Loading...

Table of Content

    29 June 2011, Volume 1 Issue 6
    图像处理
    A Spatial Error Concealment Method for Postprocessing Based on H.264
    WANG Wei;YANG Jing;LIU Xi-zhen
    2011, 1(6):  1-4.  doi:10.3969/j.issn.1006-2475.2011.06.001
    Asbtract ( 791 )  
    Related Articles | Metrics

    Compressed streams in the video communication channel transmission, for reasons like the channel is not ideal and so on, are prone to damage or loss of data packets. In order to combat channel error to improve video quality, a spatial error concealment method for intracoded picture is proposed on the basis of postprocessing H.264 edge detection and multidirectional interpolation, which is in accordance with the direction of the image boundary information to select multiple error concealment method of interpolation. The experimental results show that for the image with a border region, this approach effectively improves the hidden effects of error images with a less complex algorithm. The feasibility of the method is verified, which provides a certain reference value for engineering applications.

    Medical Edge Detection Based on Maximizing Objective Function
    LU Sheng-qiang;LIU Rui-ling
    2011, 1(6):  5-3.  doi:10.3969/j.issn.1006-2475.2011.06.002
    Asbtract ( 814 )  
    Related Articles | Metrics
    A novel edge detection method for medical image is proposed for the characteristics of the medical images and drawback of classical method. The characters of ideal image edge of 3×3 mask are considered and two pixel sets in the mask are used to construct an objective function. By distance measure, the values of the objective function corresponding to four directions can be determined and the edge intensity is computed. Then a max value of each pixel in the mask can be obtained. Through comparing with threshold given and by applying nonmaxima suppression method, the pixel can be judged that it is or not an edge pixel. At last, the edge points of the image are extracted by doublethreshold connecting. Experimental results show that the proposed algorithm performs well in terms of the ability to detect the edge and noise. The final edge image is precisely localized with single pixel.
    Research on Fisheye Image Calibration and Registration Algorithm
    ZHAO Yi-li;XU Dan
    2011, 1(6):  8-3.  doi:10.3969/j.issn.1006-2475.2011.06.003
    Asbtract ( 881 )  
    Related Articles | Metrics

    A new algorithm is presented to realize fisheye images calibration and registration. By remapping fisheye images from equidistance model to parametric spherical model, spherical panorama creating becomes a translation problem. Nonlinear optimizing algorithm is used to do image registration. Interactive and realtime rendering can be achieved by reprojecting the spherical panorama onto the view plane.

    Research on Virtual Navigation System Based on Panoramic Images
    ZHAO Yi-li;XU Dan
    2011, 1(6):  11-4.  doi:10.3969/j.issn.1006-2475.2011.06.004
    Asbtract ( 812 )  
    Related Articles | Metrics
    This paper proposes a virtual navigation system based on panoramic images. In order to stitch the images automatically from different perspectives, first extracts feature points from the scale space of the images, and assigns the main orientation. Feature vector can be calculated based on neighborhood information, and initial feature points matching can be calculated by using the distance ratio of the nearest neighbor feature point and the next nearest neighbor feature point. Feature matching refinement can be accomplished by using the RANSAC (Random Sample Consensus) algorithm, while calculating transformation parameters between the two images. After completion of image stitching, different perspective views of the scene can be obtained by reprojection algorithm, and gives user an immersive experience.
    Blocking Artifacts Reduction Algorithm Adapted to Vision Perception
    ZHAO Wei-bin;ZHOU Zhi-heng;PENG Jian-xin
    2011, 1(6):  15-3.  doi:10.3969/j.issn.1006-2475.2011.06.005
    Asbtract ( 852 )  
    Related Articles | Metrics
    Addressing to the blocking artifacts appearing in the coded image, a blocking artifacts reduction algorithm directed by human vision perception is proposed. Traditional algorithms often cause losing image edges, to solve this problem, adaptived filter and fuzzy reasoning techniques are used for the pixels suffering blocking artifacts. Simulation results show that the proposed algorithm outperform the traditional ones.
    Gradientbased Fusion of Multiexposure Images
    WU Wei-hua;ZHONG Sheng
    2011, 1(6):  18-4.  doi:10.3969/j.issn.1006-2475.2011.06.006
    Asbtract ( 1546 )  
    Related Articles | Metrics
    This paper proposes a gradientbased technique of multiexposure images fusion for the image sequence captured at the motion scene, which makes all images’ detail visible in one image. This method directly fuses different images. First of all, defines weight with the gradient information, and then fuses all images seamlessly with the multiresolution spline scheme. Experiments show that these methods can deal with the problem of multiexposure images fusion, eliminate the impact of moving objects, and enhance the image detail.
