Loading...

Table of Content

    15 July 2011, Volume 7 Issue 7
    人工智能
    General Problem Descriptions Progress of Intelligent Planning
    LIU Ji;CHI Xue-hang;LV Shuai;
    2011, 7(7):  1-4.  doi:
    Asbtract ( 1589 )  
    Related Articles | Metrics

    The Planning Domain Definition Language is the definition language of problem proposed by the first

    international planning competition. It is extended with the biennial international planning competitions. This article gives

    a survey on the general description methods on the existing general planning problem. Through the formal description of those

    general description methods in the different periods of the research in the intelligent planning, the syntax and semantics

    are analyzed. This paper provides an accurate description of the planning for the future researchers, and discloses possible

    trends of the field.

    Study of Diagnosis for Diseases of Agricultural Crops Based on Radial Basis Function Networks
    CHEN Xiao-yan;DONG Chao-yi;LIU Yue-wen
    2011, 7(7):  5-8.  doi:
    Asbtract ( 1487 )  
    Related Articles | Metrics

    The manual diagnosis for the diseases of agricultural crops is often restricted by the individual ability and

    experiences so that one cannot obtain the precise results of diagnosis. To overcome this pitfall, the merge of expert systems

    with the rich pathological knowledge and the utilization of pattern recognition algorithm can significantly improve the

    precision of diagnosis. Therefore, it greatly increases the quantity and the quality of crop’s production. In this paper, a

    pattern recognition technique, based on a radial basis function (RBF) neural network is applied to the diagnosis of soybean

    diseases. The RBF neural network, which is a novel and efficient feed-forward network, is based on the local reflections of

    cortical neurons on the external stimulus. This network possesses variety of characteristics, for example, the simple

    structure, strong global convergence, and fast-speed training behavior, which together make RBF network to be used widely in

    the field of pattern recognition. Firstly, nineteen typical symptoms of soybean diseases are collected, and then constructed

    to form an experimental sample set. Secondly,a RBF network model is set up and trained using algorithm programming. Finally,

    the result of test shows that the RBF model is of high diagnosis precision and strong generalization ability.

    计算机控制
    Design of High-precision Displacement Control Device Based on MCU and Stepper Motor
    ZHOU Zi-ping;HU Qing;
    2011, 7(7):  9-11.  doi:
    Asbtract ( 1512 )  
    Related Articles | Metrics

    In the displacement measurement, DC stepper motor controlled by MCU is used to drive the screw movement

    instead of the displacement measuring devices controlled by the DC motor, which greatly improves the accuracy of the system

    to optimize the mechanical structure of the device.

    Performance Analysis Method of Multi-channel Data Acquisition System Based on FPGA
    LUO Hong-xia;ZHANG Xue-feng
    2011, 7(7):  12-15.  doi:
    Asbtract ( 1543 )  
    Related Articles | Metrics

    The multiplexer acts as the inputs of analog signals, enabling multi-channel analog signal acquisition; then

    filtered through a certain signal processing to ensure the most effective analog signals into the ADC. After conversion, the

    digital output is saved in the temporary buffer zone of the FPGA. The whole process is controlled by the FPGA. Finally, by

    the DAC-ADC joint debugging, in compare to the results, 14bit precision is guaranteed with ADC.

    Analysis of Lithium Iron Phosphate Battery Protection and Monitoring System
    TU Ping;HU Wen-song
    2011, 7(7):  16-19.  doi:
    Asbtract ( 1486 )  
    Related Articles | Metrics

    The article introduces a protection and monitoring system for lithium iron phosphate power modules used in

    electric bicycles, electric golf carts and electric cars. Focused on software design and hardware basics, the system achieves

    the effective battery management and instant monitoring, meanwhile, guarantees battery’s security and consistency in the

    charging process.

    图像处理
    SIFT Feature Extraction and Matching of Lunar Surface Image
    CHEN Kun;WANG Lu;CHU Jun
    2011, 7(7):  20-23.  doi:
    Asbtract ( 819 )  
    Related Articles | Metrics

    On the basis of analyzing multi-spectral and different-scale lunar surface image feature points, this paper

    extracts feature point and realizes stereo matching of the multispectral lunar surface image data and multi-scale image pairs

    data, and verifies the effectiveness of the proposed algorithm with Visual C++ and OpenCV development platform. Results show

    that improved SIFT feature is invariant to rotation, scale, intensity roughness, preserves stability of view variations, and

    completes feature extraction and matching of lunar surface image better.

