Loading...

Table of Content

    10 May 2010, Volume 1 Issue 5
    人工智能
    Curvature-based Bas-relief Compression from 3D Model
    XU Xiao-yan;LIU Sheng-lan;LI Bo;ZHANG Li-yan
    2010, 1(5):  1-4,18.  doi:10.3969/j.issn.1006-2475.2010.05.001
    Asbtract ( 1124 )  
    Related Articles | Metrics
    Automatic generation of digital bas-relief which is based on topological and geometric information is a new field. According to characteristics of relief artistic, an algorithm of relief generation from a 3D model is proposed. The problem can be considered as depth compression of 3D model depended on geometry information in a projection direction. The elevated height of generated bas-relief can be controlled by users. Experiments show that the proposed algorithm maintains the consistency of the topology. Meanwhile, original feature of the object is largely preserved. The algorithm can generate vivid relief art from the various existing 3D object, which would broaden application prospects.
    Design of Customers Churn Prediction Model Based on Multi-classifier Class-combiner
    GUO Jun-fang;ZHOU Sheng-bao
    2010, 1(5):  5-7,11.  doi:10.3969/j.issn.1006-2475.2010.05.002
    Asbtract ( 1057 )  
    Related Articles | Metrics
    In order to well resolve the highly skewed class distribution between churns and no-churns, the customers churn prediction model is realized according to the CRISP-DM (Cross-industry Standard Process for Data Mining) framework. The multi-classifier class-combiner approach is adopted. The model could not result in a 'null' prediction system that simply predicts all instances as non-churners. Compared with a single classifier, the accuracy and generalization of the model are improved.
    Several Problems of Smooth Support Vector Classifiers Based on 2nd-order Polynomial
    CHEN Yong;LIU Qun-feng;MAO Huan-zhang
    2010, 1(5):  8-11.  doi:10.3969/j.issn.1006-2475.2010.05.003
    Asbtract ( 1009 )  
    Related Articles | Metrics
    Yuan et al use a 2nd-order polynomial as a smoothing function, and propose a smooth support vector machine based on 2nd-order polynomial. As a new smooth model, there are four problems: Can other 2nd-order polynomials be used as smoothing functions to obtain other smooth support vector machines? How many are there in this class of smooth model? Do these smooth models converge? Is the performance of classification improved? This paper addresses these problems by studying 2nd-order polynomials as smoothing functions and the resultant 2nd-order polynomial smooth support vector machines. Finally, it solves the above four problems.
    Design and Realization of Network Data Mining System Based on Flex and Spring Architecture
    ZHU Xiao-ying
    2010, 1(5):  12-15.  doi:10.3969/j.issn.1006-2475.2010.05.004
    Asbtract ( 1031 )  
    Related Articles | Metrics
    This paper brings forward a program of network data mining system based on Flex and Spring architecture. Through the browser, users can invoke a variety of data mining algorithm to process the specified data and eventually achieve the dynamic demonstration effect. In this way, the data mining system can be employed on different platforms, algorithm can be transplanted, and users can enjoy more effective mutual communication and responsiveness.
    Achieving Parameter of DBSCAN Based on Datagrid
    PANG Yang;XU Qiao-feng
    2010, 1(5):  16-18.  doi:10.3969/j.issn.1006-2475.2010.05.005
    Asbtract ( 1075 )  
    Related Articles | Metrics
    The algorithm GDBSCAN only needs two parameters. It can discover clusters of any shape. But it is very sensitive to the parameter Eps. This paper puts forward a kind of method to make sure the Eps, which is based on datagrid. The method can achieve better result on the case of data distributing unevenly and shapes of clusters reaching each other.
    Hybrid Particle Swarm Optimization Algorithm Based on Differential and Simulated Annealing
    CHU Guo-juan;MA Chun-li;NING Bi-feng
    2010, 1(5):  19-20,2.  doi:10.3969/j.issn.1006-2475.2010.05.006
    Asbtract ( 1036 )  
    Related Articles | Metrics
    Particle swarm optimization is a new evolutionary computation method of the group and is widely used in a few projects. Because the convergence speed is slow and easy to fall into local minimum, the paper proposes a hybrid particle swarm optimization algorithm based on differential and simulated annealing. Through analysis and combining of their respective advantages of the three kinds of evolutionary algorithm, an improved particle swarm optimization is obtained.
    Fault Diagnosis of Power Vehicle with RBF Fuzzy Neural Network
    LU Bing-yan;CHEN You-long;ZHANG Zong-yi
    2010, 1(5):  21-23.  doi:10.3969/j.issn.1006-2475.2010.05.007
    Asbtract ( 1079 )  
    Related Articles | Metrics
    Combined with the fuzzy theory and the RBF neural network, this paper constructs the fault diagnostic method of fuzzy RBF network. In the process of the power vehicle fault diagnosis, through comparing the RBF neural network with the fuzzy RBF network, the result indicates that the fuzzy RBF network has the characteristics of higher precision and faster convergence speed etc.
