Loading...

Table of Content

    21 September 2012, Volume 1 Issue 9
    软件工程
    Study on Design of Collaborative Platform About Virtual Enterprise in Aviation Industry
    TAN Guo-qiang;ZHANG Dan-ping
    2012, 1(9):  1-3.  doi:10.3969/j.issn.1006-2475.2012.09.001
    Asbtract ( 384 )  
    Related Articles | Metrics

    Production planning and control of aviation manufacturing virtual enterprise depends on the enterprise information collaboration of the Union. The mechanisms and path can be achieved by virtual enterprise collaboration platform which transfer knowledge and technology among different enterprises of aviation manufacturing network. CSSCM platform is designed to provide business services and project services. Its main functions are protecting the transfer of the global information and sharing information, control and maintain internal information. In particular, its functions of collaborative management organically combine with distributed collaborative project management and collaboration support technology. Further more, it effectively protects the processing and transmission of information among virtual aviation manufacturing enterprises.

    Design and Realization of VFP-based Registration and Examination System for Art-majored
    YU Ning;LI Shao-jing;WU Qing-xue
    2012, 1(9):  4-7.  doi:10.3969/j.issn.1006-2475.2012.09.002
    Asbtract ( 477 )  
    Related Articles | Metrics
    This paper focuses on the building of VFP-based registration and examination system for art-majored, the program combines the reality of the student recruitment in art-majored of higher learning institutions, specially focusing on the recruitment features and requirement. With the help of the powerful data management function of VFP, this system realizes an integrated management system with functions of registration information, examination arrangement, printing of applicants ID and score statistics. It improves the efficiency of recruitment.
    Design and Implementation of Integrated Management System for Classified Protection in Power Industry
    HUANG Bin;GU Wei-min;LIU Xing
    2012, 1(9):  8-11,1.  doi:10.3969/j.issn.1006-2475.2012.09.003
    Asbtract ( 437 )  
    Related Articles | Metrics
    The implementation of classified protection, including classification, registration, evaluation and rectifications, has been done in connection with important business system in power industry. The above process generates large amounts of data. This paper designs a management system platform to support the classified protection related work in power industry, and introduces its application module architecture, functional modules, deployment, and application advantages.
    Metrics Model of Object-oriented Software Maintainability Based on Code
    LI Gui-gen;ZHU Xiao-dong;WANG Yi-gang
    2012, 1(9):  12-15.  doi:10.3969/j.issn.1006-2475.2012.09.004
    Asbtract ( 514 )  
    Related Articles | Metrics
    Aiming at the outstanding problem which is difficult to measure the software maintainability at present time, based on detailedly expounding on the concept and connotation of software maintainability, guided by the ISO/IEC 9126, the metrics model of object-oriented software maintainability is built. The model includes four sub-identity models of maintainability and a colligation model to the sub-identity, the model can quantificationally figure out the software maintainability. Finally, the example verifies that the model is scientific and reasonable.
    Design and Implementation of Lighning Disaster Risk Assessment Software Based on Eclipse RCP
    ZHU Chuan-lin;ZHANG Qian;YANG Zhong-jiang;YU Hong;WANG Xiao-fei;YU Tian-ye
    2012, 1(9):  16-19,2.  doi:10.3969/j.issn.1006-2475.2012.09.005
    Asbtract ( 461 )  
    Related Articles | Metrics
    A lightning disaster risk management system is developed, which based on the theory IEC62305 and the actual case of lightning disaster risk assessment. It is developed by Eclipse RCP technology for the first time. The software joins the lightning database module and establishes a lightning database, which includes all provinces of China, and realizes automatic storage and inquiry of lightning data. Lightning frequency maps and whisker plot are drawn automatically by the JFreeChart technology. In addition, the contour of the lightning intensity and density can be drawn through the combination of the secondary development ArcGIS. The parameters of management module can make the software more practical, and evaluators can manage the parameters as needed. The practice shows that the software is practical.
    Data Center Architecture Adapted to Complex Application Based on Cloud Computing Platform 
    SUN Guo-hui;SU Wen;SUN Na
    2012, 1(9):  20-26.  doi:0.3969/j.issn.1006-2475.2012.09.006
    Asbtract ( 342 )  
    Related Articles | Metrics
    With the rapid development of cloud computing, a new data center is gradually founded on cloud computing platform. In order to build a data center based on cloud computing platform which meets computing-intensive, data-intensive, transaction-intensive, and others such as various types of application requirements at the same time, on the basis of a brief introduction of cloud computing, this paper proposes a new processing architecture for complex applications system, describes technologies about the construct of data center related to virtualization support environment, large data storage management, resource management, multi-mode operating environment, and high reliability management in order to achieve flexible scheduling and make full use of various resources.
    Design and Realization of Simulative Training System for Fire Fighting Operators
    DING Xiang-guo
    2012, 1(9):  27-29.  doi:10.3969/j.issn.1006-2475.2012.09.007
    Asbtract ( 445 )  
    Related Articles | Metrics
    This paper analyzes the current situation of simulative training system of fire fighting operators, describes the necessity of establishing simulative training system of fire fighting operators. The framework of the system is provided, and the operation flow of the system is introduced, the simulative training system of fire fighting is achieved. The system provides a new and useful training tool for fire fighting operators to improve the effectiveness and accuracy of fire fighting command and dispatch, which responses to emergencies in a non real-time environment.