    Research and Implementation of Fingerprint Image Recognition Based on Gabor Filtering
    ZHANG Xin-miao
    2011, 7(7):  24-26.  doi:
    Asbtract ( 696 )  
    Related Articles | Metrics

    This paper utilizes Gabor filtering-based fingerprint identification algorithm for computing the center of

    fingerprint image, sectoring, normalizing, Gabor filtering, feature extracting and matching, and uses Matlab for simulation.

    The simulation experiment establishes a certain number of fingerprint database to compare and analyze the algorithm.

    An Image Encryption Algorithm Based on Chaotic System and Fractional Fourier Transform
    ZUO Jing-long;YU Gui-lan;CUI De-long
    2011, 7(7):  27-29.  doi:
    Asbtract ( 674 )  
    Related Articles | Metrics

    An image encryption algorithm based on chaotic system and fractional Fourier transform is proposed. The image

    encryption process includes the two steps: first the image is encrypted by using confusion matrix which is generated by

    chaotic system, then the confusion image is encrypted by employing Fractional Fourier domain double random phase, finally the

    cipher image is obtained. The security of the proposed algorithm depends on the sensitivity to initial conditions of chaotic

    system, the randomness of phase mask and the orders of FRFT. Theoretical analysis and experimental results demonstrate that

    the algorithm is favorable.

    Design of Video Capture System Based on Embedded Linux System
    LI Yan-xia
    2011, 7(7):  30-33.  doi:
    Asbtract ( 719 )  
    Related Articles | Metrics

    For the broad applications of the wireless monitoring system, the proposed system is implemented on the

    embedded development platform which is based on video capture ARM1176JZF-S microprocessor core, and the system uses video

    capture technology and 3G wireless technology. Finally, it realizes the remote wireless video monitoring system. The

    experiment proves that this scheme enables smooth transmission of real-time 640*480 size video images.

    Paper Currency Recognition Based on Feature Extraction of One Dimension Fourier Transform
    YIN Hui-ling
    2011, 7(7):  34-35,3.  doi:
    Asbtract ( 1568 )  
    Related Articles | Metrics

    A system of paper currency recognition includes image collection, preprocessing, feature extraction and

    classifier design.A critical step is the feature extraction which directly influences the recognition effect of the whole

    system. Especially to recognize paper currency which are different in par value but similar in length, width and pattern, a

    new feature extraction method is proposed, which is based on one dimension Fourier transform in part area. The experiment

    result shows that this method leads to a high recognition rate and is of excellent value in practical application.