    Efficient Recent-biased Clustering Algorithm of Data Stream Based on Tilted-time Window
    LIAO Jian-ping;MA Wen-long
    2010, 1(5):  24-29.  doi:10.3969/j.issn.1006-2475.2010.05.008
    Asbtract ( 987 )  
    Related Articles | Metrics
    A recent-biased clustering algorithm of data stream based on tilted-time window is proposed. First, the algorithm segments sliding window equal in length to form no overlap data blocks(basic window), then extracts feature of every data block through Haar wavelet transform, and preserves detailed feature of recent data by varying number of wavelet coefficients of data block, namely more recent data block, more wavelet coefficient preserved, and vice versa. Finally, by defining recent-biased distance of data stream, the recent-biased clustering algorithm of data stream based on tilted-time window is implemented. Remarkably faster computational speed and higher efficiency are achieved by this algorithm. Experiments on real validate the proposed algorithm.
    An Incremental Learning Model of Weighted Naive Bayesian Classification
    LI Jin-hua;LIANG Yong-quan;LÜFang-fang
    2010, 1(5):  30-32.  doi:10.3969/j.issn.1006-2475.2010.05.009
    Asbtract ( 1133 )  
    Related Articles | Metrics
    Naive Bayesian classifiers have difficult problems involving getting labeled training datasets, and cost a lot of time to learn all samples again when new sample adds. Motivated by this fact, the paper presents an incremental learning method, and proposes a weighted naive Bayesian classification algorithm. All of them improve the performance of naive Bayesian classifiers at the expense of attribute weights, the attribute weighted parameters are directly induced from training dataset. Experimentally testing the algorithm using the UCI datasets recommended by Weka, the results show that the algorithm is feasible and effective.
    A New Hybrid Algorithm to Solve Euclidean Plane TSP
    WANG Xing-qi;XUE Xiao-chun
    2010, 1(5):  33-35,3.  doi:10.3969/j.issn.1006-2475.2010.05.010
    Asbtract ( 950 )  
    Related Articles | Metrics
    Traveling salesman problem(TSP) is a classic combinatorial optimization problem. This paper uses an insertion method which is based on convex polygon to form loop, then applies the adjustment algorithm to shorten the loop. At last the paper uses the crossover operator which is from the genetic algorithm to optimize the loop. The result of calculation shows that the method has high precision and good practicability.
    软件工程
    Using Dynamic Memory Principles for Optimizing Warehouse Management
    LI Tang-hui;HE Yong-chun
    2010, 1(5):  36-39.  doi:10.3969/j.issn.1006-2475.2010.05.011
    Asbtract ( 1030 )  
    Related Articles | Metrics
    Based on the DMM (dynamic memory management) principle, this paper puts forward a strategy for dynamic allocation and recycling of the management of warehouse in WMS, an optimization and an enhancement of efficiency for warehouse management. A theoretic guarantee is supplied for an effective application of the limited warehouse.
    Application and Practice of Defect Management System Based on PI3000
    XIA Hui;BIAN Wei-min;KONG Zhen
    2010, 1(5):  40-43,4.  doi:10.3969/j.issn.1006-2475.2010.05.012
    Asbtract ( 983 )  
    Related Articles | Metrics
    Software defect management is an important method of improvement on software quality and development efficiency. After comparing currect popular defect management tools, this paper designs a defect management system based on CMMI and PI3000. This system has structure of B/S, implements the process of defect tracking, controls the status changing, has such functions as query, statistical analysis and so on. This system aggregates excellencies of many other tools. The results of application show that this system can improve software quality and development efficiency.
    Construction of Distributed Spatial Data Warehouse and Implementation of OLAP Service
    TANG Ping;
    2010, 1(5):  44-46.  doi:10.3969/j.issn.1006-2475.2010.05.013
    Asbtract ( 1773 )  
    Related Articles | Metrics
    This paper introduces a method of designing a spatial data warehouse based on the technologies of distributed databases, network communication and geographic information system. With the dataset of protected sites in the costal areas of Fujian Province, a distributed spatial data warehouse is built. It arranges data with different dimensions and layers based on administrative and types division as well as regular information of the sites. With an instance of this data warehouse, it successfully creates data cube dynamically according to different OLAP service requests, then accomplishes the OLAP services and returns spatial OLAP results to users.
