Loading...

Table of Content

    13 October 2010, Volume 1 Issue 9
    图像处理
    Rapid Stereo Images Correction Based on GPU
    ZHU Bin;ZHANG Li-yan;WEI Hu
    2010, 1(9):  1-4.  doi:
    Asbtract ( 1457 )  
    Related Articles | Metrics
    As the fast development of GPU(Graphic Processing Unit), special improvement of its architecture, the graphics card is no longer just a graphic processor with Fixed Pipeline, but also a parallel programmed stream processor as Single Instruction Multiple Data. So in the recent years, general purpose computation on the GPU (GPGPU) has been researched popularly and applied in many domains. In this paper, the GPGPU is used for image correction to deal with the low computational efficiency of the image interpolation. The experiments prove the validity of the algorithm.
    Research on Information Extraction Algorithm of Gaussian Noise Images Based on Fractional Order Differentiation
    HOU Ming-liang
    2010, 1(9):  5-8.  doi:
    Asbtract ( 833 )  
    Related Articles | Metrics
    Considering the trait of fractional order differentiation on signal processing, an information extraction algorithm based on fractional-order differentiation is put forward. To start with, by this means information extraction was carried out for Gaussian noise images with various coefficients, and then a comprehensive analysis and comparison is carried on with the other results of information extraction using the classical integral order operator, such as Roberts, Prewitt, Sobel and so on. Experiments demonstrate that the proposed approach can not only extract high-frequency edge information, but also extract texture information of smooth area and to a great extent, enjoys a certain anti-noise performance for the Gaussian noise.
    Calculation of Image Coordination of Centers of Circles Based on Geometric Invariance Under Projective Transformation
    LI Hong-yan
    2010, 1(9):  9-11.  doi:
    Asbtract ( 811 )  
    Related Articles | Metrics
    In the process of cameras calibration, circles, whose images are ellipses, are usually served as earmarks with their centers as feature points. Extracting image coordination of these centers is the key to realize calibration. In this paper, based on the theory of perspective projection transformation, a method is given to solve the image coordinate of the circle center, and a model is also given to validate its stability and precision. Experiments results with real images show that the method has higher accuracy and stability.
    An Improved Algorithm for Image Enhancement Based on Wavelet Threshold
    ZHANG Hua-di
    2010, 1(9):  12-15.  doi:
    Asbtract ( 781 )  
    Related Articles | Metrics
    This article proposes an improved image enhancement algorithm based on the smooth filter with wavelet threshold. In this method, neighborhood average and the wavelet threshold is integrated to achieve smoothing filtering for the image. The experimental result indicates that the method is advantageous to image noising processing, simultaneously the edge information also obtained the good retention, and improves the effect of image enhancement with good visual effect.
    A Method of Face Recognition Based on Orthogonal UDP Feature Extraction
    LIU Fen-xiang;LI Yong-zhi;WU Song-song
    2010, 1(9):  16-20.  doi:
    Asbtract ( 834 )  
    Related Articles | Metrics
    This paper presents a modified unsupervised discriminant projection algorithms called orthogonalized UDP. A general rule for feature extraction is to extract features as uncorrelated as possible. In the paper, an optimal set of uncorrelated discriminant features is presented, and some formula to compute it is given. This paper proves feature equation of these modified UDP algorithms and applies them to face recognition. Through doing experiment on the different face bases, this paper verifies that they can reach better recognition performance comparing with UDP.
    网络与通信
    Cluster-based Passive Fault Diagnosis Algorithm Using Comparison Models in MANET
    ZHAO Jian-qiang;;ZHU Pei-dong;TANG Fei-yue
    2010, 1(9):  21-26.  doi:
    Asbtract ( 1686 )  
    Related Articles | Metrics
    The cluster-based passive fault diagnosis algorithm using comparison models is proposed for the faults of application layer in mobile ad hoc network. The shortcoming of comparison-based fault diagnosis algorithm and cluster-based comparison diagnosis algorithm as existing fault diagnosis algorithm are discussed and analyzed. The passive fault diagnosis algorithm is based on clustering algorithm for mobile ad hoc network. A network is divided into several clusters, and the cluster head is responsible for the cluster node fault diagnosis. After the initial diagnosis of nodes, the diagnosis does not need specialized diagnostic messages. The implementation of the node status of the diagnosis is based on normal communication data packet with a diagnosis field and uses the comparison model. The algorithm without a specialized diagnostic message will not cause message flooding as in traditional comparison-based fault diagnosis, thereby greatly reducing system overhead. The algorithm also overcomes the existing problems that some nodes can not be diagnosed and diagnosis is frequently triggered.
