Loading...

Table of Content

    23 December 2011, Volume 12 Issue 12
    网络与通信
    Research on Cloud Storage Performance Evaluation Technology and Methods
    HE Si-min;KANG Mu-ning;ZHANG Xiao;SUN Zhan-wang
    2011, 12(12):  1-4,8.  doi:
    Asbtract ( 527 )  
    Related Articles | Metrics
    Network hard disk (RaySource for short), a cloud storage technology, is a unique data storage space in the Internet for the user. The paper from the user’s perspective, uses network sniffing tool Ethereal, by the way of capturing the file transmitting data packets of the network disk client to determine the transmission time, calculates the transmission rate. Through testing the speed of uploading and downloading files through the client, and comparing its transferring speed of Jinshan fast disk, Dbank and Tianyi disk with different factors, the paper explores the main factors effecting network disk performance among the user using, finally provides a feasible technology and methods for cloud storage products performance evaluation.
    Research Progress on Role-based Access Control
    CHANG Yan-de
    2011, 12(12):  5-8.  doi:
    Asbtract ( 541 )  
    Related Articles | Metrics
    RBAC (Role-Based Access Control) plays an important role in access control which is one of critical technologies for system security. This paper supplies a brief introduction on RBAC at the beginning, then the existing achievements of theoretical and application researches on RBAC from domestic and international are analyzed and summarized, also the problems waiting to be solved and research trends on RBAC in the future are discussed. The paper may provide some new insights and references for the research on RBAC in the future.
    Task-Role-based Workflow Access Control Model with Multi-constraints
    ZHANG Qiang;ZHENG Hong-yuan;DING Qiu-lin
    2011, 12(12):  9-12,1.  doi:
    Asbtract ( 526 )  
    Related Articles | Metrics
    According to the case that the existing access control models can not meet the demands of the workflow system’s security, this paper designs a task-role based workflow access control model with multi-constraints(MC-TRBWAC). Because of adopting dynamic authorization mechanism with multiple fine-grained constraints imposed on users, roles, tasks and sessions, it reduces the administrator’s burdens, avoids some potential safety hazards, well meets the workflow system’s access control requirements and makes the enterprise privilege management become more flexible and security.
    Certificateless-based Two-party Authenticated Key Agreement Protocol
    LI Guo-peng;LIU Xiao-qiong
    2011, 12(12):  13-16.  doi:
    Asbtract ( 523 )  
    Related Articles | Metrics
    A certificateless-based two-party authenticated key agreement protocol is proposed based on bilinear pairings in elliptic curves, the elliptic curve discrete logarithm problem and CDH. Avoiding the key escrow issues inheried in the identity-based schemes effectively and preventing active attack by identity authentication. After confirming the correctness, the formal analysis based on applied pi calculus shows fulfilled authentication and secure. Compared with other two-party authenticated key agreement protocols, the newly proposed key agreement protocol has better security and efficiency.
    Research on Internal Structures and Efficiency for Implementing Embedded TCP/IP Protocol Stack
    GE Qian-qian
    2011, 12(12):  17-19,2.  doi:
    Asbtract ( 503 )  
    Related Articles | Metrics
    The key point of embedded internet technology is to implement TCP/IP communication protocol on MCU. Most of embedded protocol researches stay on the implementation of protocol and software optimization, many researches study on TCP/IP memory management and design.There are little researches work on system architecture level and hardware/software collaboration. The paper analyzes from hardware execution speed and software internal structure, and implements and compares the embedded TCP/IP implementation in different applications, different technologies. Ultimately, it gives optimal solution for embedded TCP/IP protocol stack on industrial control system.
    Protocol Conversion Between Ethernet and CAN Bus
    WEI Juan;JIANG Dao-xia
    2011, 12(12):  20-22,2.  doi:
    Asbtract ( 460 )  
    Related Articles | Metrics
    CAN bus and industrial Ethernet are more and more used in the mine building. But in the layer of data management about mining, industrial Ethernet based on standard TCP/IP protocols has been widely used. Therefore, the study about connectivity between CAN bus and Ethernet has an important practical significance.
    This thesis offers a solution about connectivity between CAN bus and Ethernet on the basis of studies about them. And also control and management are unified. At the same time, this thesis standardizes the information of application layer and unifies the data format of a variety of monitoring equipment according to the characteristics of coal mine monitoring system. It is useful for the management layer on data processing.
