Loading...

Table of Content

    28 November 2011, Volume 1 Issue 11
    算法分析与设计
    A Genetic Parameter Selection Algorithm in Kernel Principal Components Analysis
    CHEN Jiang-hong;ZHANG Yuan-yuan
    2011, 1(11):  1-2.  doi:10.3969/j.issn.1006-2475.2011.11.001
    Asbtract ( 669 )  
    Related Articles | Metrics
    Kernel principal component analysis can extract the nonlinear features of the data, but the performance is great impacted by the parameter of kernel function. This paper presents a kernel parameters optimization method which based on a piecewise binary encoding. The experimental results are very good by using the approach to optimize the kernel parameters in the case of unknown the distribution of the data, which indicating the effectiveness of the method.
    Research on Optimization Logistics Transportation Network
    JIANG Wei-xing
    2011, 1(11):  3-4.  doi:10.3969/j.issn.1006-2475.2011.11.002
    Asbtract ( 800 )  
    Related Articles | Metrics
    Fixedcharged Transport Problem (fcTP) in the logistics transport networks is an advanced problem, and it is difficult to obtain optimal solution. This paper puts forward a Genetic Algorithm based on immune clone algorithm to solve multiobjective fixed charge transportation problem. In the algorithm, the transportation problem target function and constraints are regarded as antigens, problem feasible solution as antibodies, compatibility degree between antigen and antibody are represented by the feasible solution to the objective function, through the judgment of compatibility degree between antibody and antigen and of antibody concentration to select individuals to clone the next generation. Simulation results show that the immune cloning genetic algorithms in the application of the fixed charge transportation problem gets better Pareto optimality sets and Pareto boundary.
    Study on Fuzzy System Identification Based on SVM
    YE Jian-bin;DING Zhi-yan;
    2011, 1(11):  7-4.  doi:10.3969/j.issn.1006-2475.2011.11.003
    Asbtract ( 668 )  
    Related Articles | Metrics
    GK fuzzy clustering is a data analysis technique that is widely applied to classification, and it can intelligently detect the shape of a different cluster. However, there are shortcomings about constant numbers of clusters in each iteration and the covariance matrix in the formula required to nonzero. In order to improve these shortcomings, this paper proposes a new fuzzy clustering algorithm. The existing fuzzy identification algorithm has the curse of dimensionality problem and it lacks of a solid theoretical foundation. The paper analyzes the equivalence of the lack of bias item support vector regression machine and languagebased fuzzy model, proposes a new algorithm which combines support vector machines and fuzzy model identification. It also uses gradient descent method to identify parameters. In order to reduce the number of rules and reflect the data information, the paper adopts an improved GK fuzzy clustering for the input sample set to classify these data better.
    Predictive Model of Aluminium Strip’s Crown at Hot Tandem Rolling Mill’s Finisher Delivery Based on BP Network
    HU Wei
    2011, 1(11):  11-4.  doi:10.3969/j.issn.1006-2475.2011.11.004
    Asbtract ( 572 )  
    Related Articles | Metrics
    “ 1+4 ” aluminum hot tandem rolling mill is a complicated system extremely. In order to predict crown of aluminum strip of the finisher delivery more accurately, this paper puts forward a method of timelapse loop BP network to forecast the sequencing crown, and the reconfiguration of BP network is trained with LM algorithm. With a large number of test data gathered by onthespot experiment and analysis, simulation experiment indicates the predictive precision of relative crown(%) of strip can reach 0.01%, effectivenes and superiority is proved.
    Research on Calculating Definite Integral Method Based on Monte-Carlo
    MA Hai-feng;LIU Yu-xi
    2011, 1(11):  15-3.  doi:0.3969/j.issn.1006-2475.2011.11.005
    Asbtract ( 621 )  
    Related Articles | Metrics

    MonteCarlo method is a very important class of numerical methods guided by a statistical probability theory. This paper introduces the algorithm reality of MonteCarlo method for calculating the definite integral, and makes comparative analysis from the accuracy and time efficiency points with interpolation integral. The experimental results show that the MonteCarlo method for calculating the definite integral suits for a wide range and the computation efficiency is efficient.

    Research on Distribution Center Location Based on Artificial Neural Networks and SVM
    LU Yun-zhi;LIU Jing-jue;XU Xiao-lu
    2011, 1(11):  18-4.  doi:10.3969/j.issn.1006-2475.2011.11.006
    Asbtract ( 683 )  
    Related Articles | Metrics

    This paper proposes a new algorithm of distribution center location based on the precious academic study. This algorithm combines artificial neural networks and support vector machine algorithm, and makes tests with different methods. Through using the artificial neural networks and support vector machine to process data, appraises a lot of candidates objectively, and gives examples of the implementation process.