    Analysis and Simulation of Beam-forming for Smart Antenna
    NING Yuan;ZHANG Hui-ying;LIU Yu-feng
    2010, 1(9):  27-29.  doi:
    Asbtract ( 827 )  
    Related Articles | Metrics
    Beam-forming is one of the key techniques in smart antenna. Based on introducing the structure and fundamental principles of smart antenna, beam-forming for smart antenna system is analyzed, and the simulation of antenna patterns is compared.
    Discussion of Network Data Capture Technology Based on Linux
    FANG Liang;YU Jin-ke
    2010, 1(9):  30-33.  doi:
    Asbtract ( 882 )  
    Related Articles | Metrics
    Currently, traditional capture techniques in Linux are normally based on BPF mechanism, with the continuous improvement of network speed, capture efficiency is declining. This paper introduces a PF_RING capture method based on zero-copy theory in high-speed network, which greatly enhances the system performance through reducing the number of copy data from kernel space to user space; What’s more, this paper specifically analyzes how to use it in Linux, at the end, the result of experiment shows that this scheme is feasible.
    Energy-balance Scheme for Cluster-based Wireless Sensor Networks
    LIU Ya;TAN Qian-mao;YANG Yan
    2010, 1(9):  34-37.  doi:
    Asbtract ( 861 )  
    Related Articles | Metrics
    Clustering is one of the most efficient schemes for prolonging wireless sensor networks lifetime. How to decide the number of clusters, which is influenced with the total number of sensors and the characteristics of the disposed area, is the key idea in clustering algorithm. The algorithm EBCO(Energy Balance Cluster Optimize)based the difference of energy consume information between the neighbor cluster, let the cluster whose energy consume is higher drive some nodes out, and these nodes joined the other cluster whose energy consume is lower. The simulation of performance indicates that the proposed algorithm can balance the cluster heads’ energy consumption, and prolong the network’s life time.
    Research on Document Classification Method Based on Graph Model
    MENG Hai-dong;ZHANG Lian;LV Hai-lin
    2010, 1(9):  38-40.  doi:
    Asbtract ( 815 )  
    Related Articles | Metrics
    Document classification method based on graph model is a new method, the method can well express relations between words, it can make up the limitations of vector space mode. This paper introduces the definition of graph model, the calculation of weight, and the method of how to build document graph and classification. Empirical results show the graph modal is feasible.
    An Improved Method of EAP-TLS Fast Reauthentication
    GUO Chao;ZHANG Wei-min;YAO Lei-bo;DONG Hong-zheng
    2010, 1(9):  41-44.  doi:
    Asbtract ( 813 )  
    Related Articles | Metrics
    The original EAP-TLS method of reauthentication caused authentication server load too large. The improved method by modifying the method of the reauthentication start and on the basis of the establishment of initial security authentication simplifying reauthentication process, can effectively reduce the authentication server load, improve the speed of reauthentication without losing security.
    Research and Implementation of Embedded CAN-bus and Ethernet Interconnection
    YE Jia-qing;;LI Jun
    2010, 1(9):  45-47.  doi:
    Asbtract ( 839 )  
    Related Articles | Metrics
    In order to achieve real-time monitoring, this paper details the design of the interconnection method of two kinds of heterogeneous interconnection of CAN-bus and Ethernet network, and a new high-performance embedded CAN-Ethernet gateway which based on NE64 the processor core is designed. The practical application proves that it works stably and reliably and achieves a seamless and efficient CAN-Ethernet interconnection.