    Research on Vehicle Monitorting System and Reliability of Data Communication Based on GPRS
    ZHANG Jin-feng;ZHU Yan;HAN Guo-sheng
    2011, 12(12):  23-26.  doi:
    Asbtract ( 525 )  
    Related Articles | Metrics
    Based on embedded system, GPS and GPRS, software architecture design of engineering technology, the paper gives the design and research for vehicle monitoring system and expounds the system’s overall structure and module function. Because of using the UDP communications protocols for system’s data transmission and poor construction environment, communication is easy to appear the issues that packet lose and car terminal disconnect. For that, the paper provides a solution in data communication protocol formulation in interactive mechanism, improving the reliability and performance scandalous.
    Research on SMS Alarm Flow Monitoring Based on Cacti Threshold Plug-in
    MA Yan-tu;KANG Li-jun
    2011, 12(12):  27-29.  doi:
    Asbtract ( 608 )  
    Related Articles | Metrics
    In view of the importance of flow monitoring in network management, the article poses and designs a SMS alarm monitoring system with RedHatAs5 based on the Cacti. The system uses B/S structure, with the Cacti as monitoring manager, and installs threshold plug-in and fetion software. It achieves continuous centralized flow monitoring of network appliances in the whole network. By means of setting running state threshold of monitoring device on Cacti, the system can give a SMS alarm when the network appliance appears unusual flows. As a result, the experimental results and practical applications verify the validity of this system.
    Application of VPN Routers in Construction of Remote Network
    SUN Jia-shui
    2011, 12(12):  30-32,3.  doi:
    Asbtract ( 505 )  
    Related Articles | Metrics
    This paper describes the service mode and networking technology of VPN router, and studies how to use the VPN routers to realize the internal virtual network and develops virtual network within the enterprises.
    Implementation of Adaptive Equalizer with FPGA
    HE Kang-kang;FENG Yan;PANG Rui-fang;CHEN Tao
    2011, 12(12):  33-36.  doi:
    Asbtract ( 578 )  
    Related Articles | Metrics
    In wireless communication system,because of multipath effect, intersymbol interference (ISI) is inescapable during the data transfer. In order to eliminate ISI, equalizer has to be used in the receiver. This paper designs a 8-taps complex filter which is implemented on the Stratix II family EP1C20F324C6 chip with transversal filter structure and parallel computing architecture on the FPGA hardware platform based on top-down design methodology. Last, the result of simulation shows that it realizes adaptive equalizer and reduces the error rate when I, Q error signal are close to zero under the Quartus II environment.
    Design and Realization of Information Exchange Platform Based on .NET
    CHANG Hong-wei
    2011, 12(12):  37-40.  doi:
    Asbtract ( 508 )  
    Related Articles | Metrics
    This paper introduces the system structure design of information exchange platform and the environment prototype development technique based on .NET. On how to design and implement an information exchange platform based on .NET framework, it has conducted in-depth research and analysis, discusses the system structure, main components, data exchange process, and gives a design and implementation scheme.
    算法分析与设计
    Partner Selection Model in Supply Chain Based on Grey Relational Analysis and Genetic Algorithm
    LI Hong-lai
    2011, 12(12):  41-44.  doi:
    Asbtract ( 507 )  
    Related Articles | Metrics
    Partner selection in supply chain is usually a typical multi-objective decision-making problem. In order to solve the problem, this paper proposes a new method. First, the partner selection problem is transformed into single objective decision-making model by using the method of grey relational analysis, then an adaptive genetic algorithm is proposed to solve the model, which makes sure the solution is globally optimal. Finally, a typical simulation is carried out to illustrate its validity.
    Algorithm Research of Adaptive Noise Canceller Based onMulti-microphone Arrays and Beamforming
    WEI Xu;ZHAO Ping;TAN Jing-jing
    2011, 12(12):  45-47,5.  doi:
    Asbtract ( 537 )  
    Related Articles | Metrics
    This paper presents a microphone array with delay and sums beamforming (DASB) while using an adaptive noise canceller (ANC) with reference microphone array to suppress coherent as well as incoherent noise in disturbed speech signals. The algorithm does not rely on any signal model and dispenses with assumption of statistical properties of noise. It can be seasoned with changes of background and used for target speech recognition. The algorithm is of good real-time performance and robustness. The simulation results demonstrate that the proposed method works well in the environment with different noise.
    Design and Implementation of Efficient IDEA Encryption Algorithm Based on CUDA
    ZHU Xing-feng
    2011, 12(12):  48-52.  doi:
    Asbtract ( 596 )  
    Related Articles | Metrics
    With the parallel processing capability of Graphics Processing Unit(GPU), design and implementation of IDEA algorithm is proposed as an efficient encryption and decryption algorithm, which is elaborated in this paper. Both traditional CPU-based and new one based on GPU are implemented. At last, the performance based on GPU is analyzed, which runs much faster than the traditional approach.