    Multiobjective Accurate Adhesion Segmentation Algorithm Based on Template Matching
    ZHANG Wen-jie;WANG Da-tong;LI Jie
    2011, 1(6):  22-3.  doi:10.3969/j.issn.1006-2475.2011.06.007
    Asbtract ( 1443 )  
    Related Articles | Metrics
    Based on the extraction of multiple moving objects, using of spatial and temporal continuity of target motion, a multiobjective accurate segmentation based on template matching algorithm is proposed. The algorithm uses Gaussian mixture model to extract moving objects in the video, then uses the template matching algorithm to identify each of the initial target area, the final goal is to use the full expansion algorithm to expand the border region. Experimental results show that the traditional segmentation of static adhesion compares with the proposed algorithm not only multiobjective segmentation of the same color, also the segmentation results are more accurate and efficient.
    Realization of Digital Video Compositing Technology in Adobe Premiere CS4
    GUO Jian-pu
    2011, 1(6):  25-4.  doi:10.3969/j.issn.1006-2475.2011.06.008
    Asbtract ( 1515 )  
    Related Articles | Metrics
    Video compositing is to combine multiple video screens into a video screen, it is an important issue in the digital video editing. Adobe Premiere CS4 video editing software, offers a variety of techniques to address this issue. This paper introduces through adjusting the transparency of the material or setting a video clip of "mixed mode" to complete the video compositing; Using video effects filters can cutout, according to the material color, brightness, garbage matte, in order to achieve the purpose of video synthesis; And uses "the track matte key" effects to enable tracking screen video compositing techniques. Practice has proved that the flexibility to use these methods to produce efficient, natural digital video productions.
    Research on Tripline Detection Method Based on Video Image
    HUANG Xiao-jian
    2011, 1(6):  29-4.  doi:10.3969/j.issn.1006-2475.2011.06.009
    Asbtract ( 861 )  
    Related Articles | Metrics
    During tripline detection, Gauss model is used to model background, object is detected by background differencing. Scanning the set of points on the line, if object is detected, for doubledirection tripline detection, system directly alerts, but for singledirection tripline detection, the moving direction of the object must be analyzed first. If the moving direction of the object matches forbidden passing rule, system directly alerts. The experiment shows that the method can detect tripline event accurately. 〖JP〗
    A Twophase Video Keyframe Extraction Method
    ZENG Hua;YANG Han-hui
    2011, 1(6):  33-3.  doi:10.3969/j.issn.1006-2475.2011.06.010
    Asbtract ( 1648 )  
    Related Articles | Metrics
    The keyframe extraction algorithm based on cohisgram leads to the problem of missing extraction, while the method based on edge feature leads to the problem of high computational complex. The article proposes a method that takes advantages of the two algorithms, namely, first extracts key frames by using cohisgram, then extracts the finally key frames from the previous results. Experimental results demonstrate that frames extracted can give a good summarization of the video while avoid redundancy.
    Research on Structure of Matched Filter in Crack Detection
    WANG Yan;XIE Xiao-fang;ZHU Zong-jian
    2011, 1(6):  36-4.  doi:10.3969/j.issn.1006-2475.2011.06.011
    Asbtract ( 754 )  
    Related Articles | Metrics
    The matched filtering has great prospect in the field of crack detection based on digital image processing. The choose of the filter is very important for the result of the matched filtering. In this paper, a demonstration about the superiority of the matched filter used in crack detection is given first of all, and then three principles are given about the method for constructing the matched filter using in crack detection, including the principles of the form, the dimension and the width of the nonzero element of the filter matrix. At last, the principles are testified by simulation experiment, and the crack image edges matched filtering is drew on the original image. 
    计算机仿真
    Research Progress on Welding Simulation Systems
    HUANG Jun;LIU Xiao-ping;XU Shao-ping;
    2011, 1(6):  40-5.  doi:10.3969/j.issn.1006-2475.2011.06.012
    Asbtract ( 853 )  
    Related Articles | Metrics
    Welding simulation allows welders to well practice and hone their skills by alone or combinations for welding training. Welding simulation is shown to significantly improve the results of actual procedures. This paper firstly introduces simultaneously main modules of welding simulation. Secondly, it classifies the current of the virtual welding simulation system, focuses on force feedbackwelding simulation system and then summaries merit and demerit of seam visual simulation technology of welding simulation system. Finally, it confirms the development direction of welding simulation system in the future.
    Research on Virtual Surgery System Based on Force Feedback Device PHANTOM
    HE Jian;BAO Su-su;PAN Jia-hui
    2011, 1(6):  45-3.  doi:10.3969/j.issn.1006-2475.2011.06.013
    Asbtract ( 898 )  
    Related Articles | Metrics
    This paper researches the key technologies in a virtual surgery system, such as the models of virtual instruments, physical models, collisions detection and virtual cutting technology. Using the force feedback device named PHANTOM produced by the Sensable Inc. and the OpenHaptics toolkit supporting the device, a virtual surgery based on the force feedback device is built.