    Application of UML Modeling in University Community Management System
    TANG Li-jun;CHEN Xu
    2012, 1(9):  30-32,3.  doi:10.3969/j.issn.1006-2475.2012.09.008
    Asbtract ( 463 )  
    Related Articles | Metrics
    Using UML modeling tools, this paper conducts a detailed analysis of the functional model of university community management system, gives the object-oriented analysis methods and models. It provides reference and draws lessons for object-oriented software development using UML modeling techniques.
    Research on Bank Assets Information Management Platform Based on Contract Management
    ZHANG Kai;ZHOU Qi-yun;ZHANG Guang-he
    2012, 1(9):  33-35.  doi:10.3969/j.issn.1006-2475.2012.09.009
    Asbtract ( 566 )  
    Related Articles | Metrics
    With the development of computer and communication technology, more and more hardware devices and equipments of computer and communication as well as related applications softwares are widely used in bank, the processing speed and efficiency of the bank have been greatly improved and the great conveniences are acquired to both of bank and customer. However, one of the most important problems is how to effectively manage these hardware and software products (i.e. assets). This paper proposes a solution to build the bank asset information management platform based on Client/Server (C/S) model and contract management, the platform collects the raw data at first, and then classifies and analyzes them. The solution has been utilized to implement the platform for Jiangxi Province Rural Credit Cooperatives for managing assets.
    Design and Implementation of Floating Population Management Information System
    ZHENG Zong-miao;WANG Guo-ming
    2012, 1(9):  36-40.  doi:10.3969/j.issn.1006-2475.2012.09.010
    Asbtract ( 449 )  
    Related Articles | Metrics
    Aiming at the characteristics of the population, distribution and management issues, a floating population management information system of integrating network technology and computers management information technology is put forward. The system achieves effective management of the floating population, a better solution to the management of visiting floating population’s home for registration, the work is intensity and low efficiency. In view of the Java language good properties and wide application, the architecture of the system is B/S ( Browser/Server ), and the system is developed with Java language, mainstream SSH (Struts+Spring+Hibernate ) framework and Oracle database. 
    Design and Realization of Meteorological Information Platform Based on RIA WebGIS Open Source
    LI Xian-feng;LU Wei;DENG Wei-hua;ZHOU Xue-ying
    2012, 1(9):  41-44.  doi:10.3969/j.issn.1006-2475.2012.09.011
    Asbtract ( 430 )  
    Related Articles | Metrics
    The open source software and the technology of FLEX are described first. A solution of RIA WebGIS system is proposed. The framework structure and implementation mechanisms of this system are elaborated. Then a real-time display platform of meteorological information of automatic weather stations in Jiangxi province is developed based on the RIA WebGIS framework. The front part of the system is developed using Flex and OpenScales; the map service is based on GeoServer; PostgreSQL/PostGIS is used for the spatial database. In this system, inquire, real-time display of the meteorological elements, and the general GIS functions are achieved.
    计算机控制
    Design and Implementation of Greenhouse Temperature 
    JIN Xiao-long;GUO Bin;MENG Xiao-yan
    2012, 1(9):  45-48.  doi:0.3969/j.issn.1006-2475.2012.09.012
    Asbtract ( 339 )  
    Related Articles | Metrics
    Greenhouse, works as a “factory”, is playing an increasingly important role in agricultural modernization. The temperature and humidity measurements are the key to accurate greenhouse monitoring system, and agricultural production and quality is determined by monitoring system. SPCE061A is selected as the core of information processing, and the sensing node is designed by DS18B20 and HS1101. It can measure the greenhouse temperature and humidity manually and automatically, display by 1602 LCD and playback voice. Comparing with thermometer and hygrometer, the result shows that the design is accurate and reliable, and may lead to lower labor intensity, increase the production and quality of greenhouse.
    Research on Active Control of Earthquake-excited Buildings Structures Based on Fuzzy Supervisory Technique
    WANG Liang-min;CUI Qi-ming;FANG Ming-xing
    2012, 1(9):  49-53.  doi:10.3969/j.issn.1006-2475.2012.09.013
    Asbtract ( 393 )  
    Related Articles | Metrics
    According to the problem of active control of earthquake-excited buildings structures, this paper introduces the fuzzy supervisory technique. This method has the hierarchical structure, including a controller at the high level and several sub-controllers used to reduce the story-drift. A fuzzy supervisor appropriately tunes the predesigned control gains at every moment by estimating the state of structure through the fuzzy inference mechanism. The improved seismic control performance can be achieved by converting a simply designed static gain into a real-time variable dynamic gain through a fuzzy tuning process. In the section of sub-controller design of the paper, actuators saturation state is fully considered, and a three-story of shear building structure model is given as an example. Finally the fuzzy rules applied and Matlab simulations are performed to prove the effectiveness and validity of the proposed control strategy.
    Study on SPLL of Grid-connected PV Generation System
    LI Wen-jie;SUN Zhi-yi;HE Qiu-sheng
    2012, 1(9):  54-56,6.  doi:10.3969/j.issn.1006-2475.2012.09.014
    Asbtract ( 417 )  
    Related Articles | Metrics
    Grid-connected PV system is one of the technologies to use the solar energy. Grid-connected inverter is a core part of linking the grid. In order to make the output current of grid-connected inverter track the grid voltage fundamental and complete the Genlock, this paper uses 1kW single-phase photovoltaic grid-connected inverter as research platform. The paper describes the working principle of the photovoltaic grid-connected inverter and the system architecture. It analyzes the control technology of grid-connected inverter and proposes a software phase-locked loop of a dual-park phase detector based on coordinate transformation. At last it verifies the feasibility of this method by Matlab simulation.