    People’s Balance Distribution in Plane’s Periodic Maintenance Based on Ant Colony Optimization
    MA Deng-wu;ZHANG Yong-liang;DENG Li;ZHANG Xu;ZHANG Xiao-yu
    2011, 1(11):  22-5.  doi:10.3969/j.issn.1006-2475.2011.11.007
    Asbtract ( 781 )  
    Related Articles | Metrics

    Ant Colony Optimization (ACO) is used to balance people’s distribution in plane’s periodic maintenance. Firstly, the model of people’s balance distribution is built according to the mean square deviation target. Secondly, the simple ACO is improved by three elite tactics, pheromone limits and mechanism, a new mutation operator is used to improve its function. At last, the improved ACO is used to solve the model. The simulation results demonstrate that, the improved ACO comes over the deficiency of being long in search and easy to precocity of the simple ACO, after the balanced distribution the mean square deviation is smaller 65.90% than before, and proves that ACO is good for the problem of people’s balance distribution in plane’s periodic maintenance.

    Design and Implementation of Induced Traffic Based on ACA
    LI Ran-ran
    2011, 1(11):  27-5.  doi:10.3969/j.issn.1006-2475.2011.11.008
    Asbtract ( 687 )  
    Related Articles | Metrics

    The existing traffic information systems are based on the single objective, such as the shortest path, which is insufficient to meet the new era of traffic demand. This paper makes use of ant colony algorithm to solve noninferior solution of the trafficinduced problems. This paper not only uses the traffic induced model of ant colony algorithm for solving noninferior solutions, but also improves the algorithm based on explores range for the position correlation of traffic spatial data. The improved algorithm reduces the probability when the ant colony algorithm chooses the little relativity position. And therefore, it accelerates the search speed for optimal solution.

    计算机仿真
    Research on Virtual Machining Simulation Algorithm Based on Dynamic Partial Rendering for Voxel Model
    LI Niu;CHEN Cheng-jun;CHEN Han-yan
    2011, 1(11):  32-5.  doi:10.3969/j.issn.1006-2475.2011.11.009
    Asbtract ( 665 )  
    Related Articles | Metrics

    To improve the speed and accuracy of virtual machining simulation, a new algorithm of dynamic partial rendering for voxel modelbased virtual machining simulation is proposed. It uses voxel adjacency relationship between nodes to achieve dynamic partial rendering. In initialization stage, both octree structure voxel model for virtual rough and adjacency traversal algorithm of any voxel are modeled. In stage of virtual machine simulation, the collision detection is conducted from voxels that collided with virtual tool in last frame, and spreads to their adjacent voxels calculated using adjacency traversal algorithm. If some tested voxel is collided with virtual tool, its parameter will be modified dynamically. So dynamic partial rendering in virtual machine simulation is realized. Finally, a simple fiveaxis milling virtual machining experiments is setted, which shows that the presented algorithm is feasible and effective.

    Teaching Research of Computer Network Simulation Practice Based on OPNET
    MO Jia-qing;HU Zhong-wang;LIN Yu-hua
    2011, 1(11):  37-3.  doi:10.3969/j.issn.1006-2475.2011.11.010
    Asbtract ( 670 )  
    Related Articles | Metrics

    In order to solve the existing problems of computer network curriculum teaching, a teaching method which is introduced network simulation technology to network experiment is proposed. The role of OPNET network simulation technology in experiment teaching is expounded, and basis on this, the simulation experiment is divided into the verified experiment, designing model experiment, comprehensive experiment. Finally, a design model simulation experiment demonstrates that the network simulation technology in improving the level and quality of experimental teaching is effectiveness.

    Research and Simulation of Queue Management Algorithms DropTail and RED
    XIAO Quan-quan;DUAN Xun
    2011, 1(11):  40-3.  doi:10.3969/j.issn.1006-2475.2011.11.011
    Asbtract ( 756 )  
    Related Articles | Metrics

    Queue management functions are responsible for router’s queue establishment, maintenance and line up and determine when to accept or discard packets. Active queue management algorithm DropTail is widely used for congestion control in Internet. Random Early Detection (RED) is recommendedly used by IETF for queue management. The article uses the NS2 network simulator to simulate DropTail and RED queue management algorithm. Through analysis of the simulation data, the obtained RED queue management algorithm is higher than the overall performance of DropTail. This study provides the basis for further research of the RED algorithm.

    Design and Realization of Virtual Reality 3D Software of Coal Mine Safety Based on OGRE
    EN Bing-zhong;KONG Wen-huan
    2011, 1(11):  43-4.  doi:10.3969/j.issn.1006-2475.2011.11.012
    Asbtract ( 693 )  
    Related Articles | Metrics

    ]With the development of digital management of coal mine safety, the virtual reality of coal mine safety based on 3D technology has become an important technology. The virtual reality 3D software of coal mine safety uses OGRE engine as a programming environment. It expounds the software construction of OGRE and the construction of the virtual reality 3D software of coal mine safety. It presents the modeling method of 3D models of coal mine, designs the operating and controlling method of animating 3D models. It has practical significance for the management of coal mine safety and the construction of digital coal mines.