    A Kind of New Decomposition Model for Staircase Reduction
    CHEN Hua-zhu;LI Xiao-li
    2011, 7(7):  36-39.  doi:
    Asbtract ( 933 )  
    Related Articles | Metrics
    To the staircase effects of the structure from TV-L1 model, the article proposes an improved decomposition model—GJTV-L1 model. First, it obtains the gradient vector and normal vector of the cartoon, then it obtains the cartoon of the image through fitting normal vector. Finally, the experiment testifies rationality and validity of the GJTV-L1 model and the algorithm.
    Extraction Method of Moving Object Contour Using Background Extraction and Level Set
    YU Ruo-fei
    2011, 7(7):  40-44.  doi:
    Asbtract ( 743 )  
    Related Articles | Metrics
    This paper proposes a novel method for extracting moving object contour based on background extraction and level set. First, it extracts the background using an improved method. After image binarization and morphological operations, motion region boundary is detected by a method combined background subtraction and image difference. Then using the detected motion region as the initial evolving curve, the moving object contour is extracted using a fast level set method without re-initialization. The experimental results show that the method proposed in this paper can be applied to real-time moving object contour detection.
    网络与通信
    Survey of TCP Improvement over Wireless Multi-hop Networks
    LIU Mei
    2011, 7(7):  45-48.  doi:
    Asbtract ( 1506 )  
    Related Articles | Metrics
    The specific characteristics of wireless multi-hop networks, which applications are rapidly expanded, such as shared media, multi-hop connection and node mobility cause TCP designed for wired networks not to work well. TCP often misjudge the congestion status in such kind of networks with a slow reaction to it, which seriously suffers from performance degradation. This paper analyzes the factors affecting TCP performance, then some research works to improve TCP performance are summarized and compared. Finally, some possible research trends of optimizing TCP performance over wireless multi-hop networks are proposed.
    Research on Web Service Technology Based on Hessian Protocol in ASP.NET Environment
    DONG Jie;;QIN Hua
    2011, 7(7):  49-51,5.  doi:
    Asbtract ( 1512 )  
    Related Articles | Metrics
    The Web services technologies used in ASP.NET is based on the XML+SOAP protocol, which is of more shortcomings such as starting with a high learning, and being difficult to use. Hessian protocol is a lightweight Web services program. This paper focuses on the implementation process of Hessian protocol in ASP.NET environment. This scheme is another Web service option for practical applications.
    Design and Implementation of Patent Crawler Based on Customized Theme
    ZHANG Rui-han;LIN Zhen-rong;LI Jian-min;ZHONG Wan;
    2011, 7(7):  52-55.  doi:
    Asbtract ( 751 )  
    Related Articles | Metrics
    At present, the number of pages in our country has reached more than thirty billion, and it grows more than one hundred percent every year. For getting the information efficiently and accurately from Internet, subject crawler born. It downloads the useful information from Internet, and provides the huge data for user. This article describes the design and implementation of subject crawler which is based on .NET and can get the information more accurately and effectively. By experiments and practical applications, the subject crawler’s accuracy rate is much higher than others.
    Research and Realization of Documents Processing in B/S Mode Based onActiveX Control Technology
    MA Sai-hong;ZHU Ai-hong;LI Lian
    2011, 7(7):  60-63.  doi:
    Asbtract ( 736 )  
    Related Articles | Metrics
    How to invoke Microsoft Word in IE browser and realize typesetting, printing of official document, are the key technologies of the document processing system based on B/S mode. This paper introduces the ActiveX control technology, proposes a scheme to call Word program by using ActiveX Controls, and gives implementation steps. The application results prove the scheme successfully realizes the seamless articulation of Word and IE browser.
    Design of Privilege Mechanism Based on Expansion of Membership
    HAN Mei;LIN Zhen-rong;LI Jian-min
    2011, 7(7):  64-66,7.  doi:
    Asbtract ( 722 )  
    Related Articles | Metrics
    This paper gives a privilege mechanism based on combining the expansion of Membership in ASP.NET with the traditional RBAC mechanism. It’s able to control the access of the roles and permissions in Web page effectively, improves the defect for the inadequate access control of Membership, and improves the disadvantage that the traditional RBAC mechanism could not use the control in ASP.NET effectively. Finally, this paper realizes such a privilege mechanism in the "graduate information management system", and fully verifies its advantages, feasibility and effectiveness.
    Analysis and Research on Data Transmission by UDP Packet for Mesoscale Meteorological Observing Network
    QIAN Yi;CHEN Bin;FANG Hai-tao;JIANG Zhi-ping
    2011, 7(7):  67-70.  doi:
    Asbtract ( 771 )  
    Related Articles | Metrics