    Design and Application of Temperature Measurement System Based on Machine Vision
    LI Ning;WANG Ren-huang;LIU Xiao-feng;ZHU Ying;LI Yi-yue
    2012, 1(9):  57-60.  doi:10.3969/j.issn.1006-2475.2012.09.015
    Asbtract ( 443 )  
    Related Articles | Metrics
    Temperature data acquisition circuit based on platinum resistance, which is constantly used in temperature control system, is complex, weak on anti-jamming capability and low measuring accuracy, and its linear fitting of platinum resistance is very troublesome. This article describes a temperature measurement system to read the mercury thermometer automatically based on machine vision, designed on VC+〖KG-*3〗+6.0 platform. By applying some effective image processing algorithms, the temperature measurement system has resolution of 0.01℃, measures accurately and workes reliably. The temperature measurement system has been successfully applied in the temperature control experiment of large time-delay and large inertia.
    人工智能
    Attribute Value and Attribute Reduction Method Based on Consistent Decision Tables
    WAN Fang;DENG Shao-bo;CHEN Lian;LIU Qing;
    2012, 1(9):  61-64,1.  doi:10.3969/j.issn.1006-2475.2012.09.016
    Asbtract ( 368 )  
    Related Articles | Metrics
    As for the consistent decision table, this paper proposes a new method of data reduction. Compared with traditional data reduction method, this paper considers the relation between attribute reduction and attribute value reduction, that is, the method firstly gives attribute value reduction, and then conducts attribute reduction, last this paper proves it. However, lots of general method of data reduction, they dont consider the relation and much redundant operations.
    Concept Semantic Similarity Calculation Based on Bayesian Network
    WANG Tao;CHEN Hong-ying
    2012, 1(9):  65-68,1.  doi:10.3969/j.issn.1006-2475.2012.09.017
    Asbtract ( 463 )  
    Related Articles | Metrics
    Concept semantic similarity is an important content in knowledge representation and information retrieval, and a critical part in natural language processing, also a problem to be solved in the field of artificial intelligence. This article is about improving traditional similarity calculation model on the basis of ontology, and puts forward a kind of probability reasoning method to improve effect that is the calculation of the semantic distance between concepts, in order to perfect result about semantic similarity calculation model, meanwhile, uses D-separation to solve computational complexity in the reasoning process.
    网络与通信
    Implementation of Packet Data Service for Digital Trunked System Based on Model Design
    ]WANG Lin;MA Yue;YAN Chu-ping
    2012, 1(9):  69-72,1.  doi:10.3969/j.issn.1006-2475.2012.09.018
    Asbtract ( 434 )  
    Related Articles | Metrics
    To solve the problem that transfer multi-data like images, videos in digital trunked communication system, the air interface protocol stack of digital trunked is analyzed deeply, and the sub-network dependent convergence protocol (SNDCP), which is the provider of packet data service, is researched. Then, the dependent function model of the protocol is designed and coded based on model design. In developing, IBM Rational Rhapsody which is a develop tool based on UML is used to make the develop program easy and clear. At last, parameters and sequence of the protocol are proved to be compliance with the protocol standard of digital trunked communication system by making conformance tests to the protocol.
    Design and Implementation of Multi-function USB 2.0 Hub
    MENG Zhi-da
    2012, 1(9):  73-75,1.  doi:10.3969/j.issn.1006-2475.2012.09.019
    Asbtract ( 440 )  
    Related Articles | Metrics
    In the application of many digital products, there are common problems that PC Universal Serial Bus (USB) connectors are relatively insufficient and each digital card matches to its specific reader. To solve these problems, the chips of FE1.1S and AU6437 are used to design a set of multi-function USB hub which includes a connector of SD card and micro SD card, respectively, and two standard USB connectors. After testing, the hardware of this design has perfect functions and stable performances, which meets Universal Serial Bus Specification revision 2.0. It is believed that this study provides some references and proofs to the design of multi-func tional high speed reader.
    Performance Comparison and Analysis of Ad Hoc Routing Protocols Based on NS2 Simulations
    GAO Lei
    2012, 1(9):  76-78,8.  doi:10.3969/j.issn.1006-2475.2012.09.020
    Asbtract ( 407 )  
    Related Articles | Metrics

    Mobile Ad Hoc network is a dynamic temporary mobile node self-organizing network. Routing protocols have been the key issues of Ad Hoc network research. Performance comparison and analysis of Ad Hoc routing protocols based on NS2 network simulation software in a number of different situations is carried on. This paper achieves the advantages and disadvantages of different routing protocols in different scene, as well as the right network environment to apply.

    A Complementary Proportional Fair Arithmetic for LTE Uplink
    QIU Run-he;;MA Jun-shuo;;GONG Chang-hao;
    2012, 1(9):  79-82.  doi:10.3969/j.issn.1006-2475.2012.09.021
    Asbtract ( 436 )  
    Related Articles | Metrics
    As the LTE standard of the third generation of the mobile communication system being its background, this paper carries out a research on the arithmetic of resource distribution for LTE uplink. It makes an analysis and comparison of advantages and disadvantages of the arithmetic proportional fair, puts forward a complementary proportional fair transposition arithmetic, which can judge the service quality of the RB resource currently distributed to the user and re-distribute the RB resource which is of a lower quality. The simulation shows that the complementary transposition arithmetic is able to seek a favorable balance between the throughput of system and user equity.