    Simulation of Train Window in Simulation of Train Driving
    WU Bo;WANG Quan-zhan
    2011, 1(6):  48-4.  doi:10.3969/j.issn.1006-2475.2011.06.014
    Asbtract ( 1487 )  
    Related Articles | Metrics
    Adding simulation of natural environment during simulation of train visual can enhance fidelity of visual effect. Simulation of train window in train driving can increase influence of vision which the environment produce for driving personnel, and enhance the effect of simulation in train simulator. This paper uses particles system and the way of OpenGL paste texture to simulate droplet of train window in rainy day. The wiper model joins in the scene through wiper and raindrops particles to cooperate, simulates the rain day environment window effect. The way under premise of satisfying realtime, enhances the sense of reality driving train in rainy day, and meets train drive simulation visual simulation needs.
    网络与通信
    P2P Content Multicast Based on Neighbor Peers’ Bandwidth Monitoring
    LIAO Zhi-ping;LIU Song;TU Li
    2011, 1(6):  52-5.  doi:10.3969/j.issn.1006-2475.2011.06.015
    Asbtract ( 913 )  
    Related Articles | Metrics
    The performance of PeertoPeer (P2P) content multicast systems usually degrades dramatically because of peer’s selfish behaviors such as freeriding. To solve this problem, the paper suggests that each peer monitors its neighbors’ bandwidth and manages connections with them according to the results of monitoring, so as to distribute efficiently the massive content to all peers in selfish environments. The proposed protocol is explained in details and performance analyzing and simulating show that the protocol incurs a moderate and constant network load on peers and distribution server in the system.
    Design of Uniform Identity Authentication in Crossregional Information Enterprises
    ZHAO Hua;WANG Hai-kuo;SONG Jin-yu
    2011, 1(6):  57-3.  doi:10.3969/j.issn.1006-2475.2011.06.016
    Asbtract ( 860 )  
    Related Articles | Metrics
    In order to solve user authentication management, information silos and other issues in the application systems of CrossRegional Information Enterprises, based on the LDAP directory and the liberty network identity management framework, this paper designs a unified corporate identity management system, which solves centralized storage of user information, unified authentication and user’s single signon in the multiple information systems of enterprises.
    Research and Implementation of Dynamically Generating Network Topology Algorithm Based on .NET 
    LI Bei-bei;HAN Xiu-ling
    2011, 1(6):  60-3.  doi:10.3969/j.issn.1006-2475.2011.06.017
    Asbtract ( 890 )  
    Related Articles | Metrics
    In computer network experiments, the network topologies can’t be realtime displayed. To solve the problem, after doing many researches on the VLAN configuration, this paper designs and implements a system that can dynamically generate network topology based on .NET platform and C# language. Experimental results show that the system can automatically analyze the configuration commands, and make the current network topology clear and visible.
    Fuzzy Control and Stability Analysis of Timedelay Networked Control Systems
    ZHANG He;CUI Bao-tong
    2011, 1(6):  63-4.  doi: 10.3969/j.issn.1006-2475.2011.06.018
    Asbtract ( 736 )  
    Related Articles | Metrics
    This paper deals with the controller design problem of a networked control system with the networkedinduced delay. A networked control system discrete model is designed, and a fuzzy stable controller based on parallel distributing compensation theory is proposed. The design method of membership function is presented. Lyapunov theorem and Linear Matrix Inequality method are used to derive the sufficient condition that guarantee the stability of networked control systems. A simulation example with Matlab demonstrates the effectiveness of the proposed method.
    Improvement of AODV Routing Protocol Based on Super Node
    LIU Lang;ZENG Bi-qing
    2011, 1(6):  67-4.  doi:10.3969/j.issn.1006-2475.2011.06.019
    Asbtract ( 840 )  
    Related Articles | Metrics
    In mobile Ad Hoc networks, aiming at the disadvantage of the AODV routing protocol, which establishes the route with broadcast, this paper proposes a cluster to improve AODV routing protocol based on super node. In the new protocol some super nodes are set in the network, then the whole network is divided into a number of cluster regions according to the position of super nodes, each super node maintains the integrity of routing information in the own cluster region. Simulation results show that the method can be avoided by using the broadcast, shorten the route setup time, and improve the success rate of packet.
    Application of Protocol Stack μIPv6 in Embedded FPGA System
    JI Da-jie
    2011, 1(6):  71-2.  doi:10.3969/j.issn.1006-2475.2011.06.020
    Asbtract ( 769 )  
    Related Articles | Metrics
    As the development of IOT(Internet of Things), to fit the require of connecting lots of embedded equipments to network, and to realize the IPv6 communication of terminals, this paper makes use of CPU, Memory, Bus and MAC module of Xilinx embedded system to build a system platform, and ports the protocol stack μIPv6 which issued by Swedish Institute of Computer Science (SICS), then validates the stack in application.