    Mesoscale meteorological observing network distributes widely into various geographical environment in China. Its detecting data with high temporal and spatial resolution can be used in agriculture, industrial, disaster monitoring and so on. There are large-scale equipments named automatic weather station in this detecting network. Every station sends the real-time meteorological telegram accurately, timely and reliably to central data server. Compared with Transmission Control Protocol (TCP), User Datagram Protocol (UDP) is more efficient but undependable. Combined with General Packet Radio Service (GPRS) network, a wireless transmission in command mode with supplement and retransmission mechanism by enforced reliable UDP technology, can package detection data and send to central data-server. Presently, this system is formally used in Anhui Meteorological Association. Finally,results show that in terms of speed and the reliability is guaranteed at the same time.
    P2P-based Design of Instant Messaging System
    LI Zhen-shan
    2011, 7(7):  71-74.  doi:
    Asbtract ( 749 )  
    Related Articles | Metrics
    In order to solve the traditional problem of instant messaging systems, to reduce the burden on centralized server, this paper uses the P2P-based underlying network mechanisms to achieve instant messaging system. Compared with other methods, it saves the cost and enhances the system scalability and robustness. From the final test results, it achieves the development objectives of the system,the basic underlying implementation mechanisms of P2P and instant messaging system’s basic functions.
    Design and Implementation of Information Interactive System Based on B/S Framework
    ZHOU Lei
    2011, 7(7):  75-77.  doi:
    Asbtract ( 706 )  
    Related Articles | Metrics
    The paper develops an information interactive system based on B/S framework with .NET technology. The system implements the management of data and achieves the timely transmission among enterprises. This article mostly introduces the frame design and its logic components used in this system.
    Design and Implementation of Mobile Phone Embedded RTSP Streaming Media Server Based on MX27
    HUANG De-hui;LIANG Peng;ZENG Hua
    2011, 7(7):  78-81.  doi:
    Asbtract ( 1723 )  
    Related Articles | Metrics
    With the development of communications technology and digital video technology, the conditions for mobile video surveillance have been created. How to realize a fast, low-bit-rate video data encoding, and build a highly efficient and stable streaming media server is the key of mobile video surveillance. This paper introduces a mobile phone embedded streaming media server. The program uses Freescale’s new MX27 as a master chip and chooses the stable and open-source Linux as an embedded system. On the basis of it, a design of RTSP streaming media server is given. The experimental result proves the feasibility and better practicality of this program.
    Strategies of Website Optimization Based on User Experience
    MAO Guan-qiang;HUANG Jian-ming
    2011, 7(7):  82-83.  doi:
    Asbtract ( 1440 )  
    Related Articles | Metrics
    This article points out the misunderstanding of website optimization through introduction of website optimization, and proposes optimization based on user experience, and further describes the optimization from site structure, keywords, content and other aspects.
    算法分析与设计
    Parallel Algorithm of Matrix Multiplication Based on MPI & OpenMP
    ZHANG Yan-hua;LIU Xiang-gang
    2011, 7(7):  84-87.  doi:
    Asbtract ( 1627 )  
    Related Articles | Metrics
    How MPI and OpenMP act separately on parallel computing is introduced, and a platform is established using MPI and OpenMP on Visual Studio 2010. The multi-process and multithreadings are realized on it. A matrix multiplication parallel algorithm on data partitioning is designed and implemented. The matrix data are divided into two parts for two computers. Each computer completes one part by using multithreadings. The experiments prove that data processing capability is improved compared with matrix multiplication, matrix multiplication on MPI and matrix multiplication on OpenMP.
    Inspection of Heat-damaged Soybean Based on Machine Vision
    GAO Yan-xia;HU Chang-biao
    2011, 7(7):  88-91.  doi:
    Asbtract ( 1567 )  
    Related Articles | Metrics
    The new national standard of soybean(GB 1352-2009) is formally promulgated and implemented on September 1, 2009. Based on this fact that heat-damaged soybean is first proposed, a classification method by utilizing neural network and soybean surface color features is presented. This article chooses six color feature data to use as the input of the classifier and tries to use a new algorithm which combines particle swarm optimization with BP (Back Propagation) to train neural network. The simulation results show that the proposed method is of certain effect of soybean, which is helpful to realize the online vulnerability grain detection.
    Segmentation Algorithm for Effective Subsequence Based on Edge Operator
    SUN Da-chen;SUN Ying-yan;ZHOU Guang-qun
    2011, 7(7):  92-95.  doi:
    Asbtract ( 1394 )  
    Related Articles | Metrics
    After edge operator in time series is deeply analyzed, aimed at segmenting the different width and relatively complete tendency in the time series, a method named segmentation algorithm for effective subsequence based on edge operator is introduced. This method is good at segmenting the different width and relatively complete tendency, at the same time, it is of the merits of easily being carried out, remarkable result and suitable ability for the data from different fields.