    Simulation and Performance Comparison of TCP Routing Protocol in Ad Hoc Based on NS2
    ZHANG You-fang;ZHOU Li
    2012, 1(9):  83-86.  doi:10.3969/j.issn.1006-2475.2012.09.022
    Asbtract ( 399 )  
    Related Articles | Metrics
    In recent years, the Ad Hoc network has been paid extensive attention, due to its characteristics of uncenter and self-organization. First this paper introduces three typical routing protocols AODV, DSDV, DSR, and the principles of them; then, adopts the NS2 simulation platform to simulate the model of three typical routing protocols. The traffic model is FTP application of TCP agent, while the tradition usually uses UDP agent. Two types of scene are set by changing the number of nodes and the paused time of the node in the network respectively. Finally, by comparing the simulating result of end-to-end delay, routing overhead, packet delivery ratio performance are simulated, and the comparison conclusion is provided.
    Research and Implementation of Wireless Mesh Network Management System Based on VxWorks
    TANG Jing;YAN Chu-ping
    2012, 1(9):  87-92.  doi:10.3969/j.issn.1006-2475.2012.09.023
    Asbtract ( 462 )  
    Related Articles | Metrics
    Aiming at the requirement and features of wireless Mesh management, a design of wireless Mesh management system based on the VxWorks real-time operating system is put forward. The management system combines command-line interface, Web browser and SNMP management, and divides the SNMP management architecture to 3 layers, which reduces the bandwidth burden and makes the system easier to operate. Part of the procedure of network management development on VxWorks operating system and some related techniques are described. Finally, the feasibility and correctness are demonstrated through implementation and experiment.
    Establishment of E-campus Governance System Based on ITIL
    WU Hui-yun;WANG Hai-wei;WANG Yu-ping
    2012, 1(9):  93-96.  doi:10.3969/j.issn.1006-2475.2012.09.024
    Asbtract ( 384 )  
    Related Articles | Metrics
    At present, lots of colleges and universities are exploring the IT governance, but there is no “best practice” which is ready to be used. This article puts forward a solution of ITIL-based service system to operation and maintenance of E-campus and makes a specific deployment and implementation, which is close to the line of the ITIL standards and methods, and with the consideration of the status of the school operation and maintenance services.
    信息安全
    Design of Wireless Smart Safe and Protect System Based on ZigBee Technology
    LI Zheng-min;ZHANG Xing-wei
    2012, 1(9):  97-100,.  doi:10.3969/j.issn.1006-2475.2012.09.025
    Asbtract ( 459 )  
    Related Articles | Metrics
    In order to realize wireless real-time monitoring of the family safe and protect, this paper designs a wireless smart safe and protect system base on ZigBee technology. ZigBee wireless sensor network consists of CC2430 transceiver module and various detection sensors. Sensors collect the signal spread to PXA270 master control module by CC2430 transceiver module. According to the nodes signals, the host determines emergencies and informs the owner through the GPRS and Internet modules.At the same time, the system drives the camera to shoot images at the scene, and gives the alarm by sound and light.This design implements the family fire control, security alarm and remote transmission control. Test shows that this system is of alarm response fast, high reliability, easy to expand as well as easy to promote use.
    File Encryption System Based on Triple DES and RSA
    HU Zhen
    2012, 1(9):  101-105.  doi:10.3969/j.issn.1006-2475.2012.09.026
    Asbtract ( 439 )  
    Related Articles | Metrics
    Comparing the characteristics of symmetric cryptography and asymmetric cryptography, this paper outlines the basic principles of the Triple DES algorithm and the RSA algorithm. On the basis of a detailed analysis of issues related to file security and in-depth study on .NET Framework encryption algorithm class, this paper proposes the file encryption scheme on the combination of the Triple DES algorithm and the RSA algorithm, designs the system’s overall structure and the basic process, then the system is realized with VB.NET. After practice, the results show that the system is simple and convenient for file encryption.
    Research on Optimization of Iptables Firewall Performance
    WU Yan-mao
    2012, 1(9):  106-108.  doi:10.3969/j.issn.1006-2475.2012.09.027
    Asbtract ( 511 )  
    Related Articles | Metrics
    After researching the theory of firewall of Netfilter and Iptables, and analyzing the key factors which influence performance of firewall, this paper puts forward the concept of firewall optimization and the principles of how to write firewall rules. The template of rules is presented based on these principles. Finally, the optimization effect is discussed.
    Research on Trust Management for Cloud Computing
    LI Lian;ZHU Ai-hong;SU Tao
    2012, 1(9):  109-114.  doi:10.3969/j.issn.1006-2475.2012.09.028
    Asbtract ( 431 )  
    Related Articles | Metrics
    Firstly, this paper analyzes the related concepts of trust and trust management; then, some typical trust management models are introduced and compared. Finally, based on the analysis of the shortcomings and problems of the trust management in cloud computing, this paper discusses on the trend of research and applications of trust management.
    图像处理
    A Video Transcoding Scheme Based on Region of Interest Metadata
    ZHAO Xin-feng;WANG Heng
    2012, 1(9):  115-117,.  doi:10.3969/j.issn.1006-2475.2012.09.029
    Asbtract ( 402 )  
    Related Articles | Metrics
    This paper proposes a video transcoding scheme oriented the client bandwidth and device limited. Firstly, it acquires and stores the Region of Interest (ROI) metadata. Then, during the video transmitting phase, according to the client bandwidth, ability of processor, the different of power dissipation, the original video is transcoded. The video stream of transcoding remains good sound effects.
