Loading...

Table of Content

    31 May 2011, Volume 1 Issue 5
    算法设计与分析
    esearch on Individual Evaluation of CSCL Based on  Model of Fuzzy Comprehensive Evaluation
    YANG Youlin;LUN Shuxian
    2011, 1(5):  1-3.  doi:
    Asbtract ( 1507 )  
    Related Articles | Metrics
    On the basis of teaching characteristics of CSCL, the progress range is introduced into the individual evaluation so that the individual evaluation takes into consideration the development of students’ ability. Fuzzy comprehensive evaluation is used to solve the problems of multiple factors. So the results of evaluation conform to the real situation and are more scientific than before. At the same time this method makes it so easy to operate on computers that the process of evaluation is more efficient.
    Application of Ensemble SVM in Analysis of Microarray Data
    XU Dan;XU Ming;ZUO Xin
    2011, 1(5):  4-6.  doi:
    Asbtract ( 749 )  
    Related Articles | Metrics
    Thanks to the microarray, it is possible to research multiparameters of organism with different angles at the same time. However, features of microarray gene expression data such as: high dimensions, few samples and nonlinear make it difficult when comes to experiment. To solution these problems, a method called ensemble SVM is been advanced. First, the data is normalized and the method of signal to noise ratio is used to extract the most useful genes for classification. Then the bagging algorithm is used to produce the unit classifiers and the result is given via voting by the unit classifiers with the regular of relative majority. The experiments show that ensembles classifier is more accurate than the unit classifiers.
    Research on Vehicles Dispatch Optimization Algorithm Based on Vogel 
    NIU Bin;ZHAO Long
    2011, 1(5):  7-10.  doi:
    Asbtract ( 689 )  
    Related Articles | Metrics
    Vogel is a method of solving vehicles scheduling schemes. This article introduces Vogel basic ideas and the method algorithm process, and it points out the deficiency. On the basis of Vogel the paper puts forward the improved perfect algorithm. According to the case analysis, it shows that the improved algorithm can more accurately get the cost minimization vehicles dispatch scheme. 
    Research on Vehicles Dispatch Optimization Algorithm Based on Vogel 
    NIU Bin;ZHAO Long
    2011, 1(5):  7-10.  doi:
    Asbtract ( 651 )  
    Related Articles | Metrics
    Vogel is a method of solving vehicles scheduling schemes. This article introduces Vogel basic ideas and the method algorithm process, and it points out the deficiency. On the basis of Vogel the paper puts forward the improved perfect algorithm. According to the case analysis, it shows that the improved algorithm can more accurately get the cost minimization vehicles dispatch scheme. 
    Multihop Router Algorithm of Underwater Acoustic Sensor Network Based on Clustering 
    GUO Liben;ZHANG Ming;GAO Jun
    2011, 1(5):  11-14.  doi:
    Asbtract ( 1404 )  
    Related Articles | Metrics
    Clustering algorithm means separating the network into clusters and setting up hierarchical network, which was presented by Wendi Rabiner and applied to LEACH of Wireless Sensor Network in 2000. However there is defects when cluster is applied to underwater acoustic sensor network. In order to expand the advantage of cluster algorithm to underwater acoustic sensor network, the paper presents a kind of algorithm called Multihop router algorithm of underwater acoustic sensor network based on clustering by introducing multihop into clustering router protocol based on the considering of energy utilization and efficiency. Network is separated into lots of clusters according the location and every cluster is constructed to a subnet and the related clustering routertable which is used for the node finding its router and deciding whether it is needed to change, and the data is transmit by multihop. It is verified by experiment. 