    Research on DataGrid Control Paging Technique Based on Stored Procedure
    SHANG Hui-hua;DAI Hui-chuan;ZHU Tian-xiang
    2010, 1(5):  47-49,5.  doi:10.3969/j.issn.1006-2475.2010.05.014
    Asbtract ( 1845 )  
    Related Articles | Metrics
    To meet the massive data development in the database, data paging techniques are studied in the Web application process. Combining DataGrid control features in VS.NET, DataGrid control custom paging technology based on stored procedure is given, and the technology mechanism process is analyzed. Custom paging technology based on stored procedure is an effective means for improving the performance of Web data access. Its application in business charging system shows that the performance and response speed compared to traditional paging technology have greatly improved.
    图像处理
    Study of Image Magnification Method Based on LS-SVR Filter
    GUAN Yan;YU Zhong-dang
    2010, 1(5):  50-52.  doi:10.3969/j.issn.1006-2475.2010.05.015
    Asbtract ( 974 )  
    Related Articles | Metrics
    The paper is presented based on the deficiency of traditional interpolation. First, the theory of LS-SVR and linearity smoothness filtration are introduced, then LS-SVR filtration operator is constructed. To improve the arithmetic operation speed and simplify the arithmetic process complexity, it constructs the LS-SVR convolution mask based on the filtering strategy and LS-SVR characteristic, training process of LS-SVR is turned into simple weighted summation operation.
    Collision Detection for 3D Bones-based Characters
    HAN Yi-chen;YANG Ke-jian
    2010, 1(5):  53-55,5.  doi:10.3969/j.issn.1006-2475.2010.05.016
    Asbtract ( 1053 )  
    Related Articles | Metrics
    This paper implements fast collision detection for 3D bonesbased characters. Based on OBB (oriented bounding box), this algorithm constructs an OBB for each bone model and computes intersect tests of the OBB with separation axis theory. This method can be applied effectively to collision detection in 3D game engine.
    Remote Image Monitoring System Based on Two GPRS Modules
    BAI Wen-jiang;GUAN Hong-yun;ZHANG Ying;LIU Wei-lin
    2010, 1(5):  56-59.  doi:10.3969/j.issn.1006-2475.2010.05.017
    Asbtract ( 1029 )  
    Related Articles | Metrics
    Because of the limitation of GPRS transmission channel, the image articulation and the frame frequency are quite low. In order to provide the clearer pictures, this article designs a kind of remote image monitoring system based on two GPRS modules. The system uses the Kalman filter and the relative background difference method to analyze and process images. The image is divided into two parts, the background and moving object. Then it transmits two parts through two GPRS modules. In the monitoring center the remote image monitoring system combines images from two parts. This approach can improve the image articulation and the effectiveness of monitoring in the monitoring center.
    Research on Multi-focus Image Fusion Based on PCA and High-pass Filtering
    XIANG Chang-cheng
    2010, 1(5):  60-62,6.  doi:10.3969/j.issn.1006-2475.2010.05.018
    Asbtract ( 964 )  
    Related Articles | Metrics
    For most image fusion algorithms split relationship among pixels and treat them more or less independently, this paper proposes a multi-focus image fusion scheme using regional detection through PCA and high-pass filtering. The basic idea is to divide the source images into blocks, and then select the corresponding clear blocks, which is distinguished by high-pass filtering and PCA algorithm, to construct the resultant fused image. Experimental results show that the proposed scheme is more effective than the PCA and the wavelet scheme.
    Moving Object Recognition Method and Simulation Study
    ZHU Can-shi;AN Li
    2010, 1(5):  63-65.  doi:10.3969/j.issn.1006-2475.2010.05.019
    Asbtract ( 963 )  
    Related Articles | Metrics
    The moving target recognition and tracking in the military and industry has a broad application prospects. The typical tracking methods are correlation matching algorithm, optical flow algorithm, motion-based contour algorithm, and so on. The typical identification methods include: template matching target recognition method, similarity measure based identification method, genetic algorithm based target recognition algorithm, and so on. This paper presents a neural network based identification and tracking method, and studies the identification and tracking of moving target simulation model and the realization method.
    Application of High-boost Filtering in Low Contrast Target Correlation Detection
    ZHAO Xin-sheng;ZHANG Yu
    2010, 1(5):  66-68.  doi:10.3969/j.issn.1006-2475.2010.05.020
    Asbtract ( 940 )  
    Related Articles | Metrics
    Opto-electronic hybrid converter can be combined to achieve the target of real-time detection, identification and automatic location, but the low-contrast targets related peak intensity is very weak, or even no correlation peak, affecting the target recognition rate. Filtering to enhance the use of high-boost filtering and image segmentation of the power spectrum for the enhanced process, it can effectively improve the power spectrum of contrast, the maximum spectral images to retain the details of information to enhance co-related systems photoelectric target recognition rate.