    Document Authentication Watermarking Algorithm for Tampered Localization
    XI Yan-hua
    2012, 1(9):  118-122,.  doi:10.3969/j.issn.1006-2475.2012.09.030
    Asbtract ( 425 )  
    Related Articles | Metrics
    In order to protect the binary document images’ integrity, a document watermarking algorithm for image authentication, integrity verification and tampered localization is proposed. The selection criteria of the flippable pixels are presented and the embeddable blocks are determined by the criteria. The watermarked image can be obtained by inserting the watermarking into the flippable pixels. The watermarking is performed by extracting the central pixel in the embeddable blocks. Experiments show that the watermarked document image has good quality and the embedded watermarking can be extracted without the original document image and the original watermarking. The tampered content can be detected and localized successfully.
    New Method of Corner Detection and Certain of Palm Region
    KUANG Zhi-qi;LIANG Chun-hong
    2012, 1(9):  123-126.  doi:10.3969/j.issn.1006-2475.2012.09.031
    Asbtract ( 550 )  
    Related Articles | Metrics
    Corner detection is one of the very important parts of palm print recognition, which makes a great influence on the corner detection. This paper provides a new method for corner detection combined with the extreme value theory and the characteristic of the palm. First, it uses the Sobel algorithm to split the palm image and get the binary image. And then it clusters the binary image, statistic gray value of each line of the palm image to locate the corner. Comparing to the classical methods, it makes a simple way to the center of the palm and the hand rotation.
    Learning from Only Positive and Unlabeled Examples for Eyebrow Image Segmentation
    ZHANG Xia-huan;LI Yu-jian;ZHANG Chen-guang
    2012, 1(9):  127-133.  doi:10.3969/j.issn.1006-2475.2012.09.032
    Asbtract ( 417 )  
    Related Articles | Metrics
    Traditional interactive image segmentation methods require users giving out background as well as foreground scribbles. Aiming at this problem, this paper proposes a novel image segmentation framework, named image segmentation with only positive and unlabeled examples. By combining learning from only positive and unlabeled examples method with graph-based semi-supervised learning technique, this method only needs users labeling a small number of pixels on interest region for segmentation. Experiments on the BJUT Eyebrow Database show that the proposed method achieves analogous results to graph-based semi-supervised learning, Random Walk as well as Lazy Snapping method, and is suitable for eyebrow recognition preprocessing.
    Design and Implementation of Picture Information Acquisition Management System Based on Exif
    LI Yao
    2012, 1(9):  134-136.  doi:10.3969/j.issn.1006-2475.2012.09.033
    Asbtract ( 430 )  
    Related Articles | Metrics
    This paper discusses how to use the C # language to develop a system which can automatically read image with Exif information, and make picture identification, classification and preservation, according to the Exif information for the software of the user query. The software is divided into the four-part: winform framework of image auto-archiving module, Web-based picture information query module, image information processing class, database operation class. This article focuses on the class of picture information processing and the picture automatically archiving module.
    算法分析与设计
    Comparison for Computational Methods to Structures of Wind Loads in Atmospheric Boundary Layer
    DU Qiang;TAN San;LIU Ning
    2012, 1(9):  137-139,.  doi:10.3969/j.issn.1006-2475.2012.09.034
    Asbtract ( 455 )  
    Related Articles | Metrics
    Wind load is one of mainly lateral loads on structures in atmospheric boundary layer. Aimed to the method of theoretical computation and Computational Fluid Dynamics that are adopted by engineering widely, the principle about two methods to compute the wind pressure and wind loads on structures is elaborated. Furthermore, the pressure distributions on a simple structure with different elevation are numerically computed based on the Reynolds-averaged N-S equations and the standard k-ε turbulent model, and the characteristics of the wind pressures on the structure are discussed, then two computational methods are compared. The computed results show that the wind loads on the structure computed by numerical method are lower than those of theoretical method because the fluctuating wind loads on the structure are ignored. But, CFD can obtain more information for the parameters in wind field, and it is more convenience for computation of wind loads on structures with complex shape.
    Improved Genetic Algorithm for Multi-constrained 0-1 Knapsack Problem
    LV Cong-ying;HU Ping;LIU Jiong
    2012, 1(9):  140-142.  doi:10.3969/j.issn.1006-2475.2012.09.035
    Asbtract ( 431 )  
    Related Articles | Metrics
    he improved strategies for GA are presented, and used to solve the MKP. These main improved strategies are: the solution of the LP-relaxed MKP is used as the initial solution; the repair and local improvement operators are used to avoid the loss of population diversity. By using a standard set of large-sized test data to test the new GA, the results show that the new GA has better performance and converges much faster to better solutions.
    New Hybrid PSO Algorithm of Inverted Sequence Variation to Solve University Path
    FANG Xin
    2012, 1(9):  143-146.  doi:10.3969/j.issn.1006-2475.2012.09.036
    Asbtract ( 435 )  
    Related Articles | Metrics
    Standard Particle Swarm Optimization(SPSO) easily leads to premature convergence in optimizing path problem. To overcome this shortcoming and according to university geographic coordinates, a new hybrid PSO algorithm of inverted sequence variation is proposed for solving university path problem. To balance the ability of local search and global search of PSO and enhance the population diversity, variation condition is a self-balancing strategy. According to the reverse mutation rate operator, new groups start to do position variation for the particles to get rid of local minima and continue iterative update operation. The C+〖KG-*2〗+ programming of Visual Studio 2005 is used to make simulation. The results show that this algorithm can not only effectively solve the university path problem, but also is of high convergence precision and overcomes premature convergence effectively.