    Method for Translating Business Process Modeling to BPEL
    CHEN Luyi
    2011, 1(5):  15-19.  doi:
    Asbtract ( 762 )  
    Related Articles | Metrics
    XML representation of BPEL is very verbose and has not formal analysis techniques, its abstract level is not applicable to the analysis and design of business process. Contrary to BPEL, the designer and analyst of business process more easily accept the high level of abstract model, such as BPMN (Business Process Modeling Notation). It is supported by various modeling tools but no system can directly execute BPMN models so far. Hence, they need a translating method which can translate BPMN to BPEL code. It can improve the ability of analysis, design and development of business process, for the purpose of adapting the change of business requirement and improving the rate of return. This article puts forward an algorithm for translating BPMN to BPEL code by analyzing the BPMN and BPEL. Finally, a simple example is introduced for illustrating how to use the translating algorithm in application.
    Improvement of Feature Selection Method in Text Classification
    HU Gaidie;MA Jianfen
    2011, 1(5):  20-21.  doi:
    Asbtract ( 1471 )  
    Related Articles | Metrics
    In text classification, feature selection is essential to make classification efficient and more accurate. This paper depends on deficiency of χ2 statistics and presents an improved χ2 statistics method. Experiments based Support Vector Machine show that the improved method can improve the classification accuracy.
    A Method of Association Rules Data Mining Based on Star Schema 
    LI Yan;BAI Yufeng
    2011, 1(5):  22-24.  doi:
    Asbtract ( 729 )  
    Related Articles | Metrics
    Current data mining is based on the mining of general data set basically. The research to data mining of the star schema structure is less. So the star schema mining structure is defined, and based on which an mining algorithm with association rules is constructed. The algorithm first scans the fact table, and produces maximal frequency item sets and association rules, with which as the basis, the theory based on the local efficiency principle of linking conditions and association rules is put forward, and the method scans the dimension table attributes quickly. It produces the association rules oneoff. The scan is based on the part, not global. At the same time the undefined association rules are dealt with by mining the implicit knowledge through constructing extended dimension table. The mining speed of the algorithm is faster. Through building expanded dimension table reasonably, the extended hidden information can be found in this way.
    Research on Estimation of Frequence Response Function of Certain Transport Vehicles Based on MIMO Experimental Conditons
    CHENG Zhaogang;HAN Baohong;DUAN Yunlong;MA Yingchen
    2011, 1(5):  25-26.  doi:
    Asbtract ( 760 )  
    Related Articles | Metrics
    The venue, by driving a certain type of road transport vehicles under a large constant sinusoidal driving, gets multiple sets of excitation and response signals. Using frequency domain methods Hv, an unbiased research of frequency response function of the vehicle is made, and using Matlab simulation software, the corresponding amplitude and phase diagram are draw, and can provide theoretical and experimental guidance for the study of the vehicle dynamics and automotive goods such issues as reasonable arrangement.
    信息安全
    Research on Server Security Based on Windows Platforms
    HUANG Xin
    2011, 1(5):  27-30.  doi:
    Asbtract ( 1411 )  
    Related Articles | Metrics
    Windows system with its humanized graphical interface, is deeply liked by user, but as a server platform, the safety is worth studying. From the Windows system of dual encryption, account management, configuration server not respond to the Ping command, modifing the operating system version number, designated open port etc, this article introduces the server security based on Windows platforms.
    Research on Rolebased Mandatory Access Control in Data Warehouse
    ZHANG Dagang
    2011, 1(5):  31-34.  doi:
    Asbtract ( 715 )  
    Related Articles | Metrics
    Rolebased security model for data warehouse has been widely used. But it does not implement mandatory access control. In this paper, rolebased security model for data warehouse and database multilevel security model are extended. Together with multidimensional data cuboids lattice, rolebased mandatory access control for data warehouse is proposed. The new model implements mandatory access control in data warehouse, and provides a new way to the study of data warehouse security. 
    Checkcode Login with Integration of Spring Security and JCaptcha
    WANG Wei;FANG Shuqiong
    2011, 1(5):  35-37.  doi:
    Asbtract ( 2358 )  
    Related Articles | Metrics

    Security is an open source Java security framework, can be very easy to integrate with the application system, and deploy to any J2EE container. Integrating the two technologies, checkcode login is realized.