    Implementation and Application of Probabilistic Neural Network Based on Matlab
    SU Liang;SONG Xu-ding
    2011, 1(11):  47-4.  doi:10.3969/j.issn.1006-2475.2011.11.013
    Asbtract ( 648 )  
    Related Articles | Metrics

    The paper introduces the model and basic algorithms of Probabilistic Neural Network (PNN), and the methods and procedures of using Matlab neural network toolbox to design PNN, also the realization of network design training, simulation. The forecast classification results of the experimental data for the arm set of the concrete pump truck wilding structure fatigue life are obtained by using the PNN classified function on training and simulating. The reliability of this method is confirmed.

    Research on Naval Battlefield Natural Environment Modeling and Simulation Data Model
    XIE Kong-shu;ZHAO Guo-rong;JIANG Xiao-rui
    2011, 1(11):  51-4.  doi:10.3969/j.issn.1006-2475.2011.11.014
    Asbtract ( 643 )  
    Related Articles | Metrics

    Environment Data Model (EDM) is the core and basis to realize naval battlefield natural 〖JP3〗environment modeling and simulation. With the background of naval weapons and armaments simulation application, naval battlefield natural environment data model is studied deeply. And then, an EDM framework is designed, which is a significant expansion to the traditional EDM. Finally, naval battlefield natural environment elements are extracted classifiably, and the EDM class library is realized with C++language.

    中文信息技术
    Research on Applications of Conditional Random Fields and Its Improvement
    JIANG Wen-zhi;GU Jiao-jiao;HU Wen-xuan;LI Fei
    2011, 1(11):  55-4.  doi:10.3969/j.issn.1006-2475.2011.11.015
    Asbtract ( 718 )  
    Related Articles | Metrics

    The conditional probability models gain great developments these years. The conditional models gradually took place of generative models in sequence labeling

    problems. It covers a wide range of applications, such as image recognition, natural language processing, intrusion detection and other issues. Conditional Random Fields is representative of conditional models and becomes one of the most popular models, for it not only overcomes the shortcomings of generative models but also defeats the label bias problem of Maximum Entropy Model. That’s why it’s very popular. But when CRFs is used for specific applications, it’s found that the results may not achieve the best. So in every specific application some improvements are made except for the CRFs model itself. The research includes military commands segmentation, military named entity recognition, ntrusion detection, etc. All these specifications are made on the basis of the CRFs model and the system performances are greatly improved.

    Text Automatic Categorization with Evolutionary Neural Network
    GENG Jun-cheng;NIU Shuang-xia;ZHANG Cai-jun
    2011, 1(11):  59-5.  doi:10.3969/j.issn.1006-2475.2011.11.016
    Asbtract ( 635 )  
    Related Articles | Metrics

    The artificial neural network is an effective method of text categorization. However, the uncertainty of the network makes it difficult to find a suitable network. This paper uses the particle swarm optimization algorithm to optimize neural network, makes it adaptive to adjust its connection weights and network structure in the evolutionary process. First, represents the text set as a vector space, and then uses the information gain algorithm to select feature items, uses the term frequencyinverse document frequency to calculate its weight.Finally, uses the evolutionary neural network to categorize the Chinese text automatically. Experimental results show that comparing with the original BP neural network, the classification of evolutionary BP neural network is better.

    图像处理
    A 3D Reconstruction Method for Deformable Surface
    SHI Jin-long;LIU Qing-hua
    2011, 1(11):  64-3.  doi:10.3969/j.issn.1006-2475.2011.11.017
    Asbtract ( 621 )  
    Related Articles | Metrics

    This paper presents a novel method of 3D reconstruction from calibrated images. With this method, firstly, initial corresponding points are found by using SIFT, secondly, 3D points are generated as seed points, thirdly, region growing is implemented according to these seed points until the whole surface is reconstructed. During the process of region growing, image correlation of the projected patches in two images is calculated. If the image correlation is bigger than a threshold, the growing is considered as a right one; otherwise the growing will be rejected. The performance and effectiveness are evaluated by experiments.

    Bandelet Domain SAR Images Despeckling Based on BayesShrink Softthresholding
    XU Ya-nan;WANG Xian-cai
    2011, 1(11):  67-3.  doi:10.3969/j.issn.1006-2475.2011.11.018
    Asbtract ( 700 )  
    Related Articles | Metrics

    Synthetic Aperture Radar (SAR) images are inherently affected by multiplicative speckle noise, which seriously affects the quality of SAR images. This paper presents a despeckling method for SAR images based on adaptive Bandelets thresholding. This threshold is derived in a Bayesian framework named BayesShrink softthresholding, and it is applied to adaptive Bandelets coefficients to achieve more satisfying results. The performances of this proposed scheme and wavelet thresholding for despeckling SAR images are compared through experiment. Experiment results clearly demonstrate the proposed scheme is able to better keep texture and edge character.

    A Method of Images Steganalysis
    ZHANG Wen-hua;XIANG Yang;PAN Tian-kui
    2011, 1(11):  70-4.  doi:10.3969/j.issn.1006-2475.2011.11.019
    Asbtract ( 706 )  
    Related Articles | Metrics

    As for the deficiency of the existed steganalysis algorithm for color image detection, this article provides a steganalysis algorithm based on wavelet statistics to analyze the statistic differernce between carrier image and stego image. The method, transforming the color image into the YCbCr space and extracting the prediction subband coefficients’ probability density function(PDF) and the predictionerror image subband coefficients’ histogram characteristic function(CF) moments through the wavelet decomposition, makes use of the support vector machine(SVM) to achieve classification. The experimental results for the popular JPEG steganographic schemes, for example, F5, OutGuess, Jphide&Seek, demonstrates that the proposed scheme can achieve good detection accuracy.

