Loading...

Table of Content

    26 April 2010, Volume 1 Issue 4
    多媒体技术
    Modeling and Driving of Virtual Hand Model Based on Data Glove
    LI Qin;HUANG Desuo;WANG Wenge;ZUO Congju
    2010, 1(4):  0-60,6.  doi:
    Asbtract ( 886 )  
    Related Articles | Metrics
    A lot of research has been carried on to solve the problems related to the traditional virtual manipulation. This paper proposes a new virtual manipulation with the device of WSTGlove5 dataglove. The data of dataglove is established by using objectoriented technology, a virtual hand model is established with a hierarchical structure. The control of the virtual hand model and the virtual manipulation of the virtual hand and object are implemented, and the applications are proposed.
    Research and Design of Storage Format of Cartoon on Vectorgraph
    ZHANG Pan;TAN Shoubiao;XU Chao
    2010, 1(4):  0-63,7.  doi:
    Asbtract ( 856 )  
    Related Articles | Metrics
    With the development of electronic information technology, portable digital equipments has infiltrated the daily life of people. In order to meet the developing need of the portable multimedia platform, this paper designs a storage format of cartoon by making use of vectorgraph, with its simple, istortion and convenient edit. The files of this fomat can store, play and transmit efficiently in portable digital equipments.
    Research on Video Transcoding from H.264 to AVS
    ZENG Qinghao;XIE Zhe;YUAN Chun;ZHANG Delei;YAN Weihong
    2010, 1(4):  0-66.  doi:
    Asbtract ( 432 )  
    Related Articles | Metrics
    Through a indepth comparison and analysis of the two video codec standard of H.264 Main Profile and AVSP2, this article provides a rapid realization of H.264 to AVS video transcoding technique, and carries out a software implementation of it.
    信息安全
    A New Identitybased Proxy Blind Signature Scheme
    YANG Sigen;PENG Changgen
    2010, 1(4):  0-69.  doi:
    Asbtract ( 950 )  
    Related Articles | Metrics
    Identitybased proxy blind signature is a special kind of digital signature, and is a very important branch of the field of modern cryptography, and is an important direction of research of information security. In this paper, based on Cha and Cheon’s signature scheme and identitybased proxy blind signature and combination of proxy signature, an identitybased proxy blind signature scheme is presented, its security analysis is made.
    Application of Honeypot System in Defensing DDoS
    WANG Beiyang
    2010, 1(4):  0-72.  doi:
    Asbtract ( 100 )  
    Related Articles | Metrics
    Based on analysis of the basic principles of DDoS attacks, this paper presents an application that defenses DDoS atticks via honeypot technology, and analyzes the effectiveness under the laboratory conditions.
    网络与通信
    Web Services Automatic Composition Based on Mapping of Rules
    XU Wanping;XIONG Jianmin;LIU Yaohe;SONG Tingxin
    2010, 1(4):  0-76,8.  doi:
    Asbtract ( 839 )  
    Related Articles | Metrics
    In light of the majority of Web services need to manually design, the approaches of automatically building a Web services path based on input and output parameters associated with the rules mapping are put forward. This method firstly gives production rule bases, and models ontology according to input and output parameters, then from the user’s inputs to establish mapping table which associates input and output parameters with rules and to find out all combination of path that meet conditions. Finally the quality of service is described and the optimal schema is selected to return to users.
    Design and Optimization of Encryption System Framework Based on Linux
    YANG Weiyong;LIN Weimin;CHEN Yadong
    2010, 1(4):  0-80.  doi:
    Asbtract ( 905 )  
    Related Articles | Metrics
    Through research on the encryption system framework of FreeBSD and Solaris,especially the analysis and optimization on the OCF framework of FreeBSD, the paper puts forward a system model based on the asynchronous operation of the OCF framework, and implements it in the Linux platform. Experiments show that the multiqueue asynchronous encryption framework discussed in the paper provids userlevel SSL VPN and core layer IPSec VPN with easytouse, highperformance encryption services.
    Application of Single Signon Mechanisms on Digital Campus
    XU Aijun;ZHANG Wenjin;HUANG Zhengwu
    2010, 1(4):  0-84,9.  doi:
    Asbtract ( 1557 )  
    Related Articles | Metrics
    Digital campus is built on the campus network, which has relatively simple structure, pure users and higher data communication quality. Accordingly, the SSO(single signon)system for it should change less of the exist Web application, simplify the process of identifying and enhance the higher security. On researching the implementation mode and common strategy of SSO, the article presents a simplified SSO system used in digital campus and the way of design, procedure and key technology, and focuses more on security. The implementation of the system in our campus has proved its success.