    Interference Cancellation Algorithm of OFDM-IDMA Systems Based on Turbo-coded
    LI Yi-long;WU Shou-hao;ZHANG Jie
    2012, 1(9):  147-150.  doi:10.3969/j.issn.1006-2475.2012.09.037
    Asbtract ( 515 )  
    Related Articles | Metrics
    This paper provides a comprehensive study of interference cancellation based on Interleave-Division Multiple-Access system. Through the analysis of the structure characteristics and error correction performance of the serial interference cancellation and the parallel interference cancellation, this paper gives a combining scheme that is used for OFDM-IDMA system. By establishing equivalent channel transfer model with the conditions of Turbo Coding and OFDM technology, the combining scheme is compared with the traditional serial interference cancellation in performance. Simulation results demonstrate that the combining scheme in OFDM-IDMA system can achieve low delay on multi-user communication with less loss of error correction performance.
    Research on Product Recovery Forecast with Reverse Logistics for Remanufacturing
    ZHOU Zhan-feng;
    2012, 1(9):  151-153.  doi:10.3969/j.issn.1006-2475.2012.09.038
    Asbtract ( 378 )  
    Related Articles | Metrics
    Uncertain factors in the system are analyzed on the foundation of structuring remanufacturing reverse logistics net. Product recovery is taken as research object, product recovery forecast model is built by using Grey model and an application example is given. The result shows that the model is of high calculation precision, less required data, and a good application.
    Research on Informatization Vendors Evaluation Based on Entropy Method and Fuzzy Evaluation
    YANG Dong-shu;YANG De-sheng
    2012, 1(9):  154-158.  doi:10.3969/j.issn.1006-2475.2012.09.039
    Asbtract ( 421 )  
    Related Articles | Metrics
    For the comprehensive evaluation indexes of informatization vendors with fuzziness and uncertainty, this paper attempts to apply AHP, entropy method and fuzzy comprehensive evaluation method to construct a comprehensive evaluation method combining with the subjective weights and the objective weights for evaluating the quality of information technology companies. The method adopts AHP and entropy weight to determine the subjective weights and the objective weights, to mine index sample value of the objective information difference, try to make the result more objective. The application of power supply enterprise informatization vendor’s calculation data results verify that the entropy weight of information vendors’ fuzzy comprehensive evaluation model is effective and practical.
    Research on Motion Control of Omnidirectional Mobile Robot Based on Fuzzy Adaptive Control
    HE Xiao-fei;YANG Yi-min
    2012, 1(9):  159-162,.  doi:10.3969/j.issn.1006-2475.2012.09.040
    Asbtract ( 416 )  
    Related Articles | Metrics
    Due to the wheels distribution characteristics of the four-wheel drive omnidirectional mobile robot, the coupling relationship exists in the four-wheel, during the operation process, the overall stability of movement robot control and accuracy are not good. To solve this problem, this paper designs an error correction method based on fuzzy adaptive controller combined with the fuzzy control and PD control to make error correction for machine body online, thereby the integral error is reasonably distributed to single wheel according to the structure, and the overall error correction is transited into a single wheel error correction. Through the simulation of Matlab-Simulink, results show that, using the fuzzy adaptive controller error correction, the linear and angular velocity of the robot with following characteristics are obviously improved; the precision of the motion control is improved also.
    Research on Spares Consumption Quota Prediction Based on Exponential Smoothing Method
    GUO Feng;LIU Chen-yu;LI Wei-ling
    2012, 1(9):  163-165.  doi:10.3969/j.issn.1006-2475.2012.09.041
    Asbtract ( 399 )  
    Related Articles | Metrics
    Because the linear, secondary, cubic exponential smoothing method have different fitting degree when predicting the spares with the different consumption discipline, this paper adopts the three kinds of exponential smoothing method to predict spares consumption quota, whose smoothing coefficients take a value that makes the squared error minimum when it is in a certain range, finally selects the result, with minimum squared error among the three methods, as spares consumption quota. Prediction results show that the comprehensive application of three kinds of exponential smoothing method to predict is more accurate than single method, the research method is of higher utility and promotion.
    Research on Railway Container Yard System Data Collision Problem Based on RFID Technology
    ZHANG Xue
    2012, 1(9):  166-169.  doi:10.3969/j.issn.1006-2475.2012.09.042
    Asbtract ( 363 )  
    Related Articles | Metrics
    RFID technology is applied to the container yard management; it can solve the problem of recognition rate and accurate rate. However, with the application of RFID technology, it is possible to produce a data collision. This paper studies this question by applying the returned binary algorithm, designs and realizes a data collision processing module, so that to solve the data collision and improve the management efficiency of container yard.
    Application of Harmony Search Algorithm in Combinatorial Test Case Generation
    LI Jin-hua;YANG Yong-li;XING Dan-dan
    2012, 1(9):  170-173.  doi:10.3969/j.issn.1006-2475.2012.09.043
    Asbtract ( 391 )  
    Related Articles | Metrics
    A complex software system is usually affected by a lot of factors. Their interactions complicate the system behavior and cause various faults. It is impossible to exhaustively test all the interactions. Combinatorial testing uses a small number of test cases to guarantee the test quality by considering the factors different influence on systems. The paper proposes a novel method of test suite generation based on harmony search algorithm. The method solves the key issues of N-way combinatorial coverage and variable-strength combinatorial coverage. The experiments demonstrate the effectiveness of the method.
    Research on Channel Estimation Algorithm for LTE Uplink
    XU Xuan;ZHOU Li
    2012, 1(9):  174-177.  doi:10.3969/j.issn.1006-2475.2012.09.044
    Asbtract ( 484 )  
    Related Articles | Metrics
    Channel estimation technology as a means of access to the channel state information is one of the key technologies to improve the reception performance of wireless data transmission. In this paper, three kinds of channel estimation algorithms which are LS (Least Square), LMMSE (Linear Minimum Mean Square Error), SVD (Singular Value Decomposition), are respectively simulated in different conditions. The MSE (Mean Square Error) and BER (Bit Error Rate)of the three kinds of algorithms are analyzed and compared, then the corresponding results are concluded.
