;ZHOU Qi-yun;WEN Shui-sheng;ZHANG Ren-long;HU Bin
2012, 198(2): 90-91. doi:
10.3969/j.issn.1006-2475.2012.02.024
Asbtract
(
563
)
Related Articles
|
Metrics
Data synchronization is a key technology with distributed environment that each node keep data consistency of the database approach. This article for Oracle multidatabase application environment, proposes a similar facade for enterpriselevel database synchronization technology. It describes the basic working principle of transaction synchronization under distributed database, from database links, synonyms to transaction synchronization. In practice projects, it shows that a distributed database transaction based on facade is feasibility of the application and has good features.
Design and Development for Enterprise Human Resources Management System of Web Version
JIANG Dong-jie;CHEN Shan-shan
2012, 198(2): 92-94. doi:
10.3969/j.issn.1006-2475.2012.02.025
Asbtract
(
606
)
Related Articles
|
Metrics
The rapid development of network provides a good condition for the communication between employees and enterprises, the paper designs and develops a Web version of enterprise human resource management systems and passes the test operation, the system aims to make the enterprises manage the information of their employees effectively, make employees check their salaries and other information confidentially, and can make employees and enterprises communicate with each other freely on line by this system. Theoretic argument and example analysis demonstrate that the system is feasibility and validity.
Design and Implementation of Course Management System Based on Typed Dataset
ZHOU Zhi-peng;JIANG Yu-fang
2012, 198(2): 95-97. doi:
10.3969/j.issn.10062475.2012.02.026
Asbtract
(
718
)
Related Articles
|
Metrics
This paper describes how to develop a course management system in universities using Visual Studio 2008 IDE and C# programming language. It accesses database by typed dataset, supporting Windows controls data binding, using visual design tools to generate SQL query statement and definition of data view. These methods can reduce writing code and increase developing effeteness.
Application of Data Warehouse and OLAP in Preference Data Analysis 〖JZ〗on Communication Line State Statistics
LIU Shu-juan;YUE Peng
2012, 198(2): 98-101. doi:
10.3969/j.issn.1006-2475.2012.02.027
Asbtract
(
552
)
Related Articles
|
Metrics
In recent years, with the rapid development of the communication industry, more and more broadband accessed. Customers on the bandwidth and broadband quality put forward higher requirement, how to reduce the operation and maintenance costs, and improve network quality are the biggest problem for corporations. So corporations must have a whole understanding for the communication line state. As the above problems, this paper according to the enterprise to communication line state statistics demand, through the application of data warehouse and OLAP technology for the original communication lines state statistics the multidimensional data analysis, makes a practical scheme for line state statistical. This plan can offer reference in telecommunications companies in line state statistics.
网络与通信
High Performance TCP Vegas Revised Algorithm
LU Yao;CHEN Shu-yu;YAO Zhang-jun;LIU Xiao-wei
2012, 198(2): 102-107. doi:
10.3969/j.issn.1006-2475.2012.02.028
Asbtract
(
685
)
Related Articles
|
Metrics
Due to the slow-start phase of TCP Vegas stop prematurely and the adjustment cycle of congestion avoidance phase is too long, TCP vegas can not share the available bandwidth when it coexists with TCP Reno. Because Vegas is too conservative in a competitive environment, this paper proposes a TCP Revised Vegas algorithm of high-performance, this congestion window control algorithm uses a smoothing dispose and incremental factor, increases Vegas aggressive. Through numerical analysis and simulation experiments show that performance and fairness of the new algorithm are improved whether in the single environment or the mixed environment.
Research on Image Transmission Technology Based on ZigBee
SUN Xiao-dong;MO Guo-qing
2012, 198(2): 108-110. doi:
10.3969/j.issn.1006-2475.2012.02.029
Asbtract
(
661
)
Related Articles
|
Metrics
The emerging IEEE 802.15.4 (ZigBee) standard is used for low data rate, low power consumption and low cost wireless personal area networks (WPANs). Image transmission over such networks is considered an issue since image traffic contains a large amount of information that requires high data rates. ZigBee, in general, uses a single channel for data transmission. The aggregate throughput of ZigBee network can be improved by using multiple channels. The main focus of the paper is on the image transmission over ZigBee networks using multiple channels and multiple radio interfaces, which aims to improve the total throughput of networks. The results show that the image transmission over the proposed method is feasible.