    Research and Application of PageRank Algorithm Combined with VSM Technique
    LI Wei-dong;LU Ling
    2011, 7(7):  96-98,1.  doi:
    Asbtract ( 794 )  
    Related Articles | Metrics
    In order to solve the "Topic Drift" problem of PageRank algorithm, this paper proposes an improved method combined with VSM(vector space model) technique. First, it computes PageRank value by hyperlink structure of Web page, then builds vector space model of Web page content and computes topic content similarity. Finally it sums up new PageRank value according these two values by certain weight coefficient. Contrast experiments show that improved PageRank algorithm reduces the quantity of irrelevant Web page and provides better sorting results for search engine.
    Structural Analysis of a Kind of Triangular Norms
    YI Zhi-hong
    2011, 7(7):  99-101.  doi:
    Asbtract ( 718 )  
    Related Articles | Metrics
    On the basis of weak negations, one kind of triangular norms is analyzed structurally, then the constructing method of triangular norms is given.
    Research on Reversibility of Cellular Automata
    LIU Dong
    2011, 7(7):  102-104.  doi:
    Asbtract ( 753 )  
    Related Articles | Metrics
    Cellular automata is an important theoretical tool of modeling complex adaptive system. As a necessary condition of simulating physics reversible space, reversibility is an important attribute of cellular automata. This paper introduces basic concept, reversibility and computability about cellular automata, and describes how one-dimensional reversible cellular automata are computationally universal.
    Performance Analysis of Different Regular Expressions Matching Engines
    DENG Kai-yuan;JIANG Lei
    2011, 7(7):  105-107,.  doi:
    Asbtract ( 744 )  
    Related Articles | Metrics
    With the remarkable descriptive power, regular expression matching is in wide use in the field of computer science. Dozens of regular expression matching engines has been developed. In the practical applications, for different rule sets and grammars, these engines exhibit different performance. By giving detailed performance experiments of four regular expression libraries, PCRE, Greta, Boost and RE2, this paper shows different matching speeds of these four engines. Further, it gives how to select proper regular expression engines in various environments. And the experiment results and analysis can serve as guideline in the future system design.
    Attack on an Improved Algorithm of ECDSA
    ZHOU Cai-xue;ZHOU Wan;HU Hui
    2011, 7(7):  108-110.  doi:
    Asbtract ( 767 )  
    Related Articles | Metrics
    Elliptic Curve Digital Signature Algorithm(ECDSA) is used more and more widely in many applications. By analyzing an improved algorithm of ECDSA, the paper points out its security risk, analyzes its root causes for insecurity, and puts forward an attack method. Such an attack method has the opportunity to obtain a signer’s private key with little calculated amount and without the computation of discrete logarithm.
    Comparative Study of Software Protection Strategy
    DONG Qing-tan
    2011, 7(7):  111-115.  doi:
    Asbtract ( 1482 )  
    Related Articles | Metrics
    With the increasing popularity of computer, software industry is developing rapidly. In order to safeguard the interests and scientific research, technology and copyright of developers and purchasers of software, it is necessary to encrypt the software. This paper describes the types of protection software. These types are of advantages and disadvantages, it is difficult to say which one is the best, the conclusion depends on the evaluation of your program code and the authors of the preferences.
    软件工程
    Application and Research on Cloud Computing in E-Government System
    WU Qiu-ping
    2011, 7(7):  116-120.  doi:
    Asbtract ( 731 )  
    Related Articles | Metrics
    Cloud computing refers to IP-network computing architecture, cloud computing technology not only provides the traditional sense of IT resources and application services, and supports, including IT, communications, television, mobile and Internet technology and all things associated fusion of resource use and business applications. The article focuses on the basic idea of cloud computing database and the basic problem to be solved in implementation process, discusses the use of cloud computing to build E-government system model and implementation of programs. Cloud computing with its secure, reliable data storage and computing power,is of a positive impact to E-government information technology systems construction.
    Early and Quick Estimation Based on Expert Experience and Random Sampling
    ZHU An-jiang;HE Hong-jun;YIN Jun-wen;LIU Qing-he;ZHOU Peng;MAI Xin-hui
    2011, 7(7):  121-125,.  doi:
    Asbtract ( 1425 )  
    Related Articles | Metrics
    In the project-approval phase, due to constrained time for review, it needs quick and approximate estimate methods for obtaining software size to determine the budgets. This paper puts forward a quick estimation based on expert experience and random sampling, by which estimator first decomposes software into different software modules, the development organization pre-estimates size and cost of these different modules to declare funds, then estimator performs a detail measurement with expert experience and random sampling of software components, and estimates the total software project size by quick and approximates estimate method in order to get the total software cost. Application shows that this method is feasible.