    A New Infrared Multi-touch Recognition Algorithm
    LI Jun;
    2012, 1(9):  178-180,.  doi:10.3969/j.issn.1006-2475.2012.09.045
    Asbtract ( 490 )  
    Related Articles | Metrics
    In these days, multi-touch technology becomes an important HCI device, it is used in various environments. This paper proposes an infrared multi-touch recognition algorithm model, which uses two different bi-axial systems to recognize multi-touch of users; it solves the multi-touch recognition problems in traditional infrared touch screen, the comparing result shows that this algorithm improves the recognition rate of infrared multi-touch screen.
    A Method for Fault Diagnosis of Analog Circuits Based on Wavelet Multi-resolution Feature Extraction
    LI Lun;LI Zhi-hua
    2012, 1(9):  181-183,.  doi:0.3969/j.issn.1006-2475.2012.09.046
    Asbtract ( 306 )  
    Related Articles | Metrics
    This paper researches the method based on the wavelet multi-resolution feature extraction for analog circuit fault diagnosis. The features of sampling signal are extracted from wavelet decomposition as a vector to BP neural network for training. According to bandpass filter circuit of diagnosis example, this paper discusses the specific implementation of this method. It can effectively simplify neural network structure and reduce its training time, quickly and efficiently carry out analog circuit fault diagnosis and positioning.
    应用与开发
    Application of Large Capability NAND Flash in Embedded Tibetan-Chinese-English Electronic Dictionary
    MA Fu-xiang;
    2012, 1(9):  184-186.  doi:10.3969/j.issn.1006-2475.2012.09.047
    Asbtract ( 381 )  
    Related Articles | Metrics
    With the Tibetan-Chinese-English electronic dictionary entry’s increase, and the application of audio and image, an energy saving, fast and large capacity storage system is needed in order to move the computer’s electronic dictionary to embedded systems. The large capacity NAND Flash chips interfaced with ARM is designed. The system is able to work stably, and the read and program operation can meet the requirements of the Tibetan-Chinese- English electronic dictionary.
    Analysis and Application of Anonymous Inner Class Based on Java
    WU Hong-ping
    2012, 1(9):  187-189.  doi:10.3969/j.issn.1006-2475.2012.09.048
    Asbtract ( 384 )  
    Related Articles | Metrics
    Inner class is one of major characteristics of Java, this paper discusses the creation mechanism and method of the anonymous inner class in Java, analyzes the attributes and rules of the anonymous inner class member variables and member methods, gives the actual application example to the anonymous inner class.
    Application of NSG in Computer Network Teaching
    LIU Shu-ru;FENG Yuan;LI Jian-yong;XIA Yong-quan
    2012, 1(9):  193-195.  doi:10.3969/j.issn.1006-2475.2012.09.050
    Asbtract ( 377 )  
    Related Articles | Metrics
    According to the characteristics which are abstract and difficult to understand in computer network teaching, experimental conditions demands high and expensive equipment, this paper proposes a new method which uses NSG to support the teaching of computer network based on the NS2 network simulator. Through practice, the application of the simulation platform plays a positive role to improve the effectiveness and teaching level in teaching computer networks.
    An Optimal Design of Automotive Terminal Based on SOC Technology
    CHEN Li-wen;ZOU Fu-min;GONG Zheng-qi;YU Peng-na
    2012, 1(9):  196-199.  doi:10.3969/j.issn.1006-2475.2012.09.051
    Asbtract ( 416 )  
    Related Articles | Metrics
    The thesis introduces a vehicle monitoring system based on embedded technology. Through the comparison of various positioning technologies and wireless communication technologies, this thesis designs a system based on SOC microprocessor. It can receive the position information of cars with GPS and send the information by GPRS technology. The thesis explains the design of the software and hardware in detail and introduces the test of the system. The result of test certifies that the system can be qualified for positioning and tracking, be used to compensate the dead zone and its function is easy to be expanded and updated.
    Research and Implementation of Data Processing Model for RFID Middleware
    YIN Duo-fen;GONG Hua-ming
    2012, 1(9):  200-202.  doi:10.3969/j.issn.1006-2475.2012.09.052
    Asbtract ( 425 )  
    Related Articles | Metrics
    To process the raw data for getting the effective event is the most basic and most important step in RFID middleware. First, this paper summarizes the characteristics of RFID data and presents the RFID middleware model based on data processing center; then focus on the study of the process for leakage read, more read, and dirty read; finally proposes and implements algorithms.
    Design and Exploration of Dynamic Link Library-based Health Care Data Real-time Upload Interface
    ZHU Xue -lian;LAI Xiao-jun
    2012, 1(9):  203-204,.  doi:10.3969/j.issn.1006-2475.2012.09.053
    Asbtract ( 411 )  
    Related Articles | Metrics
    Based on dynamic link library, this paper realizes hospital information systems real-time data exchange with health care information systems to ensure that the cost of medicare patients do not have the second entry; the hospital inventory data and patient cost data upload in real-time; the inventory is deducted from the different health care side, thereby two relatively independent systems data consistency. This paper establishes a more perfect interface between HIS and health care system.