    Research on Digital Watermarking Algorithm Based on QR Barcode
    SUN Bing;GAO Mei-feng
    2011, 1(11):  74-4.  doi:10.3969/j.issn.1006-2475.2011.11.020
    Asbtract ( 667 )  
    Related Articles | Metrics

    In accordance with the structural features of QR barcode, a digital watermarking algorithm is proposed. The algorithm is that the size of watermarking is adjusted according to barcode capacity and then the watermarking information is embedded in ranks of QR barcode by using structural tuning method. Combining twodimensional barcode with digital watermark technology improves the security and confidentiality of QR barcode.

    Research on Corner Matching Method Based on Harris
    ZHANG Yong;YU Jian-ping;SUN Jun-wei;JIN Tie
    2011, 1(11):  78-4.  doi:10.3969/j.issn.1006-2475.2011.11.021
    Asbtract ( 628 )  
    Related Articles | Metrics

    This paper proposes a method to extract corners from the image by the Harris algorithm, and gets rough matched corner set by similar measures. And then compares the simple clustering method and the disparity gradient constraint method for prepurring matching corners. The experimental results show that the clustering method is superior to the parallax Gradient constraint method. It also needs to further improve the efficiency of RANSAC algorithm in order to make it suitable for realtime processing of the occasion.

    A Fast Approach of Image Stitching Based on Automatic Microscopyc
    WANG Bo;WANG Yan
    2011, 1(11):  82-4.  doi:10.3969/j.issn.1006-2475.2011.11. 022
    Asbtract ( 606 )  
    Related Articles | Metrics

    In order to improve the efficiency of X films detection in industry, a method using the automatic microscopy instead of the naked eyes to detect the X films is offered, and by researching the character of the microscopy sampling and the X film image, a fast approach of image stitching using gray relativity of pixels is proposed: taking out midpixel of the last row of frontal sampling image to construct the matching matrix, making the threshold, finding the matching pixel in the next image by getting the correlation, and validating the veracity by circle checkout. According to the experiment, this approach is of perfect accuracy and efficiency.

    Research on Machine Visual’s 3D Human Body Action Recognition
    SUN Jin-hong;LIU Wei-dong;MA Liang;YANG Wei-lei
    2011, 1(11):  86-4.  doi:10.3969/j.issn.1006-2475.2011.11.023
    Asbtract ( 712 )  
    Related Articles | Metrics

    This paper tracks the target based on the model of human body, combines the depth information gained by infrared sensor with 2D image information captured by the ordinary sensor, then achieves motion recognition by utilizing rotate matrix to process the data of connected point.

    An Image Denoising Algorithm Based on Median Filter
    GENG Shuai;WANG Xi-chang
    2011, 1(11):  90-3.  doi:10.3969/j.issn.1006-2475.2011.11.024
    Asbtract ( 722 )  
    Related Articles | Metrics

    As a result of the interference of noise, the results of the following processing will be affected. Hence, before dealing with other image processing, this paper first denoises the image. The conventional medial filters do not perform well in case of uniformly distributed salt & pepper noise, so a new adaptive median filter is presented. By comparing SNR, PSNR and visual effects of the denoised image, it showes that comparing with the conventional median filter the new filter performs better in removing the noise and reducing distortion in the image.

    网络与通信
    Stabilitybased Reliable AS-IP Mapping Construction Method
    YAN Qiang;WANG Xiao-qiang;CAI Kai-yu;ZHU Pei-dong
    2011, 1(11):  93-4.  doi:10.3969/j.issn.1006-2475.2011.11.025
    Asbtract ( 683 )  
    Related Articles | Metrics

    Internet Autonomous System (AS) claims the ownership of its IP address blocks by advertising those blocks in routing system. Prefix hijacking occurs when an AS advertises a prefix not of its own. It is known to be rather challenging to detect and confirm prefix hijacking for Border Gateway Protocol (BGP) itself cannot tell the invalid mappings of AS and its announced IP prefixes from those valid ones. This paper proposes and implements a stabilitybased approach to construct reliable ASIP mappings, which are further used in the detection of prefix hijacking. For each ASIP mapping, it first builds a time series according to its liveness in a past time window, and then calculates the stability of this sequence to measure the reliability of this mapping. This method is applied to the data related to several largescale prefix hijacking events. The experiments show that the proposed method can accurately construct ASIP mappings and effectively detect prefix hijacking events.