Design and Implementation of Online Judge System
JIANG Hui;WANG Da-ju
2012, 198(2): 111-115. doi:
10.3969/j.issn.1006-2475.2012.02.030
Asbtract
(
612
)
Related Articles
|
Metrics
In the process of examining results of the college students, learning program design course, only the examination paper score can not reflect the true effect of students’ learning. The nature and features of program design course determines its evaluation measure——let students practice to test the learning effect. For this reason, on the basis of understanding and learning many automatic judge systems, this paper develops online judge system independently which can basically satisfy students’ based on practice learning.
Research on Loading Balance in Structured P2P Network
LOU Mei-ming;JIN Bo
2012, 198(2): 116-119. doi:
10.3969/j.issn.1006-2475.2012.02.031
Asbtract
(
575
)
Related Articles
|
Metrics
In structured P2P network, loading imbalance results in the problem of single failure, network congestion, request delay and even worst problems. This paper proposes an effective loading balance algorithm to prevent hot spots based on the analysis of requested datas and nodes processing difference. Through experiments and simultaed results, the proposed algorithm can effectively improve loading unbalance in structured P2P network.
Research on Trace Method Traversing Technology in OpenH323 Network Video Conference
CHEN Ming-dong
2012, 198(2): 120-123. doi:
10.3969/j.issn.1006-2475.2012.02.032
Asbtract
(
543
)
Related Articles
|
Metrics
Network video conference system is a collection of audio, video, data exchange as one method, audio and video for traversing firewall technology is one of the key technology of the realization of network video conference system. Audio and video firewall traversal techniques are to solve the port mapping problem between public and private network, in the limited test conditions without additional hardware and auxiliary equipment, efforts is mode to seek a solution and simulation test, finally, this paper proposes the firewall traversal trace method and successfully applies to the network video conference system. In heterogeneous network, it can realize the audio and video NAT firewall traversing, hold the vido conference with desktop level and large screen in the condition of lacking the bandwith resource, and achieves the effect of HD. It is successfully applies to a certain group video conferencing project, the operation effect is good.
Collision-avoiding for Real-time Communication in IEEE 802.15.4 Cluster--tree Networks
TANG Zhong;XU Fang-yuan
2012, 198(2): 124-127. doi:
10.3969/j.issn.1006-2475.2012.02.033
Asbtract
(
529
)
Related Articles
|
Metrics
Wireless cluster-tree networks can support real-time and deterministic communications. But for the device deployments in practical applications, communication collisions can occur between clusters and influence real-time performance of the systems. Based on IEEE 802.15.4 standard, this paper studies the collision problem of real-time communication in wireless clustertree networks, proposes a superframe collision avoiding mechanism between clusters. The example analysis shows that the algorithm can solve the collision of real-time communications in wireless cluster-tree networks and improve performance.
A Method of Web Page Purification Based on Single Model
GAN Wen-min;LI Jun;LI Jian
2012, 198(2): 128-130. doi:
10.3969/j.issn.1006-2475.2012.02.034
Asbtract
(
543
)
Related Articles
|
Metrics
In order to obtain and handle with the information in Web pages effectively, this paper proposes the algorithm of Web page purification based on improved DOM tree and BP neural network.This algorithm establishes block tree by DOM tree and Web content using HTMLParser.Because of the evident numerical characteristics in subblocks of Webpages, it can establish noisy purifymodel by BP neural network. As a result, it can make the Webpage purification more modelling, also it can get a more effective result.
Research and Implementation of Website Framework for Asynchronous Data Transmission
ZHANG Yue;LIU Wen-bin
2012, 198(2): 131-134. doi:
10.3969/j.issn.1006-2475.2012.02.035
Asbtract
(
529
)
Related Articles
|
Metrics
As the Ajax framework does not have unified standard, programming complexity, does not meet the W3C standards and other issues, this paper presents a set of documentbased object model and a JavaScript website framework for asynchronous data transmission. The framework program is simple, data transmission is high efficient, full compliance with W3C standards. Test results show that, the framework is of following features, such as excellent asynchronous data transmission for webpage request, platformindependent, good scalability, high security, and which can be easily applied in different types of Web applications.
Application of Critical Path Method in Risk Management System for Large Aircraft Project
TAO Yun-shuang
2012, 198(2): 135-138. doi:
10.3969/j.issn.1006-2475.2012.02.036
Asbtract
(
532
)
Related Articles
|
Metrics
By identifying the critical path, people can effectively identify the key activities that impact the project progress. Taking appropriate human and material resources and allocate them to key activities can shorten the project duration. This paper first analyzes the importance of using risk management in large aircraft project. Then it introduces how to find out the critical path in a Gantt graph generated by Microsoft Project from the perspective of data structures and algorithms, verifies the method by two examples. Finally, the paper analyzes the insufficient of CPM and proposes some suggestions about how to improve it.