    Research on Risk Assessment of Alien Species Based on AHP
    LIANG Yong;DAI Xiao-peng;;LI Wang;
    2012, 1(9):  205-208.  doi:10.3969/j.issn.1006-2475.2012.09.054
    Asbtract ( 432 )  
    Related Articles | Metrics
    Risk assessment of alien invasive species is the most effective and economically feasible way of preventing alien species. This paper sorts nine index factors including intentionally introducing, unintentionally introducing, environmental adaptation, environmental resistance, speed of growth, reproduction, proliferation, ecological environment and economic construction that have great influence on risk assessment, and analyzes the major risk factors in the assessment by using AHP analysis software Yaahp based on the external biological invasion, adaptability, proliferation, and harm.
    School of Computer Science, Beijing University of Aeronautics and Astronautics, Beijing 100191, China
    XU Xiao-li
    2012, 1(9):  209-214.  doi:10.3969/j.issn.1006-2475.2012.09.055
    Asbtract ( 555 )  
    Related Articles | Metrics
    Because of the high degree of automation, model checking technology has become one of the most popular way to ensure correctness in the formal verification field. To use the model checker, the user should model the verification-needed system. This paper summarizes the basic principles of model checking technology and explores the Promela modeling with model checker SPIN. Finally, a simple bus operation prototype model is given, and the experimental results are analyzed.
    Integrating Pathway Information from Different Resource of Databases
    WANG Yu-xuan;ZHU Fei
    2012, 1(9):  215-218.  doi:10.3969/j.issn.1006-2475.2012.09.056
    Asbtract ( 434 )  
    Related Articles | Metrics
    Pathway, is a chain of reactions associated with a particular metabolic process, plays a very important role in biology. This paper can find all material in a particular reaction through searching pathway in different databases. After finding the pathway, this paper analyzes it and gets more detailed information of all participants in the pathway. Using this method, it can help biologists to save a lot of time when resolving the pathway.
    Realization of Automatic Word Paper Marking System Based on VBA Technology
    DENG Xiu-lan;LI Guang-zhen
    2012, 1(9):  219-221.  doi:10.3969/j.issn.1006-2475.2012.09.057
    Asbtract ( 426 )  
    Related Articles | Metrics
    This paper proposes a system of using VBA technology to realize the automatic Word documents paper marking. After answering, students get scores and correct keys by the proposed system, and according to the scores, get the corresponding study suggestion. This system has the high accuracy on paper marking, and can become an auxiliary tool of learners usual practice and simulation test.
    Construction of Web Database Based on XML
    HUANG Yu-yang;LI Hui-lun
    2012, 1(9):  222-224.  doi:10.3969/j.issn.1006-2475.2012.09.058
    Asbtract ( 428 )  
    Related Articles | Metrics
    In order to extract information and data from Web pages effectively, this paper constructs a database used for collecting data based on XML. The HTML documents are transformed to XHTML and analyzed by the open-source tools JTidy and Dom4j. Data are extracted and saved based on the tag characteristics of XML documents. Finally the data are persisted in the database by the ORM tool-Hibernate.
    Design and Implementation of GPS Navigation System Based on Android Platform
    ZENG Xin-yi
    2012, 1(9):  225-228.  doi:10.3969/j.issn.1006-2475.2012.09.059
    Asbtract ( 458 )  
    Related Articles | Metrics
    Taking into account of demands of the real-time geographic information and convenient travel and tourism, as well as the excellent performance of Android system, this paper designs and implements the GPS navigation applications system based on Android platform. Taking use of complete, free and open Android platform and combining with Google Map API, it achieves the satellite time, location, track record, path planning for car navigation. About response speed and flow control for navigation applications, the paper also proposes a solution to get a better user experience.
    Study on Giving Credible and Accurate Analysis Results
    WANG Li-ming;MA Nai-cang;ZHU Hua-yuan;WANG Wen-xiu;ZHAO Gong-wei
    2012, 1(9):  229-231,.  doi:10.3969/j.issn.1006-2475.2012.09.060
    Asbtract ( 379 )  
    Related Articles | Metrics
    During making sure the reliability of master undercarriage system in framing military aircraft minimum technique flight condition, it is difficult to give credible and accurate analysis results. In order to resolve this problem, the fuzzy comprehensive evaluation is introduced in failure mode effect. According to the criticality, it shows that whether the system and equipment are the military aircraft minimum technique flight condition or not.
    Integrated Method of Information Search for Protein from Different Resource of Database
    CHEN Ya-qi;ZHU Fei
    2012, 1(9):  232-234,.  doi:10.3969/j.issn.1006-2475.2012.09.061
    Asbtract ( 384 )  
    Related Articles | Metrics
    With the rapid development of biological science and technology, people know more and more about the basic substance, protein. However, the more information, the more difficulties people meet in searching. To get it efficient and precise message of protein, this paper designs a method to extract the information through NCBI and Binding DB for example. The method is about obtaining efficient information with no redundancy. It extracts keywords to form bigram from the information entry which is searched, and then divides it into groups. In each group, the detailed keyword extraction and grouping information is done, and cycles the processes till N-gram is generated, so that it achieves the purpose of getting rid of redundancy and integrates the ordering of information.
    Research and Implementation of Common Model for Program Thought Training
    YANG Hua;TI Jia;ZHOU Jing
    2012, 1(9):  235-238.  doi:10.3969/j.issn.1006-2475.2012.09.062
    Asbtract ( 412 )  
    Related Articles | Metrics
    Programming course is one of the basic courses for training student’s logic programming ability, but currently general reflect that the learning interest of this class courses of students does not concentrated, the programming and implementation of logical thinking is confusion and unclear, so learning effect poor. That how to break away the programming language, using the program thought training common model to imitate the real life and show the principle and logic process of programming, to improve the logic thinking ability of programming and learning effect of students are the important things of this research.