    Embedded Network Video Monitoring System Based on Softcore Nios II
    WANG Hong
    2011, 1(11):  97-4.  doi:10.3969/j.issn.1006-2475.2011.11.026
    Asbtract ( 631 )  
    Related Articles | Metrics
    This paper introduces Nios II HW/SW designing process in detail, designs the network video monitoring system and transplants the LwIP stack and Linux to Nios II system. By selecting the proper micro operating system  Linux and TCP/IP stack  LwIP, remote users can access the Web pages storied in Nios system by a browser, and realtime monitor videos through Internet on client programs.
    Dual Core and Multi-export Campus Network Design Scheme Based on Packet Tracer
    HUANG Cheng-bing
    2011, 1(11):  101-4.  doi:10.3969/j.issn.1006-2475.2011.11.027
    Asbtract ( 737 )  
    Related Articles | Metrics
    This paper introduces the functions and features of the imitator called Packet Tracer, designs a design proposal of bicore and multiexport for campus network. Makes use of Packet Tracer to accomplish the topology and configuration of the whole project, and test its functions in detail. The test shows the feasibility of the design scheme of campus network, and the importance of Packet Tracer in the computer network courses.
    Application of Communication Between PC and PLC in Longdistance Network Measurement and Control System
    TONG Qiang;YU Jin-ke;;LI Wen-jun
    2011, 1(11):  105-3.  doi:10.3969/j.issn.1006-2475.2011.11.028
    Asbtract ( 618 )  
    Related Articles | Metrics

    This paper describes the principle of longdistance network measurement and control system, introduces a way of communication between PC and PLC in the long distance network measurement and control system. With the HostLink communication protocol which belongs to OMRON, serial communication between PC and PLC is realized by using of MSComm component under Delphi 7.0 environment.

    Exclusive Communication Mechanism of Hybrid Architecture Indoor Location System for WSN
    LIU Yu-hong;ZHANG Lei
    2011, 1(11):  108-4.  doi:10.3969/j.issn.1006-2475.2011.11.029
    Asbtract ( 731 )  
    Related Articles | Metrics

    Avoiding interferences and collisions among signals of beacons is the one of important issues to indoor location system for wireless sensor networks. Exclusive communication that makes only one beacon transmits its signals at one time can be utilized to resolve it in centralized architecture; and another effective beacon can be selected randomly as a center node in exclusive mode by current beacon leaving its exclusive state. Combining advantages of centralized and decentralized architecture helps to resolve the problem among signals interferences and collisions of different beacons effectively.

    Design and Implementation for Performance Optimizing of Communication Server in Largescale Vehicle Supervision System
    CHEN Shi;ZHU Yan
    2011, 1(11):  112-4.  doi:10.3969/j.issn.1006-2475.2011.11.030
    Asbtract ( 577 )  
    Related Articles | Metrics

    The paper designs a highperformance communication server for the problem of original vehicle supervision system can not meet largescale load. This communication server is reasonably divided business structures, and optimization designe is done from multithreaded asynchronous receiving, agreement analytical model, shared data synchronization and threads pool four aspects. The ultimate test shows that the communication server is of good applicability, reliability and extensibility.

    软件工程
    Philosophical Foundation of Qualitative and Quantitative Research Approaches in Information Systems Research Studies
    ZHOU Li-hong;;LI Xu-guang;LIU Yu-qing;ZHAO Di
    2011, 1(11):  116-4.  doi:10.3969/j.issn.1006-2475.2011.11.031
    Asbtract ( 728 )  
    Related Articles | Metrics

    A large number of Information Systems (IS) researches in China adopt a positivist epistemological perspective and aim at testing existing concepts, models, and theories, which are very often rooted in the social context of Western countries and are established by mainly Western scholars.Thus, these models and theories are usually not entirely applicable to the economical, social and cultural environment of China.This paper discusses the differences between qualitative and quantitative research approaches on the basis of indepth exploration and discussion of the philosophical foundation of IS research.The conclusion advocate that the selection of quantitative or qualitative research approaches, methods and techniques must be based on a clear identification of the philosophical perspective of an IS project, in accordance with the aims, questions, requirements of research as well as the research context. In this way, advantages of both research approaches can be fully operationalized and applied for the purposes of either developing, or verifying models and theories grounded in the current situation of Chinese social, economic and political development.

    Building of Public Opinion Monitoring System and Research on Coping Mechanism in Campus Network
    SONG Guang-hui;NIE Yan;GUO Jian-kang
    2011, 1(11):  120-3.  doi:10.3969/j.issn.1006-2475.2011.11.032
    Asbtract ( 669 )  
    Related Articles | Metrics

    According to the insufficient of public opinion monitoring work and combining with transmission characteristics of public opinion information in colleges, the whole scheme of constructing public opinion monitoring system is presented. Information retrieval technology based on Nutch search engine is applied to campus network, information collection technology based on Meta search engine is used on Internet, the way of keywords feature library matching is used for automatic experiment monitoring, thereby the public opinion information is found timely and accurately. In addition, this paper explores the handler methods of some links such as monitoring, analysis, guide and feedback facing the public opinion, so as to form perfect coping mechanisms.