    算法分析与设计
    Mixed Tabu Search Algorithm for Dynamic Vehicle Scheduling Problem
    YUAN Jian-qing
    2011, 1(6):  73-3.  doi:10.3969/j.issn.1006-2475.2011.06.021
    Asbtract ( 833 )  
    Related Articles | Metrics
    On the basis of studying dynamic vehicle scheduling problem with time windows, a dynamic vehicle scheduling mathematical model is established through introducing time axis concept and adopting realtime optimizing research methods. Then a mixture algorithm based on a CK economical method and Tabu Search algorithm is designed to solve dynamic vehicle scheduling problem. This algorithm improves convergence speed by using dynamic candidate solutions constructor method and dynamic length selection strategy. Finally computational results are provided to show that the mixed Tabu Search algorithm is feasible and efficient.
    Research on Improved Min-Min Algorithm
    DENG Shu-qiang;LIU Bo;PANG Xiong-wen
    2011, 1(6):  76-4.  doi:10.3969/j.issn.1006-2475.2011.06.022
    Asbtract ( 806 )  
    Related Articles | Metrics
    Task scheduling is an important part of grid system, and the task scheduling algorithm is the most important in the task scheduling. After the research of MinMin algorithm, this paper points out the shortcomings of MinMin algorithm. With the goal of grid task scheduling, several improved MinMin algorithms are drawn out in optimal scheduling, load balancing, quality of service and the charge. Then this paper introduces the advantages and disadvantages of the improved algorithms. It provides some reference to improve the algorithms in the future. 

    Audio Information Hiding Algorithm Based on Knapsack Public-key
    FU Xi-hui;DING Wen-long
    2011, 1(6):  80-3.  doi:10.3969/j.issn.1006-2475.2011.06.023
    Asbtract ( 1644 )  
    Related Articles | Metrics
    Secret audio message has to experience all kinds of attacks during transporting. This paper presents a steganography algorithm with strong robustness. It embeds a speech as the secret message into original audio signal, and transmits the secret message in the public channel. The algorithm makes use of Human Auditory System (HAS) characteristics and embeds secret message in the wavelet domain. With knapsack publickey, the algorithm not only encrypts the hiding information but also encrypting the information. It also has strong antidisturbance ability against noise, compression and filter.
    Greedy Particle Swarm Algorithms for Multidimensional Knapsack Problems
    HAO Jun-ling
    2011, 1(6):  83-5.  doi:10.3969/j.issn.1006-2475.2011.06.024
    Asbtract ( 1475 )  
    Related Articles | Metrics
    Two new greedy transformations and the inspired algorithms are proposed to solve multidimensional knapsack problems (MKP01) with weight and volume constraints. Convex combination and infinite norm of the ratio vectors of performance to weight and performance to volume are computed and two integrative "performanceprice ratio" vectors are obtained. Two greedy PSOs variants (wPSO: weighted PSO, infPSO: infinite norm PSO) are presented for MKP01 based on the integrative "performanceprice ratio". The standard PSO, hybrid wPSO and infPSO are applied to solve various scales of MKP instances. Numerical experiments illustrate that wPSO and infPSO not only outperform PSO greatly, but also show excellent and steady searching abilities and encouraging efficiency to locate the optimal solutions.
    Real-time Collision Detection Algorithm Analysis and Comparison
    LI Miao
    2011, 1(6):  88-3.  doi:10.3969/j.issn.1006-2475.2011.06.025
    Asbtract ( 803 )  
    Related Articles | Metrics
    With the upgrade of computer hardware, 3D virtual gaming industry has already appeared in the client computer, and collision detection of 3D virtual environments is an important factor, how to choose a fast and accurate collision detection algorithm becomes a research hotspot. This paper mainly introduces several commonly collision detection algorithms, according to characters of bounding sphere and OBB, proposes an improved algorithm combined with bounding sphere and OBB. However, the fast collision detection and accuracy are often not compatible, therefore, should choose a different collision detection precision bounding box to achieve better efficiency of collision based on the specific situation.
    BP Neural Network Optimization Algorithm Based on Geneticstimulated Annealing
    LU Qiongshuai;WANG Shi-qing
    2011, 1(6):  91-4.  doi:10.3969/j.issn.1006-2475.2011.06.026
    Asbtract ( 1508 )  
    Related Articles | Metrics
    After studying the disadvantage of BP neural network which has low convergent speed and trap into local minima easily, an idea of designing a new hybrid neural network model which adopts the method of numerical optimization is presented. By using GeneticStimulated Annealing algorithm (GSA), expands the updated space of weight. On the basis, it makes the acquired better value as the weight of BP neural network, and the optimized BP network is not easy to trap into the local minima and has good generalization characteristic. Making the comparation GSA network with standard BP network, simulation analysis demonstrates that this network model can attain higher categories of precision. 