    软件工程
    Improvement of Military Software Reviews Standard
    ZHU Bin;YIN Junwen
    2011, 1(5):  41-44.  doi:
    Asbtract ( 1438 )  
    Related Articles | Metrics
    Software reviews has an important position in military software development. However the software reviews standard in our army is only from the IEEE. It is not enough for the military software what has the high security and stability requirements. In order to improve our software reviews standard and improve the reviews maneuverability in military software, the article firstly makes the contrast for the standard of several space industry softwares. And it also analyzes their differences. Finally makes some improvements for the reviews standard in our military software. The improvement makes the maneuverability and interactivity of our military software standard much improved.
    信息安全
    Research on DDoS Attack Detection Method Based on Similarity in IPv6
    ZHAI Hongyan;ZENG Jixia
    2011, 1(5):  45-47.  doi:
    Asbtract ( 1538 )  
    Related Articles | Metrics
    Against now DDoS attack traffic is still the major threat in network, including IPv6. The paper proposes that, firstly Hurst valuation uses Whittle MLE method, secondly, the article applies the second difference method to analyze in correlation with 3 groups of adjacent data, due to determine the moment of attack generated in high precisely. Simulation experiments show that this method reduces the false positives and the missing rate, achieves faster and more efficient detection of DDoS attacks.
    软件工程
    Research on Data Model Modeling Method for Power Enterprise
    JING Dongsheng;WANG Fang
    2011, 1(5):  45-47.  doi:
    Asbtract ( 713 )  
    Related Articles | Metrics
    With the continuous information development of power enterprise, the IT system builds
    applications by their own ways, the data are redundancy, resources lack the unified standards,
    compatibility difficulties are outstanding gradually. In order to satisfy
    the information system “the centralism integration” and plan the business data resources
    reasonably, the construction of enterprise data model becomes one kind of inevitable choice. This
    article introduces the construction idea of conception data model, the subject territory design,
    the entity design, the incidence relation design and the standard in the power enterprise.
    The goal is to guarantee the data uniqueness, reduce
    complexity of exploitation in the centralism integration, through the objectoriented data model superiority, integrating business system demand from the data plan level consideration.
    Research on Evaluation Model of Software Component Quality
    YANG Lei
    2011, 1(5):  48-51.  doi:
    Asbtract ( 1580 )  
    Related Articles | Metrics
    Componentbased Software Development(CBSD) is an effective way to solve the software crisis and improve software productivity. The quality of software component affects the quality of final software product.This paper, considering the characteristic of component and industry standards, proposes a method based on AHP and fuzzy synthesis evaluation method to evaluate component quality, as component users and administrators’ reference point.
    图像处理
    Application of Improved Genetic Algorithms to Fragment Reassembly 
    ZHENG Beibei;GUO Liben
    2011, 1(5):  52-56.  doi:
    Asbtract ( 725 )  
    Related Articles | Metrics
    Fragment reassembly has already broadly used in various fields, traditional methods of fragment reassembly are given to introduce shape matching algorithm and to present the defects of traditional algorithms including complex calculation procedures and a large number of time consumption. According these defects, this paper applies improved genetic algorithms to fragment reassembly to achieve higher efficiency and accuracy.
    Research on ROAMbased RealTime Dynamic Terrain Visualization
    WANG Jin;YANG Kejian
    2011, 1(5):  57-60.  doi:
    Asbtract ( 750 )  
    Related Articles | Metrics
    Based on the research and experimentation of the ROAM algorithm, this paper realizes the continuous multiresolution terrain rendering by binary tree for obtaining a realistic threedimensional roaming effect, designes a block strategy for the management of terrain data and a reasonable evaluation criteria on nodes, which is based on the consideration of viewport and terrain roughness. For effectively eliminating cracks between terrain blocks, a compulsory partition method is designed, which is based on adjacency relations. The experiment results show, on the promise of realism, that the algorithm can get better frame rendering rate, and achieve realtime threedimensional terrain roaming.