    Concise Enterprise Architecture
    LI Feng
    2011, 7(7):  126-129.  doi:
    Asbtract ( 768 )  
    Related Articles | Metrics
    Extreme programming (XP) and agile methods are used to a great extent. In the field of enterprise architecture, in order to understand organizational architecture better from a different viewpoint, this paper uses XP and agile’s idea, and provides a concise enterprise architecture, i.e. a matrix which comprises of orthogonal dimensions, that include business layer, application component layer, technical layer, data, activity and organization. The meanings of matrix elements are given as well. In addition, this article presents implementation processes in details, which enclose some necessary guidelines.
    Re-development of OpenRISC1200 Soft Core with Aspectual Feature Module
    WU Bin;YE Jun
    2011, 7(7):  130-135.  doi:
    Asbtract ( 1289 )  
    Related Articles | Metrics
    The statistics on the OpenRISC1200 project (OR1200 for short) shows that the use of conditional compilation directives reaches up to 714 times, and the lines of code embedded in conditional compilation directives account for 61.60% of the total. Conditional compilation has been widely used in hardware development; however in software development it is not advocated. Therefore, the paper proposes to develop hardware system with Aspectual Feature Module (AFM) so as to avoid the use of conditional compilation. As an example, this paper presents the process of our re-development of OR1200 with AFM. AFM changes the simultaneous development of all features of OR1200 to one-by-one development, and turns the code serving for each feature from tangled to mutual separated. Therefore, it helps a lot for the development and maintenance of OR1200. The paper provides an evident that AFM really can be used in practical hardware design.
    A Tool for Automated Safety Verification on Mathematica
    TIAN Feng;XING Jian-ying
    2011, 7(7):  136-139.  doi:
    Asbtract ( 725 )  
    Related Articles | Metrics
    Safety verification is an important part of program verification. Based on generation of invariants, the paper transforms safety verification to prove whether the invariants set implies the logical formula which specifies the safety. For simple C programs, the paper implements a tool for automated safety verification on Mathematica with Theorema. The experimental results show that the tool can verify safety of C programs with numerical variables only automatically.
    计算机仿真
    Modeling of Electromagnetic Environment Simulation for Radar Based on UML
    ZHANG Yang;HONG Li-na;SHI Chuan
    2011, 7(7):  140-143.  doi:
    Asbtract ( 896 )  
    Related Articles | Metrics
    It is important for radar equipment test and training to research on radar electromagnetic environment simulation. This paper constructs a radar electromagnetic environment simulation system in virtual battlefield, which chooses airplane penetrate on warfare as background. Based on object-oriented technology, the modeling process is described particularly by visualization language UML, parts of simulation models and examples are given.
    Simulation Analysis and Design of Dynamic Fuel Consumption
    TAN Cang-hai
    2011, 7(7):  144-146,.  doi:
    Asbtract ( 740 )  
    Related Articles | Metrics
    This paper analyzes the characteristics of motorized march, and describes the vehicles-following model for simulation of motorized march. By simulating the motorized march, the fuel consumption in motorized march is forecasted. Then the calculation model of dynamic fuel consumption is built up, and the design structure and main functions of simulation system are introduced.
    计算机辅助教学
    Design and Implementation of E-portfolio System Based on B/S Structure
    LIN Yu-hua
    2011, 7(7):  147-150.  doi:
    Asbtract ( 848 )  
    Related Articles | Metrics
    This paper introduces the design and development of E-portfolio system based on B/S structure with multi-user, and discusses the key technology of system development. The system is applied to teaching skills training and assisted network teaching. Further more, this system blends normal students’ learning process, teachers’ teaching process, learning evaluation process into a unity, which provides teachers and normal students with the value of two-way use.
    Development of Network Examination System Based on WebOffice Control
    HONG Zeng-bin;ZHOU Jian-min
    2011, 7(7):  151-153.  doi:
    Asbtract ( 1456 )  
    Related Articles | Metrics
    Network paper illustrated is the basis for network of no-paper examination. Network test to delivery of the pictures embedded in the paper, formulas must be saved directly to the database. How to troubleshoot graphic information in the database at the client and the perfect display, become one of the core technology of no-paper examination system. The article offers a WebOffice based control of network examination paper display technology to address data saved in RTF format in the database’s paper on the subject information in the client back issues, network examination paper that pics takes like a Word file to meet the needs of the growing popularity of no-paper examination.