    A Hybrid Collaborative Filtering Recommendation Algorithm
    WU Yi-ming
    2011, 1(6):  95-5.  doi:10.3969/j.issn.1006-2475.2011.06.027
    Asbtract ( 1433 )  
    Related Articles | Metrics
    Collaborative filtering algorithm is one successful personalized recommendation technology, and is extensively used in many fields. Unfortunately, the efficiency of the method declines linearly with the number of users and items. To solve these problems, combining the two algorithm’s characteristics and advantages, a new hybrid algorithm is proposed based on the content and network structure, it improves the defects of the current recommendation algorithms and gives realization process of algorithm and experimental results.
    计算机控制
    Application of High-order Statistics Method in Harmonic Retrieval
    DUAN Wei;LU Xiang-yang
    2011, 1(6):  100-3.  doi:10.3969/j.issn.1006-2475.2011.06.028
    Asbtract ( 784 )  
    Related Articles | Metrics
    Harmonic retrieval is an important problem of signal processing. Harmonic retrieval is various order harmonic which make up of signal in noise. Noise can be classified as additive noise and multiplicative noise. This paper analyses the characteristics of additive noise and multiplicative noise, and proposes using highorder statistics to restrain noise and to retrieve harmonic. Uses the slice of four order statistics to restrain multiplicative noise and two order cumulative spectrum to restrain additive noise. The simulation results show this way has very good effect of restraining noise.
    Research on Grain Moisture Detection Data Fusion Based on RBF Network
    XUE Hai-yan;ZOU Li-xia
    2011, 1(6):  103-3.  doi:10.3969/j.issn.1006-2475.2011.06.029
    Asbtract ( 1936 )  
    Related Articles | Metrics
    For improving the accuracy and speed of measurement, it needs to deal with the data from multisensors. Firstly, this paper introduces the characters and training mode of BRF network, and then describes the whole processes, which includes data collection, data normalization, neural network training and network structure selection, using multisensors to detect the grain moisture based on BRF network. Lastly, trained by the net models in Matlab, the results prove that the fitted value fluctuates around target values and the differentials are less than 7%. This method has advantages and can be applied in other industry fields.
    Design and Analysis of Network Voltage Monitor System
    ZHU Yu-yuan;TU Ping
    2011, 1(6):  108-4.  doi:10.3969/j.issn.1006-2475.2011.06.030
    Asbtract ( 1545 )  
    Related Articles | Metrics
    In order to monitor the instant voltages of electrical power system, the network voltage monitor system applies SST89E516RE2 microchip as its core, exchanges data with the remote controlling software by IP/ARP/ICMP/UDP protocols. The system can acquire the values of voltages promptly.
    Research on Horizontal Roller Toughened Glass Production Line and Its Control System
    CHEN Su-song
    2011, 1(6):  112-3.  doi:10.3969/j.issn.1006-2475.2011.06.031
    Asbtract ( 794 )  
    Related Articles | Metrics
    This paper analyzes the composition and process of horizontal roller toughened glass production line firstly, then designs its control system. Temperature control is essential for quality control of toughened glass, because the electric heating toughened glass furnace is a nonlinear, timevarying and large delay system. After carrying out the mathematical model, the gain adaptive compensation Smith algorithm is used in electric oven temperature control, which has better control effect than traditional PID control.
    Application of DDE in Exhausted Gas Purify Control System
    LOU Ben-yue;SUN Wei;LIU Ning-ning;LIANG Feng
    2011, 1(6):  117-3.  doi:10.3969/j.issn.1006-2475.2011.06.032
    Asbtract ( 1429 )  
    Related Articles | Metrics
    This paper mainly introduces that errorcorrection fuzzy control algorithm is applied to exhausted gas purify control system of an electrolytic aluminum plant by using DDE technology. Its realization requires combination of Matlab and industrial control configuration software InTouch, and the combination of both needs DDE communication technology to achieve their communications. The application shows that the method is of good stability and reliability.
    应用与开发
    Research and Realization of Management Information System of
    LIU Jing-pei;PAN Peng-hui
    2011, 1(6):  120-4.  doi:10.3969/j.issn.1006-2475.2011.06.033
    Asbtract ( 1565 )  
    Related Articles | Metrics
    The management information system of information and communication center is inspired by State Grid 186(For SG186, 1 represents the integration of enterprise information integration platform, 8 represents eight major business application systems used by the corporate system managing needs, 6 represents six information security systems). The system is developed as an internal integrated business system according to the actual demands of information and communication center in Weinan Power Supply Bureau. This system is developed by the platform of ASP.NET, C# language and SQL Server database, which redevelops and integrates seven major business systems developed gradually since 2000, in order to achieve single signon. Using this unified platform can access multiple subsystems simultaneously, realize data sharing between systems and solve the tedious login problems.