    Image Compression Based on Contourlet Transform
    TU Jun
    2010, 1(5):  69-71.  doi:10.3969/j.issn.1006-2475.2010.05.021
    Asbtract ( 1024 )  
    Related Articles | Metrics
    Combining non-separable and directional filters banks, the Contourlet transform can effectively capture more edges and contours in natural images than wavelets due to its capability of representing directional information. In view of JPEG2000 compression standard, which uses the wavelet transform and dead-zone uniform quantizer, the paper proposes a new coding scheme based on Contourlet transform and optimal quantizer. Similarly, this article is applied to the dead-zone quantization in the optimal quantizer.
    Design and Realization of Video Surveillance System Based on Struts
    SHANG Wei;NIU Li;BAI Wen-jiang
    2010, 1(5):  72-75.  doi:10.3969/j.issn.1006-2475.2010.05.022
    Asbtract ( 1042 )  
    Related Articles | Metrics
    The system is focused on the demand of customers. It must meet the different demands of different groups. This paper takes garment factories as an example to analyze several different uses of the video surveillance system, builds the modeling in the database to restrict the permissions. The JMF technology is used to process the video to obtain videos corresponding to the needs. The Struts framework is used to validate the users and their permissions according to the permission information in the database, then realize the webpage redirect. Finally the surveillance system meets the needs of multiple user-level.
    Shadow Detection Techniques in Intelligent Transportation System
    FANG Zheng-hua;ZHAO Jing;YANG Xin-yan
    2010, 1(5):  76-78,8.  doi:10.3969/j.issn.1006-2475.2010.05.023
    Asbtract ( 1005 )  
    Related Articles | Metrics
    The shadow detection technology is the key technology in the intelligent traffic system. Two main traditional approaches for shadow detection are introduced, which are the one based on the color characteristic of shadow and the other one based on the three dimensional modeling. Plus, another method is one that brings the above two methods together. The experiment results show that the new one can improve the efficiency of the shadow detection greatly.
    信息系统
    Construction and Application of Grid Resource Management System Based on Gold in Meteorological Center
    LÜShuang;MA Yu-yong;LIU Yi-qian;MA Yan-jun
    2010, 1(5):  79-82.  doi:10.3969/j.issn.1006-2475.2010.05.024
    Asbtract ( 1018 )  
    Related Articles | Metrics
    This paper describes grid computing platform of Chengdu regional meteorological center. In order to ensure rational resource allocation and load balancing on grid nodes, the grid resource management system based on Gold is constructed. This system is applied in grid computing platform of Chengdu regional meteorological center. Several typical application examples show that the system has greatly enhanced grid platform resource management efficiency.
    Research on Key Technologies of Three-dimensional GIS in Electric Power Information System
    WEI Zu-kuan;JIANG Nan;KIM Jae-hong
    2010, 1(5):  83-88.  doi:10.3969/j.issn.1006-2475.2010.05.025
    Asbtract ( 1068 )  
    Related Articles | Metrics
    With the development of GIS technology and the continuous improvement of electric power information systems management needs, for the limitations of existing two-dimensional GIS in electric power information system applications, the paper explores the application of three-dimensional GIS in electric power information system, focuses on data organization and space index, multi-source data integration and management, mass three-dimensional data processing technology, component technology, integration development of GIS and MIS, and other key technologies. Finally, by analyzing the application example of the transmission line integrated information management system of satellite-based three-dimensional images, combining the electric power information systems with three-dimensional GIS, and at the same time, integrating the geographic data and attribute data involved in electric power information system, the visualization and automation of electric power information systems can be realized.
    Management Information System for Overseas Chinese Affairs: An Application of Struts Technology
    NIU Wan-cheng
    2010, 1(5):  89-91,9.  doi:10.3969/j.issn.1006-2475.2010.05.026
    Asbtract ( 1002 )  
    Related Articles | Metrics
    As an important part of object-oriented technology, MVC is now widely accepted by computer experts to analyze and design information system. MVC is used to analyze and design MIS, and Struts technology is employed to solve concrete problems in the course of system development.
    Research and Development of Capturing Real-time GPS Data Based on VB
    ZHANG Ling-yong;GAO Song;ZHONG Lei
    2010, 1(5):  92-95.  doi:10.3969/j.issn.1006-2475.2010.05.027
    Asbtract ( 1653 )  
    Related Articles | Metrics
    A kind of feasible arithmetic is introduced to develop serial procedures for parsing and capturing GPS data information from GPS receiver based on Visual Basic language. Available GPS sentences and field values are pick-up and analyzed. And dynamic or static single-point (non-differential) GPS module positioning data information is captured. Thereinto, the $GPGGA sentence and $GPRMC sentence are analyzed in detail, and the fields values of these two statements are parsed to show the GPS location information. The GPS information, which includes latitude and longitude coordinates based on WGS-84, altitude, speed, time, direction of movement and so on, is displayed on the window interface. Tests show that the system is running with stable, simple, accurate and high real-time.