    Method of Camera Scene Autorecognizing Based on Visual Characters and LDA Model
    YANG Binwei;ZHANG Yifang
    2011, 1(5):  61-65.  doi:
    Asbtract ( 770 )  
    Related Articles | Metrics
    There is a core problem about how to autorecognize and cluster images captured by digital cameras in camera autoadjusted mode. A new supervised learning algorithm basedon visual characters and LDA is presented, which applies kinds of image codewords which include visual characters of images as training units prepared for image categorizing. After the autorecognition system being trained, different digital pictures can be clustered and then their matched modes will be chosen for terminal users. The test result shows that this algorithm can categorize different scenes automatically and works well.
    Automatic Identification of Digital Label Assembly Drawings of Mechanical Parts  Based on Computer Vision Technology 
    JIANG Nengxing
    2011, 1(5):  66-69.  doi:
    Asbtract ( 1720 )  
    Related Articles | Metrics
    In order to realize precisely the automatic identification of numeric characters in the assembly drawings of mechanical parts, the technology of Open Computer Vision libraries (OpenCV) are developed. This paper not only introduces the basic framework of OpenCV and its typical application areas, also, it compares and analyses the numeric characters in the assembly drawings of mechanical parts, which has great significance to the improvement on the current development in the area of the automatic identification of digital label assembly drawings of mechanical parts.
    Research and Application of 3D Terrain Generation Algorithm Based on Fractal Theory
    XU Qiongyan;LI Junfeng;WU Yinhua
    2011, 1(5):  70-73.  doi:
    Asbtract ( 1505 )  
    Related Articles | Metrics
    Researches and analyses the 3D terrain generation algorithm principle and process based on fractal theory. Mainly discusses the basic principle and the application of DiamondSquare method in 3D terrain generation. And simulates the DiamondSquare method using OpenGL program. The simulation results show that the algorithm is effective and feasible, and can be completely applied in the large scale geographic information system and visualization system.
    Construction 3D Tree Model and Exploration Its Optical Function  Based on Evolution of L System
    HUANG Fang;WEI Qiong;LI Xiaoyan;CHEN Xinyu;JIANG Xiangning
    2011, 1(5):  74-76.  doi:
    Asbtract ( 768 )  
    Related Articles | Metrics
    Based on the evolution theory of L system as the main algorithm, the paper takes a branch, a leaf and a bud as a transformant unit with the Turtle Geometry interpretation, generates a 3 dimension tree model. Using this model can compute conveniently the Leaf Area Index(LAI)and the gap frequency in different levels through the change of tree height percentage. The LAI and gap frequency has great significance in the research of photosynthesis. The result shows that this model, which is produced by the evolution theory of L system, assumed morphology resemblance and had some practical value, can be used in the simulation research of plant theory biology and observatory biology after some extension.
    Fire Realtime Rendering Based on Physics
    CHEN Yong;YANG Kejian
    2011, 1(5):  77-79.  doi:
    Asbtract ( 719 )  
    Related Articles | Metrics
    In order to effectively render in real time with real texture of the fire, the paper introduces an improved physical method, using compressible NavierStokes equations, solution speed and density of only two physical. Uses the date of density field which has been solved to characterize the fire shape. Then gets the color of fire derived interpolation through the blue core model. The method can reduce the calculation of NS equations size, fast calculation speed, real animation effect, and shows that fire is blown by the wind and the obstacles blocking effect.
    网络与通信
    Web Service Development Based on WSS4J Security Architecture
    XIAO Yun
    2011, 1(5):  80-82.  doi:
    Asbtract ( 1459 )  
    Related Articles | Metrics
    Apache WSS4J is an open source implementation of the WSSecurity standard, and a kind of safety standards AXIS2 also.WSS4J is a Javabased library that can be used to both sign and verify SOAP messages with WSSecurity information. WSS4J provides a simple and straightforward API for adding WSSecurity functionality into Web services clients to enable the authenticity, integrity, and nonrepudiability provided by XML digital signatures.