Analysis and Debugging Technique in Application of High-speed Transceiver Logic
WEI Wei;LI Li;TANG Zhen
2012, 198(2): 139-141. doi:
10.3969/j.issn.1006-2475.2012.02.037
Asbtract
(
572
)
Related Articles
|
Metrics
This article mainly analyzes the internal structure and the principle of high-speed transceiver logic. Based on high-speed transceiver logic application in the agglutinative RF acquisition system, from application and debugging of this interface, the paper puts forward some problems and solutions which should pay attention to, and eventually gets the correct simulation waveform.
Research and Implementation of External Equipment 〖JZ〗Data Transmission Based on B/S Structure
HU Bin;ZHOU Qi-yun;ZHANG Ren-long;WEN Shui-sheng;JIANG Jie-bao
2012, 198(2): 142-144. doi:
10.3969/j.issn.1006-2475.2012.02.038
Asbtract
(
577
)
Related Articles
|
Metrics
This paper proposes three external equipment data transmission methods based on B/S structure, HTTPbased data transmission, anticonnection based on FTP, based on OCX, discusses the basic principles of realization and compares them on transmission performance and transmission quality, the results of experiments show that the method based on OCX is better than others, and it is successfully applied to the marketing management platform of municipal utilities group.
Research on Access Control Policy Description Method Based on Ponder2 Language
ZHOU Jie;YU Ming-gang
2012, 198(2): 145-148. doi:
10.3969/j.issn.1006-2475.2012.02.039
Asbtract
(
524
)
Related Articles
|
Metrics
Currently, Ponder2 policy language mainly applies on QoS of network management, but the research of security is fewer.This paper analyzes the description method of obligation policy in Ponder2. Combining the character of access control policy, an access control policy description method based on Ponder2 language is proposed.
Design and Implementation of Remote Disaster Tolerant System
LIU Dong;XIA Qing-guo;ZHANG Yan-geng
2012, 198(2): 149-152. doi:
10.3969/j.issn.1006-2475.2012.02.040
Asbtract
(
554
)
Related Articles
|
Metrics
This paper designs and implements a remote disaster tolerant system, the system uses a structure which combines local tolerant system with remote tolerant system, separates services and storage, it uses local control center as event processing center and data forwarding cache. In addition, it schemes with synchronization and asynchronism for data backup, ensures data integrity and reliability, it uses staged deployment failure detection to detect system, and uses dynamic failure detection algorithm to reduce the erroneous decision and accelerate the speed of service restoration. Through tests, the system’s data recovery and service switching have been significantly improved. In practical application, the system runs stable, performs well and reaches a high level of disaster tolerant system requirements.
信息安全
Research on Differential Power Analysis Attack Technology for AES
ZHOU Guo-xin;YIN Hui-lin
2012, 198(2): 153-155. doi:
10.3969/j.issn.1006-2475.2012.02.041
Asbtract
(
614
)
Related Articles
|
Metrics
This paper gives the realization of differential power analysis attack of the decrypt encrypted circuits with DES. And the paper also gets the key of AES on the AtmelAES plat by using DPA attacks. The paper confirms the vulnerability of the AES algorithm facing the PDA attacks. And it is very necessary to improve the performance of the antiDPA attacks of AES.
Study on System and Model of Coordinated Defense for Campus Network Security
PANG Cong;HAN Xiu-ling
2012, 198(2): 156-160. doi:
10.3969/j.issn.1006-2475.2012.02.042
Asbtract
(
618
)
Related Articles
|
Metrics
Aiming at the security issues of the new style campus network, this paper proposes a multilevel and stereoscopic systems scheme of collaborative defense for campus network security. Based on the scheme, in combination with the latest distributed firewall and intrusion detection systems, actually built the corresponding coordinated defense model. After the integration of Agent technology, the communication protocol between the various security subsystems are respecification and redesign. Studies show that the model is feasible, and thereby the safety of the campus network is ensured to the maximum.