    Reactive Power Optimization Based on Random-adaptive Particle Swarm Optimization in Electric Power System
    ZHOU Xuan
    2011, 12(12):  53-56.  doi:
    Asbtract ( 540 )  
    Related Articles | Metrics
    Reactive power optimization is an effective method to ensure the safe and economic operation of electric power system, and one of the important measures to improve the voltage quality. At first, this paper introduces the general mathematical model of reactive power optimization, then the structure and principle of particle swarm optimization algorithm are analyzed, and then a kind of improved particle swarm optimization algorithm is proposed. The algorithm can vary the current local optimal value by adopting the random adaptive strategy, then returns again to search the global optimal value, which can effectively improve the disadvantages about low convergence rate and easy to trap in local optimization of the traditional particle swarm algorithm in solving reactive power optimization problems. To a certain extent, the optimization ability of particle swarm algorithm is increased. Finally, the simulation experiments and comparisons on IEEE 30-bus system show that the proposed algorithm is feasible and effective to improve the quality of power supply and reduce line loss.
    Research and Realization of Endpoint Detection Algorithm in Speech Recognition ASIC
    JIN Yue-ying
    2011, 12(12):  57-59,7.  doi:
    Asbtract ( 502 )  
    Related Articles | Metrics
    This paper puts forward a simplified two-threshold speech endpoint detection algorithm for speech signal based on short-term energy and zero-crossing rate. Building a simulation platform of Matlab algorithm, and the experimental results show that the two-threshold speech endpoint detection algorithm for speech signal based on short-term energy and zero-crossing rate is better than cepstrum, fractal, and spectrum entropy method of endpoint detection, under the premise of computing complexity and computing quantity.
    This paper completes the various modules of the design, simulation and systems integration with the Verilog language, using fixed-point design approach, the voice signal sampling frequency of 8kHz, the data for each sample 8bits, the internal stability of the chip operates at 20MHz, the coefficient of linear prediction obtained by the circuit compares with simulation results on Matlab platform, the error rate less than 0.2 percent, on conditions of 200 source words, it can achieve an average of more than 90% of the result of recognition.
    软件工程
    Static Program Slicing Tool with Real-time Stack Information
    GONG Feng-guang;LI Xia;WANG Wen-wen;JIANG Shu-juan
    2011, 12(12):  60-62,6.  doi:
    Asbtract ( 493 )  
    Related Articles | Metrics
    In order to improve the accuracy of static program slicing, this paper designs and implements a static slicing tool with real-time stack information. The technology is to find out those methods or statements that are surely not executed, through speculating the program execution paths using stack trace information, which would be generated when an exception is thrown. Experiment results show that the slicing tool can reduce search space further, and improve the accuracy and efficiency of the general static slicing method.
    Static Program Slicing Tool with Real-time Stack Information
    GONG Feng-guang;LI Xia;WANG Wen-wen;JIANG Shu-juan
    2011, 12(12):  60-62,6.  doi:
    Asbtract ( 486 )  
    Related Articles | Metrics
    In order to improve the accuracy of static program slicing, this paper designs and implements a static slicing tool with real-time stack information. The technology is to find out those methods or statements that are surely not executed, through speculating the program execution paths using stack trace information, which would be generated when an exception is thrown. Experiment results show that the slicing tool can reduce search space further, and improve the accuracy and efficiency of the general static slicing method.
    Contract-based Mutation Component Software Testing Techniques
    LIU Guo-li;ZHANG Ding-ding;ZHANG Bin
    2011, 12(12):  63-66.  doi:
    Asbtract ( 503 )  
    Related Articles | Metrics
    The application ideas of mutation algorithm to generate test data is presented, and the different mutation operators and the fault classes in the relationship between implicitness are analyzed. Applying this algorithm to the contract-based mutation of components, the validity of test data is improved, and the final test data are simplified. That’s overcome inefficiencies of traditional contract for testing components which produces a large number of contract mutants.
    Information System Modeling of Shopping Membership Card Based on RUP and UML
    2011, 12(12):  67-70.  doi:
    Asbtract ( 442 )  
    Related Articles | Metrics
    Rational unified process is an advanced software development process, unified modeling language is a powerful visual modeling language. This paper combines with the information system of shopping membership card, follows the RUP phase of the life cycle, and uses UML modeling system. In the process of system modeling, model building can be corresponded derivation and conversion. The guidance of software development combined RUP with UML, improves the quality and efficiency of software development and maintenance.