    Strategic CSR Management of International Hitech Business
    LIN Tzu-ming;HSIAO Yu-zhong
    2011, 1(11):  123-6.  doi:10.3969/j.issn.1006-2475.2011.11.033
    Asbtract ( 676 )  
    Related Articles | Metrics

    The emphasis of CSR(Corporate Social Responsibility) has been addressed to a new peak. It has been an important issue when facing global trend. So the managerial level of global business should integrate the CSR into business’s core value. It is one of the key factors that maintain the sustainable competence advantages. The thought should be shifted from past ″must and ought″ to current ″doing good by doing well″. To do so, companies can bring positive value and effect to the society while doing business.CSR has effect the hitech industry much more than any other industries. CSR has been adopted as not only the international standards but also the necessary antecedent of being the vendor of many countries. QSMC is one representative case of hitech companies. This research generalizes the behavior and attitude toward CSR of the hitech companies from the case study of QSMC.

    Design of Extendable LBS Platform
    LI Zhi-yong;GAO Feng
    2011, 1(11):  129-4.  doi:10.3969/j.issn.1006-2475.2011.11.034
    Asbtract ( 634 )  
    Related Articles | Metrics

    LBS is an integrated application which involves several different industries,and has a very bright business future, whereas, the corresponding systems lack of a stable and scalable architecture. Therefore, it is very necessary for LBS service system to select steady architecture and extendable platform. As for this, the paper designs an extendable Location Service Platform(LSP) system with opening ports, which can not only efficiently develop a variety of LBS applications, but also gradually perfect the applicationoriented LBS general services platform.

    Construction of Serviceoriented Government Portal in Web 2.0 Environment
    LIU Teng-hong;XU Xing
    2011, 1(11):  133-5.  doi:10.3969/j.issn.1006-2475.2011.11.035
    Asbtract ( 669 )  
    Related Articles | Metrics

    Based on the thinking of serviceoriented government and combining with the new technical characteristics of Web 2.0, firstly, this paper summarizes the characteristics of the Web 2.0 serviceoriented government portal, then comes up with the serviceoriented government portal models using the framework of Web 2.0, including the application models and technology models, thus provides the feasibility assurance and technical support for the construction of Web 2.0 serviceoriented government portal. Web 2.0 serviceoriented government portal strengthens the concept of service rather than the traditional government portal, sublimes the service mode, provides better public services, and truly demonstrates the government serves the people.

    数据库
    A Solution for Replica Problem in Distributed Database System and Its Application
    CHEN Gong;NIU Qin-zhou
    2011, 1(11):  138-4.  doi:
    Asbtract ( 588 )  
    Related Articles | Metrics

    The replication mechanism provides many advantages while some problems are coming. There are many solutions about it. For these problems some factors are considered including requirement analysis, data fragment and distribution, asynchronies replica, data updating, replica mode, data collision, query and so on. According to actual circumstance the methods about these factors are selected or advanced, so that a new solution for replica in distributed database system is put and applied to a publication issuance information system and solves replica problem better.

    Research on Keyword Search over Relational Database
    WANG Fang;CHEN Hai-jian
    2011, 1(11):  142-4.  doi:10.3969/j.issn.1006-2475.2011.11.037
    Asbtract ( 647 )  
    Related Articles | Metrics

    In recent years, the research on the keyword search over relational database once again becomes a hot issue. This paper firstly introduces some of the basic knowledge of keyword search, then completes analysis of the main technologies and methods, such as relational database model and the model map definitions, retrieval processing, query language, score and ranking, delivery of the query results.

    Design of Audit Evidence Evaluation System Based on DS Evidence Theory
    CHENSheng-lei;CHENGeng;XUEHui;ZHOUJing
    2011, 1(11):  146-4.  doi:10.3969/j.issn.1006-2475.2011.11.038
    Asbtract ( 681 )  
    Related Articles | Metrics

    Under the background of the rapid development of information technology, it is of great significance to manage and evaluate audit evidence using computer technology. DS evidence theory is an effective means to make uncertainty reasoning, thus can be used to deal with uncertainty in audit evidence. Consequently it is practical to develop audit evidence evaluation system based on DS theory. The elementary principle of DS theory is firstly described. Then the functional requirements are analyzed and the functional structure is designed. Finally the flow of the evidence fusion module is explained and the evaluation system is implemented with B/S structure. The use of this system can enhance the proof performance of audit evidence and decrease the audit risk.

    应用与开发
    Design and Implementation of Physical Data Migration System Based on SOA
    FAN Wei-wei
    2011, 1(11):  150-4.  doi:10.3969/j.issn.1006-2475.2011.11.039
    Asbtract ( 617 )  
    Related Articles | Metrics

    To meet physical statistical data reporting requirements from the higher authorities, this paper proposes a physical data migration system based on Service Oriented Architecture(SOA), which is B/S mode and aims at accurate, efficient, and noninvasiveness, and then describes data collection, data conversion and migration process. The platform can extract physical data which is needed by higher authorities from the existing physical information system, make data conversion and migration to a particular statistical analysis of physical data system, and then complete the data statistics report. The entire data migration process is accurate and efficient since the platform is put into use. Health care workers don’t need to do manual entry of statistical data any more, and economic and social benefits are significant.