    Design and Development of Online Assignment Management System Based on J2EE
    LIU Zhen;YANG Sheng-bin;ZHANG Jin-hong
    2011, 7(7):  154-156.  doi:
    Asbtract ( 772 )  
    Related Articles | Metrics
    This system uses the prevailing structure B/S, taking the advantage of JSP, Struts2 and MySQL, to realize the basic function of teacher and student in assignment management system, makes teacher preset assignment be released, achieves transferring of assignment information rapidly, improves efficiency and quality of assignment management.
    数据库与数据挖掘
    Design and Technology Realization of Hydrodynamic Environment System in South China Sea Based on GIS
    WANG Wen-tao;LI Hong-ping
    2011, 7(7):  157-160.  doi:
    Asbtract ( 697 )  
    Related Articles | Metrics
    Using ComGIS to manage observation data collected from South China Sea, and establishing a visualization, human interaction platform system, in order to better analyzing and explaining the South China Sea information, this paper combines the ArcGIS Engine with .NET platforms to do the secondary development, which includs three-tier architecture, and realizes the basic graphic operation of GIS, thematic map, spatial analysis, dynamic tracking, and so on. After testing, the system works well.
    Design and Research on Web Reports Based on Multi-database and Complicated Statistics
    XIAN Jin
    2011, 7(7):  161-164.  doi:
    Asbtract ( 2136 )  
    Related Articles | Metrics
    This paper tells how to use Crystal Reports and ADO.NET to develop reports based on multi-database and complicated statistics. It describes a structured solution which has already used in the line loss system of Zhuhai Power Supply Company. It transforms Crystal Reports to Excel files and uses ADO.NET to read them. It already is of a good effect in practice.
    Design and Implementation of Management System of College Equipment Based on Distributed Database
    ZHAO Xin;CUI Jing
    2011, 7(7):  165-167,.  doi:
    Asbtract ( 793 )  
    Related Articles | Metrics
    This paper uses a heterogeneous database processing technology of distributed database, develops a consistent application of our college facilities-based integrated management of heterogeneous database systems. This system includes not only the original of each faculty resources, but also higher level of coordination of the various forms of integrated device database management platform, making the device information among various departments fully shared.
    Optimization Study of Database Connection Pool Technology Based on ADO.NET
    ZHU Zi-jiang;HU Yi;LIU Dong
    2011, 7(7):  168-171.  doi:
    Asbtract ( 791 )  
    Related Articles | Metrics
    In ADO.NET-based database application development, how to correctly use the ADO.NET connection pool, to avoid the SQL Server client connections open is too high, the database side to form the performance bottleneck is that each application developer very concerned about. Optimization of the article from the perspective of data access technology of ADO.NET connection pool technology in conducting research on a database connection pool based on ADO.NET technology optimization solutions to improve the overall performance of the application system.
    Improvement of Mutual Information of Feature Extraction
    FANG Zhi-long
    2011, 7(7):  172-175.  doi:
    Asbtract ( 1454 )  
    Related Articles | Metrics
    Feature extraction is a crucial part in text mining. After word splitting, the docs of the train set form the original feature space, but the dimension of the space is usually very large, it reaches hundreds of thousands of demensions. After feature extraction, not only the dimension of the space decreases sharply, but also, the impact of the noise is reduced. Finally, speed and precision of the classifier are both increased. This paper improves the original mutual information method, and proves it’s vilid in the experiment.
    Research and Application of Rough Sets Theory in Medical Data Mining
    LIU Xiu-feng;CHEN Zhen-hu;ZHAN Xiu-ju
    2011, 7(7):  176-178.  doi:
    Asbtract ( 1435 )  
    Related Articles | Metrics
    In the field of medical information data mining, the big challenge is how to mine and utilize the huge amount of medical information repository effectively, so as to help the medical research and clinical diagnosis. This paper first introduces the features and status quo of medical data mining, and then analyzes the difference between medical data mining and general data mining, finally discusses a concrete application of rough sets theory in medical X ray pictures and proposes some critical issues involved in it.
    应用与开发
    Model Innovation and Platform Design of Tourism E-business in China
    YU Ping;LU Yan-ling
    2011, 7(7):  179-182.  doi:
    Asbtract ( 1348 )  
    Related Articles | Metrics
    There are four basic types of tourism E-business in China, they are namely information dissemination, tourism enterprise independent online sales, sub-type tourism products online sales and integrated tourism products online sales. These patterns are still in the primary level of E-commerce, they are dull, similar, and lack personality and depth. This article firstly does deep study of the four tourism E-business models, at the same time it cites relevant cases to illustrate, and then analyzes the current limitations existing in tourism E-business models from several aspects, finally explores the innovative E-business models of tourism and developing direction, and finds out the platform design of the E-business system.