    Improvement of Web Text Filtering Strategy
    SHEN Feng-xian;ZHU Qiao-ming;LIU Fen-xiang
    2010, 1(9):  48-52.  doi:
    Asbtract ( 777 )  
    Related Articles | Metrics
    In order to meet needs of the real-time information filtering, experts put forward adaptive information filtering method. But there are still some difficulties in training and adaptive learning. This paper proposes a new method to improve the accuracy of the adaptive filtering model and optimize the filtering threshold. The filtering strategy uses SVM at initial filtering stages and uses the improved adaptive template-based algorithm in latter stages. In order to update profile, it uses the improved coefficient adjustment strategy, and uses the feature attenuation factor. Running on a gateway in the campus, this system has achieved good results.
    Research on Webpage Content’ Similarity Calculation Method Based on Vector Space Model
    HE Zhong-xiu;WANG Shuang;AN Li-cheng
    2010, 1(9):  53-55.  doi:
    Asbtract ( 1418 )  
    Related Articles | Metrics
    Aiming to data mining in great mass of Web pages, this paper puts forward Web page content’ similarity calculation method based on vector space model and software system framework. This system extracts massive Web pages from search engines and distinguishes the URL pages coded in Chinese, then extracts this page out Chinese characters and selects out Chinese notional words, establishes vector space model to calculate the similarity between Web pages’ contents. The system reduces the Web document range, saves a lot of time and space, and lays a good foundation for the classification, search and intellectualization for network information.
    Design of E-commerce Web-site Server Performance Counting System
    GONG Qi-lin;PENG Xue-tao;GONG Qin
    2010, 1(9):  56-58.  doi:
    Asbtract ( 1392 )  
    Related Articles | Metrics
    The site has a lot of performance indicators, including indicators and database server performance indicators. At present, E-commerce is building a new economic order, the competitiveness is bound to reflect the competitive E-commerce sites, E-commerce sites run will have a direct bearing on the survival and development of enterprises. This paper mainly studies the performance indicators, analyzes its performance and testing method, and designs a small server performance counting system.
    Research and Application of DPI Bandwidth Management Technology
    CHEN Xiu-yao
    2010, 1(9):  59-61.  doi:
    Asbtract ( 743 )  
    Related Articles | Metrics
    DPI detection technology is a traffic inspection and control technology based on application layer, it can depth examination of packet flow, and accurately identify the network of business types, and effectively identify P2P applications through the feature library matching. DPI application-aware technology allows network operation is transparent to achieve the network intelligent management, so that network resources are fully utilized.
    Research on VRML and Java 3D Conversion Key Technology
    YUAN Jian-feng
    2010, 1(9):  62-65.  doi:
    Asbtract ( 793 )  
    Related Articles | Metrics
    Transformation from the 3D CAD model or other 3D models described with VRML standard to Java3D by Java language in the virtual network services is studied. Then standard 3D model of Java3D is generated so that the users may browse and finish personalized configuration through browser. The technology can greatly facilitate the rapid development of virtual business in the future. Due to the complexity of the system, only transformation technology is researched and implemented.
    Research and Design of Network Video Conference System
    CAO Jie;MA Xiao-yu;GONG Guang-wu
    2010, 1(9):  66-67.  doi:
    Asbtract ( 823 )  
    Related Articles | Metrics
    Based on learning of DirectShow technology, a system framework of multimedia network conferencing system is proposed based on DirectShow technology. Design of audio and video data collection, coding, network transmission, decoding and playback solutions are applied by VC++ programming, providing a good real-time voice and video communication to remote video conferencing. In the experiment, the result is good, which is worth promoting.
    Research and Application on Caching Mechanism of Hibernate
    AO Xiao-ling;HUANG Jin
    2010, 1(9):  68-72.  doi:
    Asbtract ( 785 )  
    Related Articles | Metrics
    This paper discusses the principle of Hibernate cache mechanism. And the rules of employing Session cache and SessionFactory cache are analyzed in detail. At the same time, some key problems of their application and research are pointed out. An instance of cache is designed. Based on the development experience, an efficient method of using cache to improve system performance is proposed.
    Design and Implementation of Pagination Technology of Web Application
    REN Jun-guo;SUN Zhong-lin;WEI Yong-shan
    2010, 1(9):  73-75.  doi:
    Asbtract ( 1567 )  
    Related Articles | Metrics

    Pagination is one common method to browse and display mass data in Web application and one most familiar event that developers deal with in programming. From analyzing the usual methods of database query pagination and draw lessons from two methods this paper presents a new solution of page displaying. It lightens the burden of server, effectively improves the maintainability of pagination program of the Web resource system and enhances system performance. Combining with practical project developing, it gives the concrete implement method.