    Research on Trust Model Based on QoS Constraints of Grid Nodes
    LIN Jianning
    2010, 1(4):  0-90.  doi:
    Asbtract ( 885 )  
    Related Articles | Metrics
    In grid environment grid nodes provide services with QoS guarantee, so how to choose a credible service is a critical problem. This paper proposes a kind of mechanism to construct direct trust model based on QoS constraints that the services provide, and in the process of building the direct trust a partial relation is inducted in order to retain the worthy history information. And referring to behavior of human society the reputation model of the grid nodes is established. Moreover, by virtual of the mechanism of the grading in the match the malice recommendation information is shielded through comparing the difference of each recommendation. In order to avoid the overload appearance, a choosing scheme implementing a biased roulette wheel is adopted. Simulation tests prove that the model can tackle the trust problem in a simple and efficient way.
    Mining User Access Patterns Based on Irregular User Access Path Clustering Algorithm
    YANG Yanling;REN Yan;DUAN Longzhen;LIU Feirong;LI Lei
    2010, 1(4):  0-93.  doi:
    Asbtract ( 899 )  
    Related Articles | Metrics
    The paper mainly analyzes the current mainstream technology and methods of Web user access patterns mining. Contrary to the defects of variety of mining algorithms, such as high complexity, low flexibility, the paper proposes a clustering algorithm that can mine user access patterns contrary to irregular user access path. This algorithm can mine user interest patterns simply and high efficiently.
    A New Subjectbased Web Crawler with Concept Tree
    XIE Zhini
    2010, 1(4):  0-106,.  doi:
    Asbtract ( 816 )  
    Related Articles | Metrics
    This paper presents a new subjectbased Web crawler. Different from the traditional subjectbased Web crawler, which describes subjects by key words, the method represents topics with concept tree. And based on the concept tree, the paper designs a new metric for measuring the relevance between topic and anchor text or HTML page content. When computing the relevence of a URL with the given subject, a threshold σ is introduced for determining whether the URL is relevant or not. Only those URL with relevance lower than σ will cause a download of the HTML page linked by the URL. This strategy leads to some benefits, among which the most one is that the computing cost could cut down greatly. To obtain a proper value of σ, the paper uses the LMS algorithm.
    Application of Data Realtime Display in Web Based on Callback Functions and VML
    SONG Tianbin;ZHENG Xiangzhou;TANG Shunjie
    2010, 1(4):  0-97,1.  doi:
    Asbtract ( 937 )  
    Related Articles | Metrics
    Applied .NET callback function to realize clientside script function and serverside asynchronous calls, Web page does not need to hole refresh and client state information can be maintained, processing of data at serverside can be realtime displayed. In response to clientside request with JavaScript function, serverside returns processed results. The results can be drawn on browser with plentiful charts by using VML language. In this paper, the callback function call mechanism and VML languages used in plot at clientside are explained, and a detailed example to analyze its implementation is demonstrated.
    Application of VFP in Web Based on Technology of ActiveX Component
    TAI An;HU Huaijin;LI Huaicheng
    2010, 1(4):  0-102.  doi:
    Asbtract ( 122 )  
    Related Articles | Metrics
    This paper introduces the way, the syntax format and the general process that how to use VFP to establish ActiveX component. With the benefit of the technology of ActiveX component, it describes how to read and write VFP databases on example. This paper also introduces the method of calling ActiveX component in network programming language, through which implements the use of VFP databases and VFP dataprocessing functions in Web application.
    Research and Application of ASP.NET User Controls Technology in Page of News
    WANG Junwei;LI Jianmin;LIN Zhenrong
    2010, 1(4):  0-110.  doi:
    Asbtract ( 928 )  
    Related Articles | Metrics
    In the current website development process, the display of information is more and more important, so a Web site is successful or fail, the portal page is the key. This paper introduces a method for displaying information in the portal page, which can greatly reduce the workload to developers. In the general news pages, although we saw the information is rich and colorful, the forms of display are different, but in the specific design process, the news is all got from the database, and displayed on the page. In this paper, the method based on the ASP.NET user controls, combined with ListView by reusing custom user controls to get list of the news, which greatly improves work efficiency, but also brings the convenience for the maintenance of the system.
    New Approaches of Keyword Feature Item Weighting Based on Synonymy Replace and Adjacent Merge
    SI Hongna;YAO Liwen;LI Xiangjun
    2010, 1(4):  0-117,.  doi:
    Asbtract ( 1517 )  
    Related Articles | Metrics
    Feature item weighting is the core of the keywords