    Design and Implementation of Permission System Based on Region
    ZHU Yong-sheng;HAO Yong-sheng;WANG Jun
    2011, 12(12):  71-74.  doi:
    Asbtract ( 509 )  
    Related Articles | Metrics
    Permission management is important issues to information system developers, improving permission management solution of system is one of the most import aims for application developer. The permission control system based on the region achieves by access control and regional associations. It needs implement permission control, and most importantly, the data must have different visibility for the different user of region. This paper illustrates the relevant implementation based on an example of public weather services of an online survey system.
    Analysis and Study of Software Product Surveillance Key Points
    REN Qiang;;SONG Li-hua;;ZHANG Jian-cheng;;HUANG Yu-qiang;;XU Xing-min;
    2011, 12(12):  75-77,8.  doi:
    Asbtract ( 467 )  
    Related Articles | Metrics
    The view of software product surveillance is proposed, the work content and key points of software product surveillance are analyzed and studied.Combined with practical experience in project surveillance, the phase of software product surveillance is analyzed, the work contents and key points are studied, the surveillance key points of installation and deployment Oracle software in IBM cloud platform environment are introduced, the significance and type of communication in the information engineering surveillance are discussed. Based on the surveillance of Dongying Software Park Oracle public technical service platform, the software product surveillance is analyzed. Analysis and study of software product surveillance are more important to improve the quality of software engineering surveillance.
    Research on Software Automatic Test Method Based on Cause-effect Diagram
    ZHANG Wei;WU Li-ming
    2011, 12(12):  78-81.  doi:
    Asbtract ( 505 )  
    Related Articles | Metrics
    This thesis introduces white-box test, black-box test and software test automation technique in the methods of software test. The quality between white-box test and black-box test is analyzed in the test of user access management system. And test cases are designed based on the cause-effect diagram method of black-box test. At the same time, the automatic test script based on shell script language of Linux operation system is practically applied to the user access management system, which indicates a novel way how to carry out automatic test based on the cause-effect diagram.
    数据库与数据挖掘
    Design and Implementation of Financial Data Auditing System Oriented to XBRL
    YU Jin-hua;HE Xiu-xing;CHEN Geng;CAO Qi-chen
    2011, 12(12):  82-85,8.  doi:
    Asbtract ( 505 )  
    Related Articles | Metrics
    The tool of XBRL provides a platform for improving efficiency of analyzing the financial reports of the listed company in our country. A soft system of analyzing and auditing financial data with clustering data mining techniques oriented to XBRL is developed for investors or auditors to extract the valuable information from the mass of financial data. Taking the division basis by each of the financial data item in business operation’s relative value, using financial data item target characteristic value to establish similar criterion, the results could help the auditors to enhance the efficiency and quality of analyzing and auditing the financial reports efficaciously.
    .NETbased Database Access Optimization Strategy
    WANG Yun-xiao;ZHANG Xue-cheng
    2011, 12(12):  86-88.  doi:
    Asbtract ( 536 )  
    Related Articles | Metrics
    In an application system, if there are database access operations, the performance of database operations will directly affect the performance of application. This paper introduces the optimization of .NET- based data access technology, including the database connection pooling, the selection skill of data object, the technology of close connection, data caching technology, and optimization of SQL query statements. It improves the application performance by optimizing the database access.
    Research on Massive Data Access Based on J2EE
    HE Mi-mi;SUN Zhong-lin;ZHANG Yu
    2011, 12(12):  89-91,9.  doi:
    Asbtract ( 560 )  
    Related Articles | Metrics
    A fast response speed is one of the standards of application system design, especially the application systems based on Web, it impacts the value of the system. This paper discusses the optimization techniques of massive data access based on J2EE architecture, and gives the testing results of these optimization techniques.
    Design and Implementation of HRTF Database Based on BHead210
    WU Jie;TIAN Xiao-hai
    2011, 12(12):  92-96.  doi:
    Asbtract ( 568 )  
    Related Articles | Metrics
    Head-related transfer functions (HRTFs) describe the transfer process of sounds from a point source to a point of the listener’s ear canal. It includes all the necessary information of sound localization. This paper constructs an HRTF measurement system and builds an HRTF database. This database consists of head-related impulse response(HRIR) data of the BHead210 dummy head which reflects the average Chinese head. The HRIR data are sampled at 481 different spatial positions in total. A comparison study between HRTF data of BHead210 and KEMAR is carried out on the HRTF-based virtual auditory.