    操作系统
    Analysis About Virtual File System of Linux
    ZHONG Bai-song;ZHANG Yu-cheng;ZHOU Ming-jian
    2010, 1(9):  76-78.  doi:
    Asbtract ( 829 )  
    Related Articles | Metrics
    This paper briefly introduces the abstraction layer of Virtual File System (VFS) in the Linux operating system, and then makes a detailed analysis about the four objects in the generic model of VFS, and analyzes the data structure achieved in the Linux kernel. At last, the paper introduces the architecture of the VFS, that the connections among them. Through the analysis, it allows readers to deepen the understanding of the VFS system.
    算法分析与设计
    A New Accuracy Measure for Generalization Rough Sets
    HU Zhen;WU Gen-xiu
    2010, 1(9):  79-81.  doi:
    Asbtract ( 802 )  
    Related Articles | Metrics
    In the rough set theory, accuracy is a significant character to discribe the inaccuracy caused by rough set boundary. The traditional measure of accuracy does not take the granulation into account. By introducing the concept of independent neighbor set, this passage gives the measure of granulation and a new measure of accuracy of generalization rough set.
    A New Voice Transformation Method Based on GMM of Each Dimensions of Characteristic Vector
    ZHAO Yi-zheng
    2010, 1(9):  82-84.  doi:
    Asbtract ( 830 )  
    Related Articles | Metrics
    GMM is one of the most useful algorithms in voice conversion. However with the increase of model ranks and dimensions of characteristic vector, the number of parameters to be estimated increases rapidly, which affects the precision and stability of the parameter estimation. This paper proposes a new method which translates vector transformation into scalar transformation. Experiment results show that this method can improve the converted voice’s quality.
    Implementation of Algorithm Based on n-gram String Segmentation
    LI Wen;HONG Qin;TENG Zhong-jian;SHI Zhao-ying;HU Xiao-dan;LIU Hai-bo
    2010, 1(9):  85-87.  doi:
    Asbtract ( 1419 )  
    Related Articles | Metrics
    Recently, similar strings of fuzzy queries have been involved in research, and many people are working on it actively. The current keyword-based query techniques are mostly prefix match, which could not find results that are similar with the query strings. This paper presents an algorithm of n-gram string segmentation, which is the foundation for fuzzy query. Data sets, as well as the keyword strings are segmented by it, and then the string edit distance is used to achieve similar fuzzy query, which has very important applications in data cleaning and cloning papers.
    Application of Artificial Neural Network Based on Genetic Algorithm to Cooperative Transport of Multi-robots System
    JIN Jian-bin;WANG Yuan-qin;CHEN Yuan
    2010, 1(9):  88-91.  doi:
    Asbtract ( 802 )  
    Related Articles | Metrics
    Artificial neural network can be used as the robot controller, in order to complete the multi-robots cooperation transporting task. In response to the shortages of slow convergence speed and large errors in this method, this paper presents a method optimized by the genetic algorithm. This method makes use of genetic algorithm to optimize the artificial neural networks, and changes the ANN structure and the operational parameters of genetic algorithms to find the optimal network and improve the network convergence speed. Simulation results show the feasibility and effectiveness of the method.
    数据库与数据挖掘
    Test of Uploading Data Function in Image Capture System
    LIU Re
    2010, 1(9):  92-93.  doi:
    Asbtract ( 774 )  
    Related Articles | Metrics
    This paper introduces whole workflow of Image Capture system, and pays attention to detailed the function of uploading data to system with the analysis method of finite state machine for testing.
    Analysis and Improvement of Information Access System in SQL Server Database
    CHEN Lu;YUAN Xue-ping
    2010, 1(9):  94-96.  doi:
    Asbtract ( 789 )  
    Related Articles | Metrics
    Aiming at the problem of vast information redundancy of database auditing system, affecting the data base function gravely. By using existing database programming interfaces, integrate VC and C# programming technology integration for the first time, as well as through real-time tracking, also well resolve the problem of information source single. It has more practical value for database security.