    Analysis and Design of Booking System for Opening Experiment and Training Center Based on UML
    YUE Wen-wen;XIAO Xin-yuan
    2011, 7(7):  183-185.  doi:
    Asbtract ( 1446 )  
    Related Articles | Metrics
    In order to make vocational college’s experiment and training centre maximum usage, this paper uses a standard modeling language UML which object-oriented analysis and design, constructs an opening experiment and training center booking system on Web. On the support of the Web booking system, it is fast to achieve opening experiment and training center, and it will promote the rapid progress that college graduate is competent for the job assigned to them.
    Application of Loft in Frame Center Crank Parts Three-dimensional Design
    GUO Ping
    2011, 7(7):  186-188,.  doi:
    Asbtract ( 1439 )  
    Related Articles | Metrics
    The shape of fork parts is complex. The fork parts have multiple structures. Using AutoCAD software to do a three-dimensional model of the fork parts can be tedious since many high-level commands like "stretch", "rotate", "loft", are to be used. Only if the correct method, drawing skills and techniques are mastered, the design can become simplistic. The design cycle and unnecessary duplication of effort can be reduced. Design ability and efficiency can be improved. This article takes an example of loft to describe the modeling AutoCAD lofting principles, methods and applications, expecting the better ideas.
    Design of Files Management System Interface Platform Based on Middleware
    ZHANG Wei-na
    2011, 7(7):  189-191.  doi:
    Asbtract ( 756 )  
    Related Articles | Metrics
    Files management system is used for collecting files in government units and then organizes them to catalog. The interface platform is used to ensure that the file management subsystem and the file management system to communicate directly. The use of middleware can be effectively distributed to design and implement the file management system interface. The paper researches the file management system interface based on the middleware, focuses on analyzing the specific application of middleware technology in files management system interface, and designs the interface platform and security to ensure seamless connection between systems. It can realize the system data exchange and optimizes the development of files management system by using middleware to design interface middleware.
    Design and Implementation of Tourism Events Text Classification System Based on BP-NN
    LIU Xin-sheng;LI Kun
    2011, 7(7):  192-194,.  doi:
    Asbtract ( 1651 )  
    Related Articles | Metrics
    To mine the interrelated infomation from tourism events searched from the Internet, it needs to do text classification job for tourism event texts.This paper finishes the classification job by using ICTCLAS to segment texts, improves IG algorithm to extract features, BPNN algorithm to build the classification system.The final effect is satisfactory.
    Design & Implementation of Urine Sedimentary Analysis System
    ZHUANG Ling-ying;WEN Jun-hao;Yang Dan
    2011, 7(7):  195-198.  doi:
    Asbtract ( 1537 )  
    Related Articles | Metrics
    By integrating the traditional microscope detection methods, the system uses computer and dedicated system software. A/D control circuit, dynamic system, mechanical structure and count measuring device are specially designed to implement that a sample can be automatically sampled, automatically diluted, automatically staining, autolayout, automatically clean and finally auto output the detection data report. Moreover, it can directly show in display of the identification of urine sediment which is not only making the whole process digital automatic but also making the result precise and comparable.
    Design and Implementation of a Graphic User Interface Based on Linux
    WU Chun-xiang
    2011, 7(7):  199-200,.  doi:
    Asbtract ( 1440 )  
    Related Articles | Metrics
    This paper introduces the design ideas and implementation methods of a graphical user interface based on Linux, which is developed via standard C language. It provides the user with a simple graphical user programming interface, on which the user can efficiently and easily develop graphical interface applications with good transplant ability.
    Research on SET Protocol Optimization and Verification of SPIN in Small Amount of Transactions
    WEN Chi-liang
    2011, 7(7):  201-206.  doi:
    Asbtract ( 715 )  
    Related Articles | Metrics
    SET protocol is a very important E-commerce protocol. SET transaction is complex, to complete a transaction process, it needs to verify about E-Cert 9 to verify the digital signature 6 times, to pass the certificate for 7 times, and signature 5 to 4 times to symmetric encryption and asymmetric encryption. This paper selects the core part of the SET protocol: purchase request, payment authentication and secure payment process as three sub-protocol analysis object, amount of transactions for different grades, for the small amount of transactions of optimization of the protocol process, SET for SPIN model checking, simulation and verification according to the analysis results to improve on the SET.