    Accomplishment and Application of Technology for Embdded Speech Recognition
    LI Chao;
    2011, 1(11):  154-4.  doi:10.3969/j.issn.1006-2475.2011.11.040
    Asbtract ( 655 )  
    Related Articles | Metrics

    Speech recognition technology has a wide range of applications in information security, smart home etc. The article first studies some technologies of speech recognition, and then discusses how to program the algorithm of speech recognition on embedded devices. Finally the speech control platform is built, and applied to remote power management, which can turn on or cut off the remote power modules. Theoretical derivation and experiments show the method can apply to turn on or turn off remote power device conveniently.

    Design and Implementation of Paperless Examination System Based on Ability Test
    LI Jian;CHEN Jian-ying;GUO Li-ping
    2011, 1(11):  158-4.  doi:10.3969/j.issn.1006-2475.2011.11.041
    Asbtract ( 778 )  
    Related Articles | Metrics

    As the starting point of professional application ability test, this paper designs a paperless examination system which can realize the automatic marking and handmade marking online using the Web technology, database technology and software technology. It also optimizes the data storage by adopting the custom tag technology. The application results indicate that the system is simple to maintain and management, high efficiency to storage, convenient to implement. It has better application.

    Design and Implementation of Filesharing System Based on Centralized P2P
    HE Huai-wen;XIA Bai-zhan
    2011, 1(11):  162-4.  doi:10.3969/j.issn.1006-2475.2011.11.042
    Asbtract ( 633 )  
    Related Articles | Metrics

    This paper, firstly, researches and discusses the feature of currently popular P2P technology. Secondly, designes a filesharing system based on centralized P2P which storing catalog of resource in index server, and downloading or uploading file between each node. At last, one prototyping system is implemented by Java language. This system uses XML for encapsulating message, and uses multithread socket to transfer file. It can be used for enterprise internal file sharing which reduces storage cost.

    Analysis and Design of Webbased Course Selection and Employment System in Adult College Based on UML
    JIANG Zhong-hua
    2011, 1(11):  166-4.  doi:10.3969/j.issn.1006-2475.2011.11.043
    Asbtract ( 617 )  
    Related Articles | Metrics

    Unified Modeling Language (UML) is a widely used objectoriented modeling language, for different areas of personnel to provide uniform communication standards. The Webbased course selection and employment system in adult college is a management system for applicable to adult college. With the system, teachers select and apply for their familiar course, the employment team judge and select the best teacher for the course. The system analyzes the data of the same course in previous term and adds up it. For improving the quality of teaching, the employment team selects the best teschrers to suite the different course and specialty. Of course, the system fully considers the interface with the other MIS to share data. After bringing the system into effect, the effectiveness gets evidently improved.

    Application of Game Case for C Language Teaching
    CHANG Yu-hong
    2011, 1(11):  170-4.  doi:10.3969/j.issn.1006-2475.2011.11.044
    Asbtract ( 751 )  
    Related Articles | Metrics

    C language has been widely used in the basic courses for students and plays a key role in the study of subsequence courses. Currently, most students are not interested in C language and the cases in teaching are boring. In view of existing situation, a method is gived which applies game case in C language teaching. In the past few years of teaching practice, it turned out that this method improved the quality of teaching and learning efficiency.

    Research on Performance of Linear SVM Correlation Filter
    HE Miao
    2011, 1(11):  174-5.  doi:10.3969/j.issn.1006-2475.2011.11.045
    Asbtract ( 606 )  
    Related Articles | Metrics

    A twoclass classification model is established to evaluate the performance and application prospect of the novel linear SVM (Support Vector Machine) correlation filter. The SVM filters based on different training samples are synthesized by computer as well as other 3 correlation filters. The ability to resist inplane rotation, outofplane rotation and noise of those filters are tested and compared. The experimental results indicates the SVM correlation filter exhibites the best ability to resist inplane rotation, and favorable ability to resist outofplane rotation and noise. It is concluded that the linear SVM correlation can be applied helpfully in the inplane rotated image recognition and 3D object recognition within a medium distortion range.

    Integrated Development Technology of Office Based on Java
    JIANG Xiao-lei
    2011, 1(11):  179-4.  doi:10.3969/j.issn.1006-2475.2011.11.046
    Asbtract ( 716 )  
    Related Articles | Metrics

    Microsoft Office series software is office automation software of extensive applied, carrying out its(mainly Word and Excel) integrated development for userdefined apply is that some application systems development are facing urgent need at present. This paper discusses and summaries the realization and application of integrated development technology.

    Analysis and Design of Students’Management Information System Based on UML
    WEI Wu-hua
    2011, 1(11):  186-7.  doi:10.3969/j.issn.1006-2475.2011.11.048
    Asbtract ( 721 )  
    Related Articles | Metrics

    This paper discusses the analysis and design of students’ management information system based on UML in detail. The system mainly realizes student registration management functions and scores management functions.