    信息安全
    Research on Statistical Information Security Based on PKI/PMI
    QIAN Yong
    2010, 1(9):  97-99.  doi:
    Asbtract ( 762 )  
    Related Articles | Metrics
    This paper analyzes the significance of construction of on-line statistical information security, and puts forward the design process for it. In the E-government research and analysis of the overall security needs, this paper designs the overall technology architecture model based on PKI/PMI. In the end, this paper discusses the feasibility of the project when used PKI/PMI and other security technologies to construct the statistical information security, as well as the shortcomings of the PKI/PMI technology.
    Research on Spread and Prevention of Mobile Phone Virus
    LIU Guo-chao;TAN Long-dan;LIU Ke-sheng
    2010, 1(9):  100-102.  doi:
    Asbtract ( 852 )  
    Related Articles | Metrics
    With the time of 3G coming and the widespread smart phone, the only problem is when the mobile phone virus break out in great force. This paper introduces the concept and danger of mobile phone virus. At the same time, this paper emphatically analyses the way of spreading and prevention of mobile phone virus.
    Analysis of Safety of Oblivious Transfer Protocol Based on Multiple Instance Learning
    CUI Mao-zheng;YU Wei-wei;LIU Lian;WEI Ya-ling
    2010, 1(9):  103-106.  doi:
    Asbtract ( 1527 )  
    Related Articles | Metrics
    Oblivious transfer protocol should protect both the privacy of the sender and the privacy of the receiver. This paper suggests a model based on Multiple Instance Learning and analyzes the safety of oblivious transfer protocol. This model can help the sender figure out the choices of the receiver after some communications on the assumptions that: 1. The query of the receiver is consecutive; 2. The sender has some previous knowledge about receiver’s interests, which implies that the privacy of the receiver can be intruded and OT protocol is not absolutely safe for the receiver.
    Digital Watermarking Technique Based on Wavelet Transform
    CHEN Hai;LI Ke
    2010, 1(9):  107-110.  doi:
    Asbtract ( 795 )  
    Related Articles | Metrics
    To enhance the watermark more powerful robustness and a better invisibleness, a blind digital watermark algorithm based on wavelet transform is proposed. By multiresolution decomposition technique, the watermark is encrypted by Arnold scratch in order to enhance the security of watermark system. And then comparing HVS, embedded location which were in the higher transforming of DWT are elected, and watermark is embedded by changing transforming coefficients. According to the experiment result, this scheme is invisible and has good robustness for some common image attacking operations.
    Research on Intrusion Detection for Wireless Ad hoc Network Based on AODV
    WANG Zhang-sheng
    2010, 1(9):  111-114.  doi:
    Asbtract ( 794 )  
    Related Articles | Metrics
    Mobile Ad hoc network routing protocols are easily to be destroyed. Previous research in securing these protocols has typically used techniques based on encryption and redundant packets transmission. These techniques prevent a range of attacks against routing protocols but are expensive to deploy on energy-constrained wireless devices. This paper discusses some of the threats to wireless Ad hoc networks, specifically, the attacks against the AODV routing protocol. In the end, it presents a tool based on the State Transition Analysis Technique, aimed at real-time detection of these attacks, and the details of the tool detecting various attacks.
    计算机辅助教学
    Building of Virtual Experimental Environment and Experiment Design in Linux
    QIAO Jing;QU Zhi-qiang;LI Qun
    2010, 1(9):  115-117.  doi:
    Asbtract ( 842 )  
    Related Articles | Metrics
    The virtual machine technology can fictionalize several independent logical environments within one physical environment, based on the characteristic of which, the paper builds a virtual comprehensive experimental environment for Linux with the virtual machine software VMware Workstation, and also designs some experiment items which can be developed in it, which is convenient for the development of Linux experimental teaching and the study of Linux amateurs.