    Study on Information Search Model Based on Semantic Web Services 
    LI Zhiqiang
    2011, 1(5):  83-86.  doi:
    Asbtract ( 788 )  
    Related Articles | Metrics
    In order to resolve the lack of semantic information of traditional keywordbased information search method, this paper puts forward the information search model based on semantic Web services in distributed network environment, on the basis of the description on key technologies of semantic Web services. Through analysis of the functions of the model, it proposes the information search mechanism based on semantic similarity, and provides the solution in order to implement integration and sharing on information resources of heterogeneous systems. Finally it illustrates the implementation of information search prototype system based on semantic Web services, and makes performance analysis by simulated experiment. As a result, this paper provides a solution in order to achieve automatic and intelligent information search.
    Research on Localization in Largescale Underwater Wireless  Sensor Networks Using Error Control
    CHEN Rong;SHAN Zhilong
    2011, 1(5):  87-91.  doi:
    Asbtract ( 1426 )  
    Related Articles | Metrics
    Through researching on the localization issues of Underwater Wireless Sensor Networks (UWSN), a localization protocol for largescale UWSN is proposed, based on which an errorrestrained approach is proposed, which can reduce the rate of accumulation and transmission of the positioning error efficiently. NS2 simulation results show that the errorrestrained approach can both remain high positioning rate and reduce the positioning error by 62.8% compared with the normal localization approach.
    Lightweight Partial Flooding Strategy in Gnutella Network
    DONG Xiguang;ZHANG Zhiguo
    2011, 1(5):  92-95.  doi:
    Asbtract ( 782 )  
    Related Articles | Metrics
    Although it is very effective in content search, standard flooding mechanism is very inefficient because it results in a great amount of redundant messages which greatly restricts the scalability of networks. To solve the issue of redundancy message increasing quickly but coverage growing slowly when hop is high, this paper proposes a new lightweight partial flooding strategy named PartialFlood. In PartialFlood, when node receives a message it will not send the message to all its neighbors but select only part of them randomly as the object to forward. Analysis and simulation results show that the PartialFlood can greatly minimize the number of redundant messages while retaining the same message propagating scope as that of standard flooding, and it can be effectively used in P2P searching.
    Study of Frameadaptive Based on State of Underwater Channel 
    XU Chenggang;ZHANG Ming;GAO Jun
    2011, 1(5):  96-99.  doi:
    Asbtract ( 754 )  
    Related Articles | Metrics
    The optimization of network performance should be improved considering the particularity of the UWASNs’s channel. Under the circumstance of the random distribution of multinodes, this article studies and calculates the optimal length of data packet according to the different channel state, so as to achieve the goal of being adaptive. OPNET simulation is used to validate the analysis, and the simulation results show that the performance of network throughput would be improved as long as the length of frame is set correctly according to the state of channel.
    Design of Realtime Monitoring System Based on Java EE Multilayer Framework
    LIAO Zuobin
    2011, 1(5):  100-103.  doi:
    Asbtract ( 1466 )  
    Related Articles | Metrics
    The market is the main economic. To the market operation realtime monitoring,
    the better respond to market demand, be helpful for government departments to its macroscopical
    adjusting control, this paper adopts Java EE multilayer frame technology, including Struts
    framework, Spring framework and Hibernate framework, proposes a solution schedule to
    realtime monitor market supply, and demand solutions accordingly and developes an application
    system. Because of using a frame construction system, it makes great improvementing systematic
    testability and maintainability. The system can well adapt to the changing market demand
    information, and can better auxiliary related government enacte or adjuste market decision.