    Research and Design of Integrated Insurance System Based on J2EE
    JING Dong-sheng
    2010, 1(5):  96-98,1.  doi:10.3969/j.issn.1006-2475.2010.05.028
    Asbtract ( 1770 )  
    Related Articles | Metrics
    Under the electric power corporation insurance business traditional pattern, each of insurance business all has the independent information system, between the systems the information circulation is impeded, the data reproduction input situation is common, the efficiency is not high. This article describes one kind of lightweight framework combining Struts+Spring+Hibernate in the J2EE platform, and combined with the framework, introduces the design and implementation of Jiangsu electric power company insurance system. It focuses on software technology architecture, functional model design, the data model design, information security mechanism and system test specifications. The goal is through the lightweight frame development superiority, enhancing the reusability of software code, reducing the order of complexity of project development, and providing the model for the construction of enterprise-class integrated insurance system.
    Research on Web System Based on Lightweight Framework
    ZHANG Sai-nan;LEI Xiao-yu;JIANG Jin-yao;ZHANG Ting-ting
    2010, 1(5):  99-101.  doi:10.3969/j.issn.1006-2475.2010.05.029
    Asbtract ( 978 )  
    Related Articles | Metrics
    This paper introduces three open source frameworks Struts, Spring and Hibernate, which are widely applied in J2EE platform, and analyzes their technical characters, and provides the three frameworks integration program in which Struts is used to realize view and controller layers, Spring is used to construct business logic layer, and Hibernate technology is used to realize persistence layer to complete the interaction between the database layer and the business layer. Finally, this paper shows the system architecture diagram of most small and medium Web application system using the three frameworks integration.
    网络与通信
    Embedded Design of Web Server for MES Acquisition Terminal
    DENG Yao-hua;WU Li-ming
    2010, 1(5):  102-105,.  doi:10.3969/j.issn.1006-2475.2010.05.030
    Asbtract ( 1049 )  
    Related Articles | Metrics
    A new Web communication server for manufacture execution system based on embedded system is designed, ARM9 platform is used as hardware controller, and the software platform is Linux & BOA server. After introducing principle of BOA which works in Web server, it gives the process of parameter configuration, then the method about parameters exchange and communication between external application and Web server is studied, finally it performs simulation testing for the Web server. Experiment result shows that BOA works well in Web server, the precise of data and communication speed all reach practical requirement. This Web server has actual application value.
    An Adaptive Routing Scheme for Vehicular Ad Hoc Networks in City Environments
    ZHU Er-hua
    2010, 1(5):  106-110.  doi:10.3969/j.issn.1006-2475.2010.05.031
    Asbtract ( 1027 )  
    Related Articles | Metrics
    Routing of data in a vehicular ad hoc network is a challenging task due to the high dynamics of such a network, which can cause failure or inefficiency in traditional ad hoc routing protocols. This paper proposes an advanced adaptive routing (AAR) protocol that addresses these problems by adaptively selecting an optimal route based on real-time traffic flow. And the AAR can accurately predict vehicles position based on their directions and speeds. The simulation results show that the AAR protocol outperforms existing VANET routing protocols.
    A NoC Routing Algorithm for Irregular 2D Mesh
    XU Xin;WANG Chang-shan
    2010, 1(5):  111-114.  doi:10.3969/j.issn.1006-2475.2010.05.032
    Asbtract ( 214 )  
    Related Articles | Metrics
    Topological structure is an important part for the design of network on chip systems. At some practical application, NoC systems often integrate a number of heterogeneous components which have varied functions, sizes and communication requirements. Instead of regular topological networks which are not suitable for this sort of NoC systems, irregular Mesh network is proposed and applied in NoC systems with irregular structure. So this paper introduces a deadlock-free routing algorithm for irregular Mesh. Compared with other routing algorithm, this routing algorithm has few virtual channels and excellent path selection.
    Research on Routing Algorithm of Network on Chip Guaranteeing QoS
    NING Huan;WANG Chang-shan
    2010, 1(5):  115-118,.  doi:10.3969/j.issn.1006-2475.2010.05.033
    Asbtract ( 1005 )  
    Related Articles | Metrics
    Routing algorithm occupies an important place in the QoS of NoC. This paper analyzes DyAD algorithm which may select a non-shortest route to make the hops increasing, to prolong the delay and to make the performance of the QoS decreasing rapidly. So the paper presents an improved algorithm based on DyAD. It can ensure as far as possible to choose the shortest path routing to guarantee service performances. Simulation results show that the improved algorithm can effectively reduce delays, improve performance and provide better assurance of QoS.