    Research on Realization of Character String Section Sort with CLR in SQL Server
    QIN Gui-ying
    2011, 12(12):  97-98,1.  doi:
    Asbtract ( 489 )  
    Related Articles | Metrics
    It is difficult to do some complex string operation in T-SQL. As the integration of CLR in SQL Server, C # language development program to solve string operation problems is used. This paper gives the basic presents on the application of CLR in SQL Server, and discusses in details how to use SQL CLR integration to achieve a key step in the string section and sort code, and verifies by the examples.
    Realization of Universal Query Technology Based on Delphi
    YANG Jian-ping
    2011, 12(12):  99-102.  doi:
    Asbtract ( 523 )  
    Related Articles | Metrics
    During the process of the function of the application program design, the function of data query is usually needed to design. Generally speaking, the retrieval conditions and the results of data query vary from different data collections. Sometimes, even if it has the same data collection, the retrieval conditions and the results are different because of different application demands, time and places. Sometimes, it needs to preserve the frequently used retrieval conditions. The application program, which is able to deal with these conditions comprehensively, has stronger vitality. This paper discusses the implementation technology of universal query used in Delphi 2007.
    Study on Hierarchical Storage Technique and Design of Data WarehouseStructure for Business Analysis System
    OUYANG Jing;LI Lan-you
    2011, 12(12):  103-105.  doi:
    Asbtract ( 460 )  
    Related Articles | Metrics
    The construction process and implementation method of business analysis system are described, and four-layer architecture design pattern of data warehouse is shown. Based on the implementation practice, life-cycle management technique and data backup management measures of business analysis system, the data hierarchical storage management technique is proposed with four-layer architecture design pattern. The practical application in telecommunication company can raise equipment’s operating factor and the data online/near-line time and ensure the recoverability and troubleshooting timeliness of data.
    Research on Query Optimization Technology in Distributed System Based on Semi-join
    CHEN Ge;SHI Li;LI Ye-bai
    2011, 12(12):  106-108,.  doi:
    Asbtract ( 523 )  
    Related Articles | Metrics
    On the base of analysis and comparison of the system structure and the target of query optimization between distributed database system and centralized database system, this paper summarizes the query processing and optimization of distributed database, describes the semi-join technique which is very effective in the distributed query optimization technology, and further, discusses the distributed query optimization method based on semi-join——the PERF join technology.
    Research on Data Mining Based on Privacy Protection
    RAO Lan-xiang
    2011, 12(12):  109-111.  doi:
    Asbtract ( 536 )  
    Related Articles | Metrics
    Along with the network security issues are paid more and more attention, how to do a good job in data mining privacy protection has become a current hotspot. How to avoid revealing private or sensitive information in the mining process, and to obtain more accurate mining effect, data mining has become a hot topic. Combining data distribution with data mining, this paper analyzes several key privacy protection method, gives the algorithm evaluation, finally proposes the data mining privacy protection research direction in the future.
    图像处理
    A Transmission Method for Remote Screen Images
    ZHANG Ya-miao;LI Wen-jun;GUO Jian;LI Zhen-feng
    2011, 12(12):  112-114.  doi:
    Asbtract ( 566 )  
    Related Articles | Metrics
    Using VC ++ 6.0 for development environment, the paper realizes the pure software Web server program and client program. Server program collects the real-time screen image, and compresses it highly. Using CAsyncSocket, the client program real-time receives, decompresses and displays the image. It can meet the general needs of the synchronous video transmission.
    Research on Unsupervised Business Card Areas Extraction in Images
    LIU Shuang
    2011, 12(12):  115-117.  doi:
    Asbtract ( 491 )  
    Related Articles | Metrics
    This paper proposes an approach to extract business card areas in images. By means of Canny edge detection, connected component analysis, and polygonal approximations, it could locate the card areas. This method has less computational cost than classic clustering algorithms, and it’s robust.
    A Method of Feature Extraction Based on Uncorrelative UDP
    LIU Fen-xiang;LI Yong-zhi;SHEN Feng-xian
    2011, 12(12):  118-120,.  doi:
    Asbtract ( 526 )  
    Related Articles | Metrics
    This paper presents a modified Unsupervised Discriminant Projection algorithm called Uncorrelative UDP, and application value of this identification method is explained by example. The purpose of the method is to seek a set of best identify vectors: after the projection transformation, feature space nonlocal scatter is maximum, local scatter is minimum, the statistics correlation between the best identify vectors is reduced. Through the simulations in different face libraries, the results verify the effectiveness of the proposed algorithm is improved and is partly superior to the existing UDP algorithm.