    Design of Student Development Assessment System Based on Network Environment
    YANG Mei-xia
    2010, 1(9):  118-121.  doi:
    Asbtract ( 796 )  
    Related Articles | Metrics
    The summative assessment methods for students currently existing deficiencies, the paper proposes a Web-based, dynamic, developmental evaluation system, and gives the design idea, the use of evaluation tools, architecture and specific of functional design, the system is a concern about the sustainability of the development process student evaluation system, the comprehensive evaluation of the effectiveness of play is conducive to student progress and healthy growth.
    Implementation and Application of Hyperlinks in VB Programming
    LIU De-ling;ZHU Ke-wu
    2010, 1(9):  122-124.  doi:
    Asbtract ( 819 )  
    Related Articles | Metrics
    This paper analyzes the properties of hyperlink objects in Word and PowerPoint and their roles in hyperlinks, and analyzes the main operations of hyperlinks, and implements the main functions of hyperlinks by using the VB programming language. By analyzing and discussing hyperlinks, the paper provides reference and effective support for the implementation and the application of the marking and correcting paper system.
    Research on OS’ Problems Visualization and Teaching Application
    YUAN Yong-feng;HOU Yan
    2010, 1(9):  125-127.  doi:
    Asbtract ( 788 )  
    Related Articles | Metrics
    This article focuses on how to make use of MFC technology to simulate the classic OS algorithms and core technology, in order to achieve a vivid and smoothly object which is to support teaching and which makes it easier for students to deepen understanding of the knowledge received. This article will be divided into various modules to detail the imitation and visualization issues of the OS classic topics.
    Design and Implementation of Upload Management System Based on ASP.NET
    XU Wei-ke
    2010, 1(9):  128-131.  doi:
    Asbtract ( 829 )  
    Related Articles | Metrics
    This paper analyzes the way to work with FTP upload management shortcomings, and introduces a new operating upload management system design and implementation of new systems using ASP.NET framework, the background database using SQL Server 2005, the system has many features to manage the students meet the general needs of essays.
    应用与开发
    Research on Decision Support Systems of Hospital Health Insurance Based on Business Intelligence
    LIN Ji-nan
    2010, 1(9):  132-134.  doi:
    Asbtract ( 804 )  
    Related Articles | Metrics
    To provide intelligent support for scientific management and decision-making of hospital health insurance with business intelligence technology. To obtain valid data with extracting, transformation and loading, analysis report, statistical report and various graphics are established by use of various methods such as multi dimension model, data analysis and data mining etc. To establish decision support system architecture of hospital health insurance operation and data warehouse model, the total medical expenses、ratio of drug expenses、ratio of own expenses for insurance patients are analyzed on multi-dimension and multi-angle conditions. Intelligent System provides support of scientific management and decision-making, which can control over-treatment and insurance spending.
    A Private Automatic Exchange Hardware Design Based on Intelligent Community
    RAO Xuan;FU Chong-fang
    2010, 1(9):  135-137.  doi:
    Asbtract ( 766 )  
    Related Articles | Metrics
    With the development of community scale, there is a gap between the management level and the habitants. By developing intelligent community, the gap can be reduced. This paper introduces a private automatic exchange hardware design based on MT8980. The system is feasible by testing. It is useful and should be adopted widely.
    Design of Automatic Audit System of Medical Expenses Based on LAM/MPI Parallel Computing
    ZHANG Min
    2010, 1(9):  138-139.  doi:
    Asbtract ( 824 )  
    Related Articles | Metrics
    In this paper, based on LAM / MPI parallel computing technology to the medical expenses of the audit automated system design can reduce the workload of manual review and improve management efficiency. This system design based on LAM / MPI cluster with Oracle OCI can calculate the drug review, eliminate illegal drugs.
    Fast License Plate Character Recognition Based on AdaBoost
    HUANG Cheng-qing;GAO Jing-yang
    2010, 1(9):  140-143.  doi:
    Asbtract ( 781 )  
    Related Articles | Metrics
    Using dynamic adaptive weight trimming AdaBoost can train neural network ensemble faster, while searching the optimal cutting coefficient. It can reduce the training time and component network of the neural network ensemble system. Experiments show that the method can quickly build a neural ensemble classifier and achieve a good recognition effect.