    Design and Implementation of Multilingual Examination Dynamic Information Management System Based on J2EE Framework
    Parigvl MUHAMMAT;Mamat AYUP;Askar HAMDULLA
    2011, 1(6):  124-5.  doi:10.3969/j.issn.1006-2475.2011.06.034
    Asbtract ( 767 )  
    Related Articles | Metrics
    To meet the practical requirements of examination dynamic information management system and multilingual forms creation need proposed by education bureau of Xinjiang Uyghur autonomous region, this paper first of all designs the structure of the system based on the J2EE framework (JSF + Spring + Hibernate) and establishes the principles and procedure of examination dynamic information management system, then implements the relative algorithms by Java programming language. This paper solves the construction of multilanguage forms such as admission form, application form of in (or out) a high school effectively. The application results show that the system is stable and the algorithm is feasible.
    Design and Implementation of Media Control Policy for SIPbased Conference System
    JIA Yan;TANG Hui-jia
    2011, 1(6):  129-3.  doi:10.3969/j.issn.1006-2475.2011.06.035
    Asbtract ( 1458 )  
    Related Articles | Metrics
    Based on the SIP protocol, in the embedded system platform, this paper develops a media server combined signaling and media processing in one, and designs a communication plan for multimedia conference. The system uses a new design way to interact media control policy between the application server and media server, describes the process of creating control channel for transmitting the media control policy. It is implemented the process of building conference to show the superiority of the scheme.
    esign and Implementation of Visual Data Mining Tool
    MENG Hai-dong;LIN Zhi-ju;XU Guan-dong
    2011, 1(6):  132-4.  doi:10.3969/j.issn.1006-2475.2011.06.036
    Asbtract ( 782 )  
    Related Articles | Metrics
    In order to extract useful data from the mass data for users to analyse, this paper combines visualization technique with data mining technology by the thorough research of data visualization and clustering analyses, develops a visual data mining system in Java platform, and the result of data mining is displayed to users in the way of scatter 3D plot and parallel coordinates figure, so users can see the whole data set, and analyse the distribution of the same attribute value of each object and relationship between each attribute, thus, it can effectively express the results of data mining.
    Online Storage Technology for Experiments Based on Virtual Network Lab
    REN Zhuo-jun;HAN Xiu-ling;PANG Cong
    2011, 1(6):  136-3.  doi:10.3969/j.issn.1006-2475.2011.06.037
    Asbtract ( 1434 )  
    Related Articles | Metrics
    In order to avoid unexpected events, which interrupt the operation of the virtual network experiment, the online storage technology for experiment procedures is proposed. On the base of the virtual network lab in B/S mode, it uses of .NET technology, SQL database technology, C# program language and .NET Framework configuration tool to realize online storage technology based on Web browser available, improves experiment efficiency with better flexibility.
    Design and Implementation of Early Rice Management Expert System Based on Decision Tree
    FU Zhuo-jun;HUANG Huang
    2011, 1(6):  139-3.  doi:10.3969/j.issn.1006-2475.2011.06.038
    Asbtract ( 1514 )  
    Related Articles | Metrics
    In recent years, the agricultural expert system develops rapidly and is promoted and applied widely in agricultural production. It provides some new ways for modernization and informatization of rice production management. This paper introduces the implementation of the early rice management expert system using production to express knowledge and reasoning by decision tree. The key codes are also given.
    Design and Implementation of Logistics Freight Management Information Platform Based on ASP.NET 4.0
    MA Rong-fei
    2011, 1(6):  142-4.  doi:10.3969/j.issn.1006-2475.2011.06.039
    Asbtract ( 1387 )  
    Related Articles | Metrics
    The paper introduces the method of constructing a logistics freight management information platform by using Ajax technology, ASP.NET 4.0 as development tool and using SQL Server 2005 as database. The paper describeses how to realize the functions of logistics freight management information platform. Studies show that the platform is of the ability of dealing with global information and quick response, also is of reconfigurability and expandability, and is of practical significance.
    Design and Implementation of ERPbased Financial Control System
    XIAN Jin;SUN Zhong-hua
    2011, 1(6):  146-3.  doi:10.3969/j.issn.1006-2475.2011.06.040
    Asbtract ( 798 )  
    Related Articles | Metrics
    Based on experiences in the development of business management software and business ERP implementation of authors, combined with the latest ERP progress in theory and practice, this paper proposes a basic framework of ERP financial control subsystem for small and medium enterprise, which is of certain practical and theoretical reference value.