    Serial Communication Between FX Series of Mitsubishi PLC and Host Computer Based on VB6.0
    YAN Hua-lin;QIU Yue-quan
    2010, 1(5):  122-124.  doi:10.3969/j.issn.1006-2475.2010.05.035
    Asbtract ( 1825 )  
    Related Articles | Metrics
    Serial communication between computer and PLC is often used in modern industrial control. Computer is the host, PLC is the slavery, specific to the communication protocol between Mitsubishi FX PLC and the host computer, the paper gives programming and process of serial communication between PLC and host computer by VB6.0. The result of test indicates that this serial communication is accuracy for transferring data, simple and strong portability.
    Research on Nodes Power and Energy-aware Ability in WSN Environment Monitor System
    WANG Gang;LI Peng
    2010, 1(5):  125-126,.  doi:10.3969/j.issn.1006-2475.2010.05.036
    Asbtract ( 1025 )  
    Related Articles | Metrics
    A good environmental condition of the core computer room is very important for the campus networks. Therefore it is necessary to outfit the environmental monitoring system for the core computer room. But the traditional monitoring systems have some problems: for example the poor flexibility of wiring problems, the high cost and so on. According to this situation, this paper proposes an energy-aware and energy-saving monitoring system for the core computer lab environment by means of wireless sensor networks. The design of WSN nodes adopts the SOC JN5139, the integrated compiling environment adopts open source software-code::blocks. When the node runs, it is controlled by the BOS. At the end, the experiments are done in the core computer room with the nodes, the proper scheme of the nodes distribution and the value of energy-saving transmit power are given, in this way the intelligent monitoring system has the ability to achieve the monitor. At the same time, the monitoring systems can be used in the modern farm and the other environment.
    Research on Personalized Search Engine Based on Recommendation Pattern
    JIANG Jie;LI Jian-min;ZENG Qing-wei
    2010, 1(5):  127-129,.  doi:10.3969/j.issn.1006-2475.2010.05.037
    Asbtract ( 1704 )  
    Related Articles | Metrics
    With the rapid development of Internet and all the disadvantages of the current traditional search engines, it is necessary that personalized search engines come to reality, and also with the problem of information overload, personalized recommender systems have been a hot attention in many areas. This paper combines personalized recommender system with personalized search engine, brings recommendation pattern into personalized search engine, researches and designs the personalized search engine based on recommendation pattern.
    计算机辅助教学
    A Mandarin E-learning System Based on Pervasive Computing
    YANG Jing;LIU Xiao-gang;YIN Xiao-jing
    2010, 1(5):  130-134.  doi:10.3969/j.issn.1006-2475.2010.05.038
    Asbtract ( 984 )  
    Related Articles | Metrics
    Pervasive computing has a great potential for many next-generation IT applications. Its “any time, any where, and human-centered” feature makes it a perfect technology for mandarin E-learning application. This paper describes a pervasive computing system design and implementation for mandarin E-learning with many advanced techniques, such as speech and tone recognition, soft switch technique, text to speech technique, voice-mail, etc. The paper proposes a human-centered pervasive computing system model(HPC), a layered architecture analysis and design method(LAAD). Based on the HPC model and the LAAD method, a pervasive computing-based mandarin E-learning system is designed and implemented. The E-learning system can compute the accuracy of speech and tone and supply some used pervasive services.
    Design of Railway Simulating Training System Based on HLA
    LI Zi-shi;WENG Fang-yu
    2010, 1(5):  135-138.  doi:10.3969/j.issn.1006-2475.2010.05.039
    Asbtract ( 213 )  
    Related Articles | Metrics
    To resolve the requirement of the training for railway operating personal, this paper appears a process of constructing a railway simulation training system using high level architecture(HLA), and advances two schemes of extension in the already existing train driving simulator federation.
    Software Development of Online Multimedia Classroom Based on WMEncoder SDK
    TAI An
    2010, 1(5):  139-142,.  doi:10.3969/j.issn.1006-2475.2010.05.040
    Asbtract ( 1649 )  
    Related Articles | Metrics
    On the basis of introducing the technology of Windows Media, screen capture and broadcast on teacher’s computer are implemented by using Windows Media Encoder 9 SDK. Each student’s computer in the classroom can receive the broadcast. So all students can watch the teacher’s teaching information on their own computer. This constructs an online multimedia classroom.
    Discussion on Network Teaching Platform Based on RIA Technology
    LIU Jing-feng;LIU Zhi-long;HUANG Chuan-hua
    2010, 1(5):  143-146.  doi:10.3969/j.issn.1006-2475.2010.05.041
    Asbtract ( 967 )  
    Related Articles | Metrics
    The paper simply introduces the reasons of inducting RIA technology, expatiates on RIA architecture and the technology of implement, mainly analyzes the application of RIA technology in network teaching platform.