    Discussion of Medical Health Monitoring System Based on Wireless Network
    ZHAO Yuandong;TIAN Yingying
    2011, 1(5):  104-106.  doi:
    Asbtract ( 797 )  
    Related Articles | Metrics
    For the characteristics of the aging of population and the limitation of patient’s basic information that doesn’t flow among systems of community health service, a new health monitoring system is proposed, which can monitor health of patient all sidedly. The measured biomedical data is collected by embedded health diagnostic devices, which include various types of sensors and is transmitted towards the corresponding Health Monitoring Center via wireless networks where the data is integrated with the permanent medical data of the given patient. By analyzing the two sets of data, Health Monitoring Center is able to take the needed actions to coordinate and helps the Home and Local Medical Service, and then quickly responds to any medical situation in the best and secure way.
    Communication Between SR23 and PC Based on SerialPort in C# .NET
    XU Leilu;YU Zirong
    2011, 1(5):  107-109.  doi:
    Asbtract ( 1378 )  
    Related Articles | Metrics
    This paper describes the communication principle of SR23 temperature controller. Besides, the principles and methods of the data communications is achieved between SR23 temperature controller and computer by SerialPort Class in C# .NET. Remote monitoring and recording of multipoint temperatures are get through serial communications, and this method can be showed feasible and has good transmission and humanmachine interoperability.
    Study of Active Web Information Search Based on Credibility
    XIAO Ting;CHEN Hongying
    2011, 1(5):  110-113.  doi:
    Asbtract ( 767 )  
    Related Articles | Metrics
    Existing Web information search method is carried out based on keyword matching, the accuracy and reliability is limited. This paper focuses on user’s needs, uses background software building file filtering rule by the application of decision tree C4.5 algorithm. The file filtering rule combines with uncertainty reasoning way based on subjective Bayes for the additional credibility support, describes as the fuzzy rule to improve the recall and precision of Web information search.
    Study of Multiagent Collaborative Process Based on Role and CSCL 
    LIU Qingxiu ;LI Xiufang 
    2011, 1(5):  114-116.  doi:
    Asbtract ( 1481 )  
    Related Articles | Metrics
    :Multiagent collaborative problem in network environment is major study of MAS.
    On the base of a new intelligent CSCL model named RICL, this paper analyzes multiagent collaborative problems based on role in CSCL systems. Rolebased colony communication and cooperative rules are also provided. It thus provides a new pattern for collaborative problemsolving. 
    应用与开发
    Pulse Signal Testing System Based on Embedded Technology
    WANG Jing;XU Bin;YU Dongyan
    2011, 1(5):  117-120.  doi:
    Asbtract ( 722 )  
    Related Articles | Metrics
    This paper mainly introduces the compilation S3C2410 A/D conversion drive, and designs and developes the software interface based on QtIEmbedded, and realizes the realtime data acquisition boards in the development of human body pulse signal and display pulse waveform.
    Probe on Digital Application of Books and Archives Based on Cloud Computing
    FU Xiaoyi
    2011, 1(5):  121-123.  doi:
    Asbtract ( 703 )  
    Related Articles | Metrics
    Through technical characteristics of the clouds computing, the feasibilities and meanings of the digital application of books and archives based on cloud computing is introduced, and the possible architecture and problem faced is probed. 
    Design and Implementation of General Data Import Based on Configuration File
    WANG Chungang
    2011, 1(5):  124-126.  doi:
    Asbtract ( 755 )  
    Related Articles | Metrics
    Data import is key to data exchange between systems. The design based on configuration file can implicate heterogeneous data import and solve the problems of special applicationoriented. The success of applying this method into the comprehensive teaching and administration system proves that it is effective.
    Design and Implementation of Environmental Monitoring Personnel  Certificates Theory Assessment System
    HUANG Liangying;PENG Ganghua;XIA Xin
    2011, 1(5):  127-130.  doi:
    Asbtract ( 760 )  
    Related Articles | Metrics
    Organized by Environmental Monitoring Center of China, set the “Environmental monitoring personnel certificates Test Question Set”as the foundation exam database, and developing by PB9.0 software development tool, the environmental monitoring personnel certificates theoretical assessment system is developed. The system can greatly improve the environmental monitoring personnel assessment certificates efficiency and automation.