    Research on Technology of Quantum Tomography Based on Compressed Sensing
    LIU Hong-jiang;LI Wen-ying
    2011, 12(12):  121-125.  doi:
    Asbtract ( 495 )  
    Related Articles | Metrics
    This paper establishes the methods for quantum state tomography based on compressed sensing. These methods are specialized for quantum states that are fairly pure, and they offer a significant performance improvement on large quantum systems. In particular, they are able to reconstruct an unknown density matrix of dimension d and rank r using O(rdlog2d) measurement settings, compared to standard methods that require d2 settings. The methods have several features that make them amenable to experimental implementation: they require only simple Pauli measurements, use fast convex optimization, are stable against noise, and can be applied to states that are only approximately low rank. The acquired data can be used to certify that the state is indeed close to pure, so no a priori assumptions are needed.
    计算机控制
    Design and Realization of Special Vehicle Dynamic Monitoring System Based on 3G Technologies
    ZHAI Xiao-bin;E Da-wei
    2011, 12(12):  126-1128.  doi:
    Asbtract ( 553 )  
    Related Articles | Metrics
    In order to solve the problem that can not be real-time monitoring during transport in special vehicles, this article introduces special vehicle dynamic monitoring system based on 3G/GIS/GPS technologies, discusses the advantages of WCDMA-3G communication technology, gives the composition structure, design principles and implementation functions of the system
    Design and Implementation of Satellite Parameter Monitoring System Based on NetBeans Platform
    LI Guo-jun;SUN Na
    2011, 12(12):  129-132,.  doi:
    Asbtract ( 523 )  
    Related Articles | Metrics
    The paper introduces one satellite parameter monitoring system based on NetBeans platform, which is adopted for user interface design. JFreeChart is adopted for realtime curve plot, while Hibernate for database table mapping. Furthermore, the paper focuses on three aspects which are useful for satellite ground station test system development: the usage of JFreeChart in NetBeans platform, communication between NetBeans platform modules and application of Hibernate technology in JavaDB development.
    Research on De-noising Methods for Pulsed Eddy Current Signals Based on Wavelet Analysis
    PENG Xue-wen;WANG Wei;SHAN Chun-lei;FU En-min
    2011, 12(12):  133-137.  doi:
    Asbtract ( 536 )  
    Related Articles | Metrics
    This paper utilizes multi-scale decomposition and reconstruction technology of wavelet and wavelet packet analysis(WPA) technology to do preprocessing for signals,separates noises from pulsed eddy current(PEC) testing signals and removes them. Discrete wavelet transform (DWT) and wavelet packet analysis (WPA) de-noising methods are used for PEC testing signals. Under the pre-condition of retaining useful component of the signals, combining with SNR and RMSE to compare the methods and the best de-noising method is recommended. The results show that threshold entropy principle method of WPA is better than others.
    Research and Design of Radio Group Control in Group Gymnastics
    SONG Zhong-hui;MA Xiao-tie
    2011, 12(12):  138-140.  doi:
    Asbtract ( 455 )  
    Related Articles | Metrics
    According to color activity of group gymnastics, a design of wireless transmitters and receivers based on CC2430 is proposed. The performers’ clothing can be controlled by wireless node through this equipment. This article explains software and hardware design of this equipment in detail.The experiments show that it can not only save training time but also reach good effect. It will be very useful for group gymnastics.
    Method of Robot Self-localization in RoboCup3D Simulation System
    YAO Qian-yan;YANG Yi-min
    2011, 12(12):  141-143,.  doi:
    Asbtract ( 533 )  
    Related Articles | Metrics
    In RoboCup3D simulation game, the robot self-location is very important, inaccurate location will have serious affect on simulation game.In order to simulate the real environment, it adds visual noise in the game, which makes it more difficult to locate the robot.In this paper, considering the robot visual features of RoboCup3D simulation, it proposes an observations weighted fusion Kalman filter approach to realize robot self-location, using this method to get more accurate observations.The simulation experience result shows that the method greatly improves the accuracy of robot self-location.
    Design of Time-triggered Multi-task Scheduler Based on LM3S811
    LI Fan;ZENG Lian-cheng;YAN Jian
    2011, 12(12):  144-146,.  doi:
    Asbtract ( 553 )  
    Related Articles | Metrics
    Multi-task scheduling is one of the key issue for embedded system. Time-triggered mode has some advantages such as the features of being real-time and highly predictable. In this paper, a novel time-triggered mode multi-task scheduler is designed. A structure of time schedule is proposed which consists of time processes and task status. The time process indicates the task period, and task status indicates the ready state of a task. The system status transferring is controlled by state transfer function.Finally, the ball game is designed on LM3S811 hardware platform with time-triggered mode.