    Study on Application of Active Database Technique in ITS
    PAN Xiang
    2010, 1(5):  147-150.  doi:10.3969/j.issn.1006-2475.2010.05.042
    Asbtract ( 947 )  
    Related Articles | Metrics
    This paper discusses the application of active database technique in ITS using knowledge-tree to express the relationship of knowledge. It makes the system more intelligent by arranging the knowledge of teaching and studying automatically according to the study condition of students.
    信息安全
    Research on Secure Data Aggregation in Wireless Sensor Network
    LIU Xin-zhi
    2010, 1(5):  151-155,.  doi:10.3969/j.issn.1006-2475.2010.05.043
    Asbtract ( 988 )  
    Related Articles | Metrics
    Data aggregation is one of the most important solutions to the limit-resourced problem in wireless sensor network (WSN) by eliminating information redundancy and increasing the lifetime of the network, and widely used in WSN currently. However, WSN has the native trait of deploying in the open area, particularly in the hostile area, which means potential security threat in WSN. Consequently, in the implementation of data aggregation in WSN, the data is prone to security attacks. The thesis aims to discuss how to ensure the security of data aggregation, then focuses on secure data aggregation based on homomorphic encryption schemes, and makes introduction respectively on typical private and public homomorphic encryption algorithms, finally introduces a secure data aggregation application based on a public homomorphic encryption algorithm in WSN.
    Implementation of File Transparent Encryption System Based on System Driver
    WU Hui-ling;HE Guang-sheng
    2010, 1(5):  156-159.  doi:10.3969/j.issn.1006-2475.2010.05.044
    Asbtract ( 963 )  
    Related Articles | Metrics
    With the development of computer network technology, file information security issue is becoming one of the most attention issues in the field of information security nowadays. Firstly this paper simply analyzes the lack of the current file encryption method, and then it illustrates the principle of transparent encryption and system filter driver. Subsequently the article researches the process of design and implementation of file transparent encryption system, which is based on system filter driver. In the end the paper analyzes the difficulty and lack of the system design.
    Discussion on Network Perimeter Security Problem from Wireless Extension
    FAN Zhi-yong;XU Zhen-he
    2010, 1(5):  160-163.  doi:10.3969/j.issn.1006-2475.2010.05.045
    Asbtract ( 1775 )  
    Related Articles | Metrics
    Wireless access adds new external intrusion channel while extending conventional wired network. For the new security problem from wired network and wireless extension, the paper proposes an improved security scheme on the basis of 802.11i. The scheme uses CCMP data encryption and 802.1X authentication mechanism integrating digital certificate, USBkey and SSID, to identify supplicant, authenticate wireless devices and implement secure access.
    Research and Realization of Role-based Access Control in B/S Model of Information Management System
    ZHANG Xian-yong;LI Yong;ZHANG Hao
    2010, 1(5):  164-166.  doi:10.3969/j.issn.1006-2475.2010.05.046
    Asbtract ( 1760 )  
    Related Articles | Metrics
    RBAC has many excellent characteristics, for example, it can reduce the complexity of authorization management, lower management costs, enhance system security and so on. This paper analyzes the basic principle and architecture of RBAC model. RBAC is described in the B/S model of information management system, and the new model is applied to a company's business information management system development. The association between users and roles, and roles and permissions is realized. So different users have different operating authority in this business information management system. In addition, the system’s security and management efficiency are improved.
    Secure Shell Security Model Construction and Its Security Performance Analysis
    HUANG Xiao-qiao;HAN Song
    2010, 1(5):  167-169,.  doi:10.3969/j.issn.1006-2475.2010.05.047
    Asbtract ( 970 )  
    Related Articles | Metrics
    The network management protocol SNMP has its flaws, but it has not solved by itself. So other secure protocol must be employed to deal with the flaws of SNMP. It is a good method that the secure shell protocol(SSH) can resolve the flaws of SNMP. In this paper the secure shell security model is constructed based on the SSH and its performance is analyzed, which is good to the network security management.
    应用与开发
    Evaluation Study of Aerodrome Control Simulator Fidelity Based on Fuzzy AHP
    CHEN Kuan-ming;WANG Jian-hui;LIU Zheng-yan
    2010, 1(5):  170-173.  doi:10.3969/j.issn.1006-2475.2010.05.048
    Asbtract ( 1836 )  
    Related Articles | Metrics
    Fidelity is an important factor in evaluation of simulation systems. The fuzzy AHP is applied to aerodrome control simulator evaluation. First, two sets of indexes are established, reviews sets and weights of experts are confirmed. Second, weights and realistic values of A and B-class indexes are fixed by experts rating methods. Finally the overall fidelity is comprehensively evaluated. The result of research shows that the evaluation result is identical to the opinions of a certain type of aerodrome control simulator.