    Research on Educational Management System Based on C/S and B/S Mixedmodel
    ZHANG Nan-ping;LI Wen-jun
    2011, 1(6):  153-3.  doi:10.3969/j.issn.1006-2475.2011.06.042
    Asbtract ( 767 )  
    Related Articles | Metrics
    In recent years, with the reform of education system, to develop a practical function, advanced technology Educational Management Information System seems timely and necessary, also the inevitable trend of teaching reform. This paper makes full use of B/S and C/S two models of their own advantages for different subsystems with different system platforms, builds a crossparallel use of two models of mixed mode. This system improves the management standards and enhances the management benefit and social benefit. It has a good prospect of application and extension.
    Word Complicated Report Realization Under LabWindows/CVI Environment
    CHEN Hong-hong;WANG Yang
    2011, 1(6):  156-2.  doi: 10.3969/j.issn.1006-2475.2011.06.043
    Asbtract ( 1684 )  
    Related Articles | Metrics
    During automatic tests, the test results need to be output in reports. This study introduces how to realize the automatic generation of the test result report by calling Word with the application software developed with the dedicated test instrument software development platform LabWindows/CVI.
    Spring Security Webbased Application Development
    XIAO Yun
    2011, 1(6):  158-2.  doi:10.3969/j.issn.1006-2475.2011.06.044
    Asbtract ( 819 )  
    Related Articles | Metrics
    In Web application development, security is a very important aspect. From security perspective, it needs to consider users authentication and authorization. The increase for the security of Web applications is not easy, needs to consider the different authentication and authorization mechanisms. Spring Security for the Web application using Spring framework provides a good support.
    Test and Analysis of IO Performance on High Performance Computing Platform
    LI Liang;NIE Rui-hua
    2011, 1(6):  160-5.  doi:10.3969/j.issn.1006-2475.2011.06.045
    Asbtract ( 788 )  
    Related Articles | Metrics
    This paper tests the performance of NFS and Lustre file system in the large scale distributed computing environment on high performance computing platform. According to the results, the IO bottleneck is known in this high performance computing platform and an advice is given to improve the IO performance to solve the bottleneck problem. Then this paper tests how the local cache, file’s size and transferSize affect the parallel filesystems’ IO performance, and proposes how to deploy the parallel applications and write the parallel programs efficiently to improve the IO performance. 
    Design and Implementation of Unified Interface Platform for Electronic Operation & Maintenance System Based on SOA
    ZHU Li-ya
    2011, 1(6):  165-3.  doi:10.3969/j.issn.1006-2475.2011.06.046
    Asbtract ( 1614 )  
    Related Articles | Metrics
    Based on SOA architecture, electronic operation & maintenance system can accomplish service and safeguard for China Telecom and operation & maintenance management informatization. A design scheme of the unified interface platform for the close loop system with treated impediment is proposed. According to Webservice, middle datasheet method and so on for the feature and requirements of the data exchange and system environment, overall procedure automation and information sharing can be accomplished.
    Design and Implementation of Video Interactive System Based on 3G Network
    CHEN Jie
    2011, 1(6):  168-3.  doi:
    Asbtract ( 672 )  
    Related Articles | Metrics
    With the rapid development of the 3G telecommunication, users require video communication and conference all the time and everywhere. This article introduces a video interactive system based on 3G telecommunication network. It uses 3G cell phone to access Internet. It adopts several key technologies: interactively encryption of P2P and video stream, multichannel and multipicture parallel video stream, terminal short message auto startup. These make it possible for high quality video communication with 3G cell phone. It is of good using effect in practical application.
    Design and Implementation of Management Information System of Highvalue Medical Consumables Based on RFID
    LIN Ji-nan;LV Xue-feng
    2011, 1(6):  171-4.  doi:10.3969/j.issn.1006-2475.2011.06.048
    Asbtract ( 1561 )  
    Related Articles | Metrics
    For implementing information management of highvalue medical consumables and comprehensive trace management, it needs to normalize highvalue medical consumables name and associate highvalue medical consumables with inpatient payment system by interface way. This paper designs and realizes the highvalue medical consumables management information system based on RFID. It not only implements highvalue medical consumables scientific and efficient and comprehensive trace management, but also provides supervisor with scientific and efficient management means. System design and implementation are valuable, are of some virtues, such as simple, flexible, safe, easy to expand and so on. 
    软件工程
    Ontology Evaluation Based on Hierarchical Fuzzy Comprehensive Evaluation
    SHAO Xiao-qing;WU Jia-wei
    2011, 1(6):  175-6.  doi:10.3969/j.issn.1006-2475.2011.06.049
    Asbtract ( 1547 )  
    Related Articles | Metrics
    On the base of analysis and conclusion of current ontology evaluation, this paper adopts hierarchical fuzzy comprehensive evaluation to make a comparative analysis of the factors affecting the construction of ontology, and works out how to evaluate whether the construction of an ontology meets the needs of users.