    Data Mining Based on Clementine Applied in Capillary Electrophoresis
    LIU Shuo;DONG Hongye
    2011, 1(5):  131-134.  doi:
    Asbtract ( 741 )  
    Related Articles | Metrics
    To predict capillary electrophoresis mobility time, Clementine’s neural network model is used to predict the electrophoresis mobility of 7 drugs of vitamin B1, etc. 350, as the 50 sets of data for the drug, taken as learning set (or training set) of 49 groups for training, and then takes the 1 set of data as prediction set. The most of the prediction results of relative error of Clementine is less than 10%, the prediction result is more accurate, for large sample data using neural network model of data mining to predict will get better results.
    Design and Realization of College MIS Based on SSH Framework
    LUO Yonghua;WU Jiawei;LI Yang
    2011, 1(5):  135-137.  doi:
    Asbtract ( 746 )  
    Related Articles | Metrics
    This thesis introduces Spring framework, Struts framework and Hibernate framework. For the construction and application of B/S mode MIS, Struts2 + Spring + Hibernate (SSH) technology architecture solution is used, and the detailed realization process of Web design and development is provided. The results show that, SSH technology architecture improves the efficiency of development and the maintainability of the system in constructing the complex business system, meanwhile, it enhances the stability and expansibility of system.
    Design of Equipments Defect Alert for Electronics Police System  Based on Time Characteristic 
    JIANG Yongchi
    2011, 1(5):  138-140.  doi:
    Asbtract ( 770 )  
    Related Articles | Metrics
    To solve the problem of equipments defect alert in electronics police system, a defect exiting in the equipment or not and the type of defect can be judged by the way of comparing the time characteristic of the documents returning from the electronics police equipments. This can help to exclude the equipment defect and insure the equipments to operate smoothly. Therefore, this paper designs a subsystem of equipments defect alert in electronics police system.
    Analysis and Design of College Teaching Material Module Based on  Main and Auxiliary System Architecture 
    DENG Yonghai;LI Chaorong;DENG Mei
    2011, 1(5):  141-143.  doi:
    Asbtract ( 777 )  
    Related Articles | Metrics
    To the problem existing in teaching affairs management and teaching material subscription and distributive management which being used by some colleges and universities at present, this paper takes teaching material subscription module from some vocational and technical college, which is designed on the basis of the construction of main and auxiliary system architecture, for example to introduce a designed method of teaching material subscription and distributive module, it can be used generally under both of the credit system and the academic year system.
    Application of Hybrid of Particle Swarm Algorithm and Kmeans Algorithm  in Remote Education System
    XIA Shuhua
    2011, 1(5):  144-146.  doi:
    Asbtract ( 1442 )  
    Related Articles | Metrics
    Most of the network teaching system has limitation in the student ondemand learning and “teaching students according to their aptitude”. The paper uses the hybrid of the particle swarm algorithm and Kmeans algorithm to improve the traditional network teaching system, carries on the cluster according to obtain users basic information and interest characteristic, fully reflects learnedcentered and individualized teaching model. The experimental results indicate that the proposed algorithm has good global convergence, optimization ability enhanced.
    Flow Control of Closed Circulatory System for Solar Collector
    ZHANG Dingxue
    2011, 1(5):  147-149.  doi:
    Asbtract ( 758 )  
    Related Articles | Metrics
    This paper describes the basic requirements for flow control of the thermal performance testing system of solar collector, then gives a control measure of the small flow in a closed loop control system, solves the bubble problem when the flow medium temperature rises significantly, proposes a way to measure the flow accurately. Practice shows that this flow control system has fast response, small overshoot, and high steadystate accuracy.