    多媒体技术
    Optimized Collision Detection Algorithm of Virtual Scene Roaming System
    XIE Ji-gang
    2011, 12(12):  147-149.  doi:
    Asbtract ( 523 )  
    Related Articles | Metrics
    Most collision detection algorithms based on 3D level are relatively complex, and it requires a lot of scene data to support. According to the characteristics of the virtual scene roaming system, this paper proposes a collision detection algorithm where 3D collision is simplified into 2D. The practice shows that the algorithm can not only greatly improve the efficiency of detection, but also meet the actual needs.
    Design and Implementation of 2D Self-drawn Saved Game
    ZHANG Xiao-jie
    2011, 12(12):  150-153.  doi:
    Asbtract ( 441 )  
    Related Articles | Metrics
    This paper discusses the design and implementation of a self-drawn 2D saved game based on SQL Server 2005 and Win32 application, chooses VC++ 6.0 as development tool, and uses map editor to interact with database, relative coordinates help to achieve a smooth moving picture, and uses double buffer method to solve the problem of flicker when drawing.
    操作系统
    Research on Reconstruction Method of Linux Derivative Version
    WANG Liang-liang;;KOU Xiao-bin;YANG Qin;
    2011, 12(12):  154-157.  doi:
    Asbtract ( 538 )  
    Related Articles | Metrics
    In accordance with the disadvantage that Linux can’t meet the users’ immediate demand, the software has been reconsructured through more scientific designs so that the repetitiveness can be avoided when it is deployed and usability and practicality can be improved at the same time. The paper summarizes the characteristics of current popular derivative version of Linux. Taking Fedora14 as an example, the paper analyzes a series of reconstruction theories such as, the structures of the compact disc, the functions of software package, loading of procedures, transferring of data, mode of construction, behavioral control and so on, so that a reconstruction mode based on the way Kickstart has been developed.
    Design and Implementation of Windows Terminal File Protection System
    ZHAO Fu;YANG Wei-yong;HUANG Yi-bin
    2011, 12(12):  158-160.  doi:
    Asbtract ( 585 )  
    Related Articles | Metrics
    For resolving the problem on the safety of Windows terminal file system, the paper proposes integrated smart card authentication, file filtering, file access black and white lists, file access auditing, physically removing the file, cache file removal and other technical documents for end protection. Experiments show that the system is safe, efficient, easy to use.
    应用与开发
    Post-merger IT Integration Strategy: A Case Study
    LIN Tzu-ming;LO Sheng-wen;KUAN Chin-fu;SU Ya-hui;HO Ching-yuan
    2011, 12(12):  161-164.  doi:
    Asbtract ( 537 )  
    Related Articles | Metrics
    M&A is one popular tool for competitive advantage. IT integration is regarded as an important factor on the success of post-merger. Some authors who adopt alignment perspective argue that the IT integration strategy should align with the M&A strategy. This paper argues that the IT integration strategy needs to consider (1) cooperation between IT departments and (2) cooperation between IT and business departments among M&A. This study attempts to examine the post-merger IT integration strategy from practical perspective.
    This paper proposes an IT integration analysis framework based on enterprise engineering (Martin, 1995) to identify (1) some factors which influence on the planning of, (2) the execution of the IT integration strategy, and (3) the standardization of IT and business functions during the integration process. The cases study shows that in planning phase the IT integration strategy should refer to business department’s integration strategy. Both the key men’s participation and the standardization of IT and business process will facilitate the execution of IT integration.
    Study of Power Quality Monitoring System of Rural Power Grid Based on DSP+ARM
    DU Juan;ZHANG Jin;LIU Bing;XU Qing-song
    2011, 12(12):  165-167.  doi:
    Asbtract ( 511 )  
    Related Articles | Metrics
    According to rural power grid power quality problems, the embedded system centered on DSP and ARM is designed to detect rural power grid power quality. In the embedded Linux operating system software platform through the QT/Embedded, the friendly man-machine interface is realized, Taking TMS320VC5416 data processor and Samsung S3C2410 as the hardware core, SPI is used to achieve DSP and ARM serial port communication, and the Hilbert-Huang transform (HHT) algorithm is used to detect the rural power grid power quality. It has greatly increased the capability of rural power grid power quality monitoring while providing an important basis for the reconstruction of rural power grid.