    Research and Implementation of KBS for the Third Party IT Service
    ZHENG Lei-lei;SONG Li-hua;GUO Rui;REN Qiang;TAN Wen-jing;
    2011, 1(6):  181-4.  doi:10.3969/j.issn.1006-2475.2011.06.050
    Asbtract ( 1445 )  
    Related Articles | Metrics
    Knowledge becomes the strategic resources for business development in terms of informational development. The third party IT service delivery agency needs sufficient knowledge storage and technical supports to offer service to their customers for promoting investment benefit, but many enterprises have some problems in knowledge management and utilization, which leading to waste of knowledge. This paper designs a Knowledge Base System (KBS) for third party IT service using B/S pattern and MVC pattern, represents the method of knowledge classification and storage by relational model, and analyzes the key issues in design of KBS. The KBS improves knowledge query and maintenance and enterprise’s service efficiency and quality.
    信息安全
    Study on CAMS Authentication System Integration for SOA
    CHEN Li;LI Lan-you
    2011, 1(6):  185-2.  doi:10.3969/j.issn.1006-2475.2011.06.051
    Asbtract ( 852 )  
    Related Articles | Metrics
    This paper analyzes the Web Services registry of CAMS certification system, shows the design strategies and steps for Web Service call process. Studying on CAMS authentication system integration for SOA, the design and implementation method is proposed with Web Service registry. The practical application in TV Survey System shows that the result is effective.
    Integrity Check on Character Data in Encrypted Database
    SUN Xiao-han;LI De-shui;LIU Jing
    2011, 1(6):  187-3.  doi:10.3969/j.issn.1006-2475.2011.06.052
    Asbtract ( 825 )  
    Related Articles | Metrics
    Database encryption is an effective method to protect the sensitive data. However, encryption makes dataintegrity check on the data encrypted very difficult. An integrity check on character data in two steps is proposed based on a method of fast query over encrypted character data. In the first place, the coarse check is implemented and the encrypted value of the dataintegrity is computed to filter some unsatisfied data. Then, the exact check is implemented and the rest records are decrypted and checked. The whole dataintegrity check is finished after the two steps. The dataintegrity check in two steps is more secure and efficient without adding too much space.
    Research on Network Safety Strategies for Office Automation System Based on B/S and C/S Blended Model
    DING Mei-rong;WEI Hai-liang
    2011, 1(6):  190-3.  doi:10.3969/j.issn.1006-2475.2011.06.053
    Asbtract ( 1381 )  
    Related Articles | Metrics
    With the rapid development of Internet, Office Automation System (OAS) now is applied with network communication technology. This paper proposes a new OAS model blended B/S and C/S to meet the needs of OAS’s management and safety. A new effective strategy for system safety strategy based on PKI technique and design model for OAS network safety based on B/S and C/S is established. By analysis and evaluation, this strategy can offer more much safety and protection.
    Survey on ARP Spoofing
    SHI Li-ping
    2011, 1(6):  193-6.  doi:10.3969/j.issn.1006-2475.2011.06.054
    Asbtract ( 810 )  
    Related Articles | Metrics
    Recently, ARP spoofing has become the primary threat to network security, ARP spoofingrelated research has become a hot topic in network security. This paper analyzes the principle of ARP protocol and ARP spoofing, describes the types and symptoms of ARP spoofing: cheat host, cheat gateway, cheat host and gateway. Some ARP spoofing detection and prevention methods are researched based on it, such as IP and MAC address matching, SACT detection, improvement or expanding ARP protocol and S_UARP agreement, analyzes these methods works, advantages and disadvantages. To improve and perfect the ARP protocol will become the development trend of ARP spoofing prevention.
    中文信息技术
    Application Research on Improved Association Rules in Literature Personalized Searching
    ZHENG Yu-jie;ZHANG Jie-xin
    2011, 1(6):  199-4.  doi:10.3969/j.issn.1006-2475.2011.06.055
    Asbtract ( 801 )  
    Related Articles | Metrics
    In accordance with the shortcomings of library literature searching system which can not provide personalized searching service for different readers, this paper researches how to carry out personalized searching, brings up an idea of applying association rules in the original searching result personalized sorting by readers level, through data of a certain university library, describes the process of sorting for the mining result, to test and verify the feasibility of application association rules in literature personalized searching.
    Intelligent Retrieval System of Enterprise Information
    HUANG Wei
    2011, 1(6):  203-4.  doi:10.3969/j.issn.1006-2475.2011.06.056
    Asbtract ( 761 )  
    Related Articles | Metrics
    Information query function of management information system is one of important functions. Different information management system for the query, usually corresponds to multiple queries module; in the use of query functions, the general characteristics according to retrieve information, requires to enter the search terms with professional features, so the search function caused the entrance is not uniform, and complicated operation shortcomings. According to the practical needs of business users, with reference to the characteristics of the Internet search engine, using a stable, mature data mining technology, this paper designs an intelligent enterprise information retrieval system. The system has a unified entrance, is easy to operate, is of the characteristics of intelligent learning.