Research on Large Aircraft Project Risk Monitoring and Design of System
XU Wen-long
2012, 198(2): 161-164. doi:
10.3969/j.issn.1006-2475.2012.02.043
Asbtract
(
599
)
Related Articles
|
Metrics
When the project risks are identified, it needs to track and control them, and monitor their development situations. The risk monitoring process is an important part of a successful implementation of risk management. This paper studies the relevant contents of project risk monitoring process, and designs a risk monitoring subsystem using the comprehensive risk monitoring scheme, and finally gives an application example.
Design and Realization of Dynamic Rule Sets of Snort Based on Threshold of Statistics
REN Bing-zhong;KONG Wen-huan
2012, 198(2): 165-167. doi:
10.3969/j.issn.1006-2475.2012.02.044
Asbtract
(
604
)
Related Articles
|
Metrics
Snort is an opensource intrusion detection system. It detects intrusion with the static rule sets. The paper analyses the rationale and model of intrusion detection system. It introduces how to configure the static rule sets of Snort, describes a method of making dynamic rule sets according to the threshold of statistics flow and the threshold of alert frequency, this method improves and enhances the deployment of flexibility Snort should have.
Research on Obfuscation Technique Based on Branch Functions
CAO Shu-qin;ZHENG Cheng-long
2012, 198(2): 168-170. doi:
10.3969/j.issn.1006-2475.2012.02.045
Asbtract
(
540
)
Related Articles
|
Metrics
The process of reverse engineering is an executable program typically begins with static disassembly that translates machine code to assembly code, which creates opportunities for theft of intellectual property and discoveries of vulnerabilities of the program. In order to disrupt the static disassembly process so as to make programs harder to disassemble correctly, after a deep research on the static disassembly obfuscation technique based on branch functions and its weakness on invisibility and code execution speed, this paper proposes an improved obfuscation technique based on branch functions which not only can hide the jump instructions efficiently but also enhance the code execution speed, and make the analysis of reverse engineering more difficult at the same time.
Research on Obfuscation Technique Based on Branch Functions
CAO Shu-qin;ZHENG Cheng-long
2012, 198(2): 168-170. doi:
10.3969/j.issn.1006-2475.2012.02.045
Asbtract
(
394
)
Related Articles
|
Metrics
The process of reverse engineering is an executable program typically begins with static disassembly that translates machine code to assembly code, which creates opportunities for theft of intellectual property and discoveries of vulnerabilities of the program. In order to disrupt the static disassembly process so as to make programs harder to disassemble correctly, after a deep research on the static disassembly obfuscation technique based on branch functions and its weakness on invisibility and code execution speed, this paper proposes an improved obfuscation technique based on branch functions which not only can hide the jump instructions efficiently but also enhance the code execution speed, and make the analysis of reverse engineering more difficult at the same time.
应用与开发
Research and Implementation of Web-based Information Dissemination System
XIA Da-wen
2012, 198(2): 171-175. doi:
10.3969/j.issn.1006-2475.2012.02.046
Asbtract
(
539
)
Related Articles
|
Metrics
In view of the existing problems of static information dissemination and management in Egovernment websites and based on studies of system need analysis, system general design, system programming, system security and key techniques, this paper realizes a Webbased information dissemination system by employing B/S+LAMPP for application, which will satisfy the effective information dissemination and management of Egovernment and also enhance the efficiency of information business and convenience in service of government.
Parallel Computing of Dynamic Pattern Recognition Based on OpenMP
SUN Shan
2012, 198(2): 176-179. doi:
10.3969/j.issn.1006-2475.2012.02.047
Asbtract
(
545
)
Related Articles
|
Metrics
Given that the realization of dynamic pattern recognition of deterministic learning theory is timeconsuming, a multicore parallel computation technique suitable for recognition process is proposed. Firstly, based on the classical Mansoux compressor model, the acquirement of patterns and the process of recognition are described in brief. Secondly, parallel computing is applied to dynamic pattern recognition by using OpenMP programming on four cores PC hardware platform. Factors which influence the performance of program are discussed by setting different thread numbers. The result shows that the only way to design parallel recognition program with high performance is taking kinds of elements into account.
Design and Implementation of Energy Conservation Management 〖JZ〗Platform Based on .Net & Ajax
ZHOU Li-jie
2012, 198(2): 180-184. doi:
10.3969/j.issn.1006-2475.2012.02.048
Asbtract
(
523
)
Related Articles
|
Metrics
The Energy Conservation Supervision Information Management Platform(ECSIMP) is summarized. Using .Net framework and Ajax technology and 3-tier access framework, a prototype of ECSIMP is designed successfully. The overall planning, main function and specific implementation are given. The advantages of asynchronous processing are fully utilized, so that high quality service can be provided for users.