    Study and Implementation of Information Management System Operation Dynamic Processing Method
    ZHU Wei-xin
    2011, 1(11):  193-2.  doi:10.3969/j.issn.1006-2475.2011.11.049
    Asbtract ( 636 )  
    Related Articles | Metrics

    This paper creates a public class to realize the users of information system processing important business data, when users modifying or deleting business data, it saves operation log and saves operation log and saves the amendment or deleting data into database, in order to recover or inquire the history, solve dynamic error operating or human factors which lead to loss of information.

    AISbased Intelligent System Development for Navigation Channel Traffic Flow Record
    ZHOU Jian-min
    2011, 1(11):  195-4.  doi:10.3969/j.issn.1006-2475.2011.11.050
    Asbtract ( 687 )  
    Related Articles | Metrics

    An accurate analysis on the ability and demand for navigation is of great significance to regional navigation industry. Meanwhile, gathering accurate information concerning ship traffic flow and relative cargo transportation in a navigation channel are essential for statistics and analyses. This essay aims to give a research on the AISdatabased (AIS,Automatic Identification System) intelligent system design plan for navigation channel traffic flow information gathering, expounds the rationale of the intelligent system design as well as its major algorithm and structure, especially elaborats on the workflow of intelligent ships’ AIS information track, record and control module in the system.

    Realization of Search Engine Model Based on ASP.NET
    WANG li
    2011, 1(11):  199-3.  doi:10.3969/j.issn.1006-2475.2011.11.051
    Asbtract ( 622 )  
    Related Articles | Metrics

    With the fast development of Internet technology, search engines become one of important Internet navigation tools. While the search engines code are not opened to world, which is not good for people to study. In this paper, an opencoded search engine model is designed and realized based on ASP.NET. It can be regarded as a prototype foundation for a followup study of personalized search application.

    Analysis and Design of NCRE Register System
    YAO Xu;YAO Shuang-liang
    2011, 1(11):  202-4.  doi:10.3969/j.issn.1006-2475.2011.11.052
    Asbtract ( 648 )  
    Related Articles | Metrics

    This paper introduces a struts framework and processing of NCRE register system in detail. Furthermore, discusses design on both B/S and C/S pattern and connection on the database of MIS(Management Information System). The register on network system is implemented with ASP and SQL server 2000 and achieves good result.

    Design and Implementation of Attendance Management System in Telecommunications Enterprise
    LIU Hua-xi;CHEN Hai;SHI Yong-ge
    2011, 1(11):  206-4.  doi:10.3969/j.issn.1006-2475.2011.11.053
    Asbtract ( 683 )  
    Related Articles | Metrics

    In order to simplify the attendance management of Telecom enterprise and improve the efficiency of department work, on the basis of detailed analysis of the relevant requirements, the article designs and implements the attendance management system of Telecom departments based on.NET platform, including several function modules, such as user management, business application, business audit and so on, and presents its main technical features and module functions.

    Design and Realization of Food Production Enterprises Supervision and Management System Based on Network Technology
    ZHANG Hai-jing
    2011, 1(11):  210-4.  doi:10.3969/j.issn.1006-2475.2011.11.054
    Asbtract ( 581 )  
    Related Articles | Metrics

    Food production enterprises supervision and management system is based on the technologies of network, database and computer information processing. It can sent whole information of food production in everywhere to the food supervision and management center through the government Web or public Web rapidly and conveniently, so that the members of the center can fully control the food production and safety. The system is programmed with objectoriented language and its database is SQL Server. It has been steadily running for a long time and greatly improved the quality of supervision and management, providing effective guidance for food production.

    Research on Integration Technology Between SolidWorks and Small PDM System
    GU Jin-feng;ZHANG Zi-ling
    2011, 1(11):  214-4.  doi:10.3969/j.issn.1006-2475.2011.11.055
    Asbtract ( 756 )  
    Related Articles | Metrics
    In view of the problems existing in the system integration of the current small and mediumsized enterprise CAD system and Product Data Management (PDM), CAD system and PDM system integration mode is studied, 3D CAD software SolidWorks 2010 and the small PDM system developed by author integrated function modules is designed, and packaging mode and interface mode combined with each other to realize the integration of PDM with SolidWorks is put forward, through combining interface mode and tight integration model to realize the combination of SolidWorks to PDM integration. Traversing of product structure tree is finished by calling the SolidWorks API functions, and plugin “CAD/PDM integration” is developed in the software of SolidWorks, integrating all functions of the PDM system; product structure tree is updated in the PDM system, realizing the doubleway of the SolidWorks and PDM system integration, ensuring the integrity and consistency of the data. Finally, the normal operation of the system verifies the integrated function modules design and the realization method.
    Design and Implementation of Enterprise Rules Management System Based on RIA
    CHEN Hui;ZHANG Rong-lian
    2011, 1(11):  218-5.  doi:10.3969/j.issn.1006-2475.2011.11.056
    Asbtract ( 610 )  
    Related Articles | Metrics

    Nowadays most of enterprise regulations and rules lie in the brain of business man, or in rule manual, management procedure and other unstructured documents. Considering present situation, enterprise management system is explored to enable the corresponding response and change the reality when the business and the demand change. This article illustrates in detail the realization way, overall design, system detailed design and functional modules.