    Design and Implementation of a Kind of Information Release Model Based on MIS System
    WU De-jun;WU Guang-cheng
    2010, 1(9):  144-146.  doi:
    Asbtract ( 802 )  
    Related Articles | Metrics
    With the development of informatization of enterprise, the internal information management system has been widely used. Embeding information in internal information system of enterprise to improve the efficiency of communication becomes very necessary. This paper explores the selection of components, model building, data access, etc., and proposes to build a model of information release for enterprise by Microsoft Visual Studio 2005 + Microsoft Access 2003.
    Exploration of Flight Plan Pre-Processing Method
    LIN Li-hui;FENG Shao-rong
    2010, 1(9):  147-151.  doi:
    Asbtract ( 961 )  
    Related Articles | Metrics
    The current AFTN telegrams’ lacking standardization for format, contents and data, resulted in low telegram discrimination of Flight Data Process System (FDP System), and stresses the ATC operators. The paper aimes the Flight Plan Telegram to pre-processing, for repeat FPL, directing to querying history data, and new FPL, judging its standardization according to FPL telegram standard, modifying its wrong messages, then storing the result telegram, as reference for the next FPL processing. After being pre-processed, up to 75% of wrong FPLs unknown by FDP system come to be recognized by FDP system again, FPL telegram discrimination of FDP system is improved significantly.
    Design of Quality Management System for Electric Meter Reading
    ZHANG Jun-min
    2010, 1(9):  152-154.  doi:
    Asbtract ( 789 )  
    Related Articles | Metrics
    Meter reading data as the only source of electricity is an important part of electric marketing. This paper describes the design of a quality management system for electric meter reading, including system status and construction goals, the design of quality management subsystem for electric meter reading and the design of arrears stop-sending electricity subsystem.
    Application of Adaptive Genetic Algorithm in Flow-shop Optimal Scheduling
    HUANG Wei-ting
    2010, 1(9):  155-157.  doi:
    Asbtract ( 806 )  
    Related Articles | Metrics
    For the problem of flow-shop optimal scheduling, an adaptive genetic algorithm is designed. It can automatically adjust crossover probability and mutation probability according to individual characteristics, and its effectiveness is verified by two classic examples. Simulation results show that this algorithm has good global searching ability and convergence speed, so it has certain engineering value.
    Application of Open-source IVR System
    CAO Jing
    2010, 1(9):  158-160.  doi:
    Asbtract ( 782 )  
    Related Articles | Metrics
    To enhance the agility in the process of IVR system development, and to solve the problem of long development-period, high-cost, this paper introduces an open-source IVR system running on Linux, ——Bayonne, and its applications in the inventory management system. The system has ample development interface, and it can support multiple scripting languages, and it can greatly improve the swift and stability of the development process.
    Meteorological SMS Disaster Reporting System Based on GSM
    CHENG Yan-fang;JIA Su-zhen;LI Ge
    2010, 1(9):  161-163.  doi:
    Asbtract ( 737 )  
    Related Articles | Metrics
    The paper introduces the design and implementation of the meteorological SMS disaster reporting system. According to the actual needs of setting up the meteorological volunteers, the system is developed. It is used to receive the disaster short messages, analyzes the short messages, saves the disaster information to the database, and sends the information to people who are responsible for verifying the disaster information. The system can also be used to manage and assess the volunteers’ work.
    Design and Implementation of Railway Bureau’s Mapping Method of Railway E-map and Train’s Positioning System
    HUANG Yan-qiong;LI Zhen-shan
    2010, 1(9):  164-167.  doi:
    Asbtract ( 810 )  
    Related Articles | Metrics
    Geographic Information System (GIS) is a means of enhancing competitive power of railway industry and meet the challenge of the times. This article introduces GIS and Global Positioning System (GPS) that is used to form an online railway-tracking map and pinpoint and monitor a train’s exact location, it will realize data collection, data analysis, data backuped in database, type dot and form map, pinpoint and monitor a train’s exact location in the map.
    Research and Implementation of Mixed-Language Programming Based on Qt and MATLAB
    WEI Xin;CHEN Hui-qiang;GAO Fei
    2010, 1(9):  168-170.  doi:
    Asbtract ( 920 )  
    Related Articles | Metrics
    In order to fully play the advantages of Qt and MATLAB, two mixed-language programming technology based on the two languages are proposed, and the method of using DLL to call MATLAB functions in Qt applications is discussed in detail.