Design of Intelligent Gobang Based on Xcode
WANG Ting;YU Jin-ke;
2012, 198(2): 185-186. doi:
10.3969/j.issn.1006-2475.2012.02.049
Asbtract
(
675
)
Related Articles
|
Metrics
AI(Artificial Intelligence) is a kind of newly emerging frontier science that is developed from many sciences’ interinfiltration, in this field often is studied on game playing.This paper uses Xcode as development tool, according to the algorithm of game playing tree’s heuristic researching, designs a game of gobang, realizes game playing between human and computer.
Programmable Auto-transformation from MS Word to PDF
HU Xiao-yan;LIU Pei-xun;LIU Li-qiang
2012, 198(2): 187-189. doi:
10.3969/j.issn.1006-2475.2012.02.050
Asbtract
(
663
)
Related Articles
|
Metrics
Microsoft Word is largely applied in editing documents in daily work. But the documents of PDF format is favored by file clerk and publisher for its character, such as security, platform independence and so on. This paper introduces a method of transformation from MS Word to PDF manually. And then it summarizes the principle of the transformation briefly. In order to convert MS Word format documents to PDF automatically and large, the process of creating transformation component and program for different application is presented in detail.
Design of Marine Beidou Avigation Terminal Based on Android
LONG Chang-sheng;CHEN Shu-yu;XIA Fan
2012, 198(2): 190-193. doi:
10.3969/j.issn.1006-2475.2012.02.051
Asbtract
(
525
)
Related Articles
|
Metrics
This paper mainly introduces the research of marine Beidou navigation terminal, using the S3C6410 ARM11 development board, Linuxbased Android open source operating system, and the Beidou positioning system receiver. Designs a marine navigation software to receive location information and extract the location data, providing marine navigation parameters to achieve the analysis and calculations.
SSH Codes Generating Based on MDA
XING Hai-hua;SHI Bing;HU Yuan
2012, 198(2): 194-197. doi:
10.3969/j.issn.1006-2475.2012.02.052
Asbtract
(
648
)
Related Articles
|
Metrics
In recent years, as the development of software developing technologies, the software development steps are more standardized than ever before, which makes the management and maintenance more convenient, but it also brings an unavoidable problem: developers have to write more repeated code, one good example of which is the software development based SSH. To solve this problem, this article proposes a new code generating method called sMDA base on MDA(Model Driven Architecture) and framework of SSH. sMDA solves the problem of writing repeated code which are copied and pasted again and again. sMDA will generate key codes of system automatically, while codes are copied and pasted in the past.
Design of Wireless Pulse Signal Monitoring System Based on STM32
LI Miao-miao;DONG Qi
2012, 198(2): 198-201. doi:
10.3969/j.issn.1006-2475.2012.02.053
Asbtract
(
703
)
Related Articles
|
Metrics
Pulse signal contains important information of heart and blood vessels status. At present, China’s for cardiovascular disease monitoring to cable way, have bulky and expensive shortcomings, not easy to community health and family health care. This paper integrates application of mobile communication technology, embedded technology and electronic information processing technology, develops a visualization, wireless pulse monitoring system. The system includes pulse transducer, intelligent terminal users and remote monitoring center three parts. Pulse sensors collect pulse signal; intelligent terminal processes, and storages signal, with GPRS to finish data upload and receiving; remote monitoring center analyzes data, and uploads terminal diagnosis and recommendations issued by wireless means to user terminals. This system can be used as a family care and remote medical auxiliary equipment, it is suitable for the community and the family health care, so it have broad application prospect.
Research and Application of OLAM Based on SQL Server
WANG Wan-chuan;WU Chen
2012, 198(2): 202-206. doi:
10.3969/j.issn.1006-2475.2012.02.054
Asbtract
(
614
)
Related Articles
|
Metrics
OLAM (On-line Analytical Mining) is current hot technology and a new mining method which fuses the advantages of OLAP and data mining. This paper focuses on the OLAP and data mining technology which are the core technologies and primary content of business intelligence. OLAM is introduced on the basis of the two technologies, and the basic principles and core technologies are expounded. A data warehouse for a business case is built based on SQL Server platform, and a sales cube is built by OLAP using Analysis Services. The combination of OLAP and clustering mining is realized by means of OLAM model, the conclusion is that a good clustering result of customer is obtained with the aid of superiority of OLAP and clustering mining.