    Design of Portable ECG Monitor Based on Embedded Technology
    GUAN Zhong-ling;YANG Xue-ping;WU Xu-deng;TIAN Fu-ying;ZHU Zheng-kang
    2011, 12(12):  168-170,.  doi:
    Asbtract ( 489 )  
    Related Articles | Metrics
    This paper introduces the design and implementation methods for a kind of portable ECG monitor based on embedded technology. It has functions of real-time data acquisition, display, automatic processing for ECG signals and alarm etc. It selects 32 bit microprocessor of low power consumption, which is based on ARM9, as the core of the system. For ECG signals processing, it applies a filter at 50 Hz and suitable detection algorithm for R wave. The system has good reliability and accuracy. It meets the needs of families and the individuals with the features of simple operation, small size and easy to carry etc. It will be used as a good auxiliary equipment of diagnosis, treatment and monitoring for doctors.
    Introduction of Wireless Sensor Network and Its Application in Pig Breeding
    LI Liang-min;FANG Kui;XIONG Da-hong
    2011, 12(12):  171-175.  doi:
    Asbtract ( 519 )  
    Related Articles | Metrics
    With the wide use of information technology, the informatization of pig breeding is imminent. Wireless sensor network as the main research object, its key principles and technical features are introduced and its application prospects in pig breeding are expounded systematically. The latest research statue about pig breeding based on wireless sensor network is analyzed and the shortcomings exposed during the practical application are discussed.
    Design of WSN Gateway Used to Sense Information of Coal Mine
    YAN Jun;GAO Hang;ZHAO Guo-an
    2011, 12(12):  176-178,.  doi:
    Asbtract ( 476 )  
    Related Articles | Metrics
    The signal sent by sensor nodes is easy to interference by mining machinery, the environment of mine is very wet, which is not good for signal transmission, but the transmission of alarm signal requires high reliability and real-timing. This paper in-depth analyzes the special application environment and requirement of coal mine, and describes the hardware and software design of a WSN gateway which is used to sense the information of coal mine. It can meet the requirements of the special environment.
    Design and Implementation Methods for Soft Keyboard Based on Linux Qt
    TIAN Fu-ying
    2011, 12(12):  179-181.  doi:
    Asbtract ( 496 )  
    Related Articles | Metrics
    This paper introduces the design method for a soft keyboard based on Linux Qt, based on the Linux operating system Ubuntu. This keyboard includes most of the functions of the general keyboard and can be operate easily with friendly interface. It can be applied on all kinds of devices which have a touch screen, based on Linux operating system.
    Application of Recursive Procedures Non-recursive Algorithm in Enterprise Production
    ZHU Chang-yuan
    2011, 12(12):  185-187,.  doi:
    Asbtract ( 467 )  
    Related Articles | Metrics
    Non-recursive algorithm derived by converting recursive algorithm can improve computation efficiency significantly. This paper takes an enterprise material cutting application case, through mathematical modeling, algorithm analysis and implementation in practice to prove that this method is very good.
    Research and Realization of Thermodynamic Database Symbolic Manipulation System
    HU Yuan
    2011, 12(12):  188-190.  doi:
    Asbtract ( 623 )  
    Related Articles | Metrics
    Inorder to solve the problem of ther modynamic database symbolic manipulation, this paper analyses the integration method of thermodynamic database and Matlab, constructs a thermodynamic database symbolic manipulation system based on Matlab and Web Service to simplify the symbolic manipulation. The paper also realizes heterogeneous thermodynamic database with the thermodynamic database symbolic manipulation system integration.
    An Improved Intelligent SWJS Cloud Platform
    ZHU Cui-miao
    2011, 12(12):  191-194.  doi:
    Asbtract ( 500 )  
    Related Articles | Metrics
    Based on SWJS cloud platform and according to the intelligent equipment, embedded devices and services node automatic processing requirements, they are joined SWJS platform,including embedded equipment, intelligent mobile phone, SMS cat, intelligent server and etc. intelligent SWJS cloud platform is realized composed of the intelligent cloud user layer, cloud layer, control layer, smart cloud service resource layer, data service layer and the data resources layer and etc. the platform focus on the design of automation process, the system user behavior defense module is designed in response to user behavior diversity, 22 hotels is for tested in the platform,the results show a rapid, automated, transparent and paperless characteristics.
    Design and Implementation of Staff Training Management System Based on C/S Structure
    SONG Dan
    2011, 12(12):  195-198.  doi:
    Asbtract ( 498 )  
    Related Articles | Metrics
    The thesis mainly introduces the design and implementation of a staff training management system. First, the article introduces the needs of developing the system, and gives a simple introduction to the development tools and environment adopted in the system. Next, the requirements are analyzed, and logical database design of the system is made clear and the functional modules are divided. On the basis of this, the article describes the structures of the tables in the database, and then gives the detailed implementation technologies of the primary modules.