    Research on Chinese Maritime Muticlass Text Classifier Based on Nave Bayes 
    YUAN Wensheng;WANG Xiaofeng
    2011, 1(5):  150-153.  doi:
    Asbtract ( 776 )  
    Related Articles | Metrics
    This paper designs a effective multiclass text classifier based on Na〖HZ(〗〖XCI.TIF,JZ〗〖HZ)〗ve Bayes for maritime area. In preprocessing of text classification, the feature dimensions are greatly decreased by combining professional dictionary and stopwords after Chinese Word Segmentation, this paper uses IG feature selection, improved TFIDF to calculate feature words weights. Finally, the classification database for training Bayes is built. The experiment shows this maritime multiclass text classifier has great efficiency and accuracy.
    Key words:
    Design and Implementation of Information Management System  Based on Electronic and Electrical Products Environmental Test
    WU Xiaoping;TANG Xingji;PENG Tianhao
    2011, 1(5):  154-156.  doi:
    Asbtract ( 672 )  
    Related Articles | Metrics
    This paper makes use of the Visual Foxpro 6.0 to design an experiment information management system according to the requrement of the research, data analysis, data design, the design of each function mold piece to carry on. The visual system interface and good operating can improve the management efficiency.
    Design and Implementation of C Source Level Debugger
    ZHAO Xiang;GENG Rui;HUANG Guanghong
    2011, 1(5):  157-160.  doi:
    Asbtract ( 1388 )  
    Related Articles | Metrics
    Debugger plays an important role in the development of embedded software. This paper introduces the design of C source level debugger, specially in two key modules: how to get and store the debug information, and how to design debug function. At last, the paper shows the implement of C source level debugger.
    Analysis of MultiBusiness Collaboration and Research on Its Petri Model
    LIU Yiwei;JIANG Hongling;FAN Qinzan
    2011, 1(5):  161-164.  doi:
    Asbtract ( 747 )  
    Related Articles | Metrics
    For manufacturing production in the management of multisectoral and multiconstraint exists the business between them, collaboration and predecessor successor relationship, cooperative control of multiservice analysis and designs are made on this basis to achieve the planned synergies between businesses and between controlled Petri net model, completes the information interaction and constrained control of the main business plan, out of storage and inventory and the coordination of multiprocessing control is realized in the actual multiservice collaboration control system. The aplications have achieved good effect.
    Implementation of Largescale Rapid Deployment Linux
    YAO Luoye
    2011, 1(5):  165-167.  doi:
    Asbtract ( 701 )  
    Related Articles | Metrics
    In the cluster environment that requires a large number of Linux servers, the method of rapid deployment has realistic significance. The network installation method by using PXE and KickStart technology can achieve this goal. This paper analyzes the network installation process, then gives the required software technologies and their configurations, and points the way that how to set a unique hostname and static IP in the process of deployment.
    Research on Emergencysystemoriented Urban Virtual Environment Reconstruction Method
    ZHOU Quanyi;ZHAO Long
    2011, 1(5):  168-171.  doi:
    Asbtract ( 757 )  
    Related Articles | Metrics
    An emergency system oriented virtual environment reconstruction method based on route panorama and Google Earth is proposed. First video and GPS data are captured on a moving platform. The route panorama is generated from the video. The 3D scenes facade is reconstructed according to GPS information and is rendered with route panorama as the texture. The virtual environment is completed by loading the model to Google Earth. The experiments show that the method is simple and practical. The method has low requirements for hardware and network environment and strong expansion capability to a certain extent. The method can improve the commanders’ emergency response command and disposal capacity.
    Design of AMBA Bus Interface in USB OTG IP Core
    ZHANG Jianbin
    2011, 1(5):  172-174.  doi:
    Asbtract ( 728 )  
    Related Articles | Metrics
    AMBA bus interface is used for data communication with external MCU in a USB OTG IP core. After completion of the design of system framework of USB OTG IP core and analysis based on the AMBA bus specification, an implement of AMBA bus control state machine is proposed in detail, and the design of AMBA bus interface is also completed. The simulate results demonstrate the correctness of the design after passing functional verification which based on Xilinx FPGA, the IP is suitable for SoC design with USB module.