    Dynamic Simulation Research on Vehicle Agents in Vehicle Driving Simulator
    LU Hong;LI Gang;DING Shi-min;PAN Xiao-long
    2010, 1(5):  174-179.  doi:10.3969/j.issn.1006-2475.2010.05.049
    Asbtract ( 985 )  
    Related Articles | Metrics
    In the virtual simulation system of a driving simulator, the changes in vehicle agents’ acceleration, velocity, location and the engine speed can be calculated by dynamic analysis and kinematics equations. The real-time simulation of the vehicle agents’ motion can be achieved and the changes in the visual system can be driven in real-time. OpenGVS is used to generate and display the driving virtual scene interactively and in real-time.
    Research on Path Planning with Single Side Constraint Based on Door and Wall Grid Map Model
    LUO Qi-jun;LI Zhi-heng;LI Yuan-peng;GAO Qing-ji
    2010, 1(5):  180-183,.  doi:10.3969/j.issn.1006-2475.2010.05.050
    Asbtract ( 1829 )  
    Related Articles | Metrics
    Service robot which should run in public environment should select road’s single side, while realizing harmony of human and robot. This paper designs door and wall grid map model, while this model is made of door grid, wall grid and midline grid, that is used to realize the restriction that the planned path must select the road’s single side. Conventional grid map model is appended with door grid, wall gird and midline grid to make the door and wall gird map model. The cost that wall grid to other grid is infinite, the set grids can be expanded by door grid, the midline is marked by midline gird. This paper uses the door and wall grid model and general arithmetic to plan path, and robot can move on certain side. It can be improved by experiment that the planed path can be limited to select road’s certain side by the door and wall gird map model.
    Application of SQLite in Embedded Middleware System
    LI Jun-feng
    2010, 1(5):  184-188.  doi:10.3969/j.issn.1006-2475.2010.05.051
    Asbtract ( 1060 )  
    Related Articles | Metrics
    This article explains the principle and constitution of embedded RFID middleware based on ARM, and how to use SQLite to save, filter and smooth data. It also introduces the characteristic of SLQite and the demand of embedded system of RFID middleware to database’s performance. The dynamic alternation between clients and SQLite is built by C API that is offered by SQLite, which is used by form technology. At last, it introduces the optimized design of SQLite.
    Configuration and Application of Matlab Parallel Computing Cluster Under Windows Environment
    YUAN Shu;HUANG Xue-chao;YANG Xuan
    2010, 1(5):  189-194.  doi:10.3969/j.issn.1006-2475.2010.05.052
    Asbtract ( 1298 )  
    Related Articles | Metrics
    This article describes two methods to build Matlab parallel computing cluster under Windows environment. A detailed discussion of the relationship of different component in the Matlab parallel computing toolbox is given by the contrast of the two methods. The key parameter settings are also introduced. To further explain Matlab parallel programming approach, the implementation of an instance in the cluster is provided. This paper has a certain reference value for the use of parallel computing under the Matlab environment.
    Research on Data Mining Based on SQL Server 2005
    HUANG Xing-rong;LI Chang-ling
    2010, 1(5):  195-198.  doi:10.3969/j.issn.1006-2475.2010.05.053
    Asbtract ( 1761 )  
    Related Articles | Metrics
    The efficiency of data mining is a hot problem of information technology research at present. The concept, process model and systematic structure of data mining are introduced. Data mining programs and the related technologies based on Microsoft SQL Server 2005 are discussed. Implementation of system adopts SQL Server analysis services, as a result, tightness coupling of data mining, data warehouse and application, improves efficiency of data mining.
    A RSS-based Design of Offline Database Application System
    YU Gui-lan;ZUO Jing-long
    2010, 1(5):  199-201,.  doi:10.3969/j.issn.1006-2475.2010.05.054
    Asbtract ( 1776 )  
    Related Articles | Metrics
    To solve that the offline RSS (really simple syndication) can not offer the internet service, a novel offline database application system model based on RSS is proposed, which includes the design of RSS offline database, data extraction, the basic method of data transformation and data access. The new concept of RSS offline reading is also defined. The system model implements the offline application of online service, extends the application of RSS and enhances the applicability of RSS reading.
    Design of Airborne 400Hz Power Quality Test System
    LIU Hong-jie;ZHOU Han-yi;XU Jing-song
    2010, 1(5):  202-206.  doi:10.3969/j.issn.1006-2475.2010.05.055
    Asbtract ( 996 )  
    Related Articles | Metrics
    This paper uses a computer to make measurement and analysis automatically, according to the military standard and aviation standards on the power quality of the system, uses Adlink's PCI-9812 data acquisition card for data acquisition. System is designed at the development environment of Delphi, and tested by combining with a reasonable hardware design and appropriate control algorithms for airborne power supply voltage, phase, phase imbalance, frequency spectrum and other related parameters.