    Reform of High-rack Storage with Manipulator
    CHENG Ji-gang;WANG Xiao-nian;ZHU Jin
    2010, 1(9):  171-174.  doi:
    Asbtract ( 864 )  
    Related Articles | Metrics
    For overcoming the shortcomings including redundant structure, outdated equipment and lacking maintenance of the high-rack storage, a reform project is proposed trying to utilize the old equipments. First, a new updated structure is shown in this paper. Second, based on the analysis of the stacker’s function and with the help of the conception of software engineering, a modular approach is used to design this program so that the productivity can be greatly increased. Thirdly, this paper analyzes the modulization’s disadvantage and the remedies are followed. In addition, a velocity-control scheme is proposed based on the frequency converter with DRIVECOM interface. After practical running, the HMI with wincc is friendly and PLC program is reliable.
    Application Research on Information Resource Sharing Technology Based on JSON Format
    YUAN Dong-liang;SUN Zhong-lin;TIAN Gang;ZHAO Fang-fang
    2010, 1(9):  175-178.  doi:
    Asbtract ( 775 )  
    Related Articles | Metrics
    JSON is a lightweight data interchange format. From analyzing the current situation of the domestic government information resource construction, the paper points out that there is still much heterogeneous, redundant e-government information which shares little between each other. According to China standard of E-Government metadata, the paper puts forward a method of E-Government metadata description method based on JSON format to manage the government information resource, and gives an instance of E-government resource management by using JSON format which manages the heterogeneous E-government information resource more efficiently.
    Simulation of Inspiratory Strategy of Pressure Controlled Ventilation
    HE Shao-heng;CHENG Xi-yun
    2010, 1(9):  179-181.  doi:
    Asbtract ( 803 )  
    Related Articles | Metrics
    As a basic mode of ventilator, one problem of pressure controlled ventilation is how to keep smooth platform of breath pressure. This paper introduces the models of ventilator and lung, then studies the strategy of pressure controlled ventilation for different patients to solve this problem. The simulation results show that there is a certain link between the inspiratory strategy of pressure controlled ventilation and the lung time constants of patients. The smooth platform of breath pressure can be kept through choose the appropriate control parameters. This work can give good advices to the selection of ventilator control parameters and the further study of ventilator control.
    Research and Application of Collection Analysis System for Football Techs and Tactics
    YUAN Min
    2010, 1(9):  182-185.  doi:
    Asbtract ( 1423 )  
    Related Articles | Metrics
    According to the status of the computer-aided application is very few in the football program, this paper designs and implements an applied support system to complete the football information collection and analysis. In the process of achieving the system, collection scheme and data storage model are decided analytically to determine the main mind of the whole system and the feasibility. Ultimately system is successfully completed, and in practical applications gets a good feedback. This system helps football project get rid of the original manual methods of data collection and analysis, and makes the efficiency, correctness and completeness of the football techs and tactics information greatly improved.
    Numerical Simulation of External Dynamic Process of Launch Tube of Pulsed Anti-riot Water-cannon
    ZHOU Bo;ZHAN Ren-jun
    2010, 1(9):  186-190.  doi:
    Asbtract ( 805 )  
    Related Articles | Metrics
    In order to study the external dynamic process of launch tube of Pulsed Anti-riot Water-cannon (PAW), numerical simulation based on Open FOAM is applied by using the method of Large Eddy Simulation (LES) coupled with Volume of Fraction (VOF). Launch process, pressure distribution, velocity distribution within 1.5m from the outlet of the cylindrical nozzle are investigated. Data of flow field which not easy to get in other methods are acquired by using SAMPLE software. Simulation result shows that the profile of water pillar likes a mushroom at the beginning of launch, and then likes a hemisphere, then turns to a camber finally in the influence of high pressure gas in the core of hemisphere. The effective distance of pressure is no more than 300mm, and quickly decreases to 0.4MPa, second ejection phenomenon also appear within this distance because of the second suddenly emission. Velocity increases sharply and decreases rapidly. The cylindrical nozzle is not conductive to the increase of range because of the large decrease of pressure and velocity. Other kinds of nozzle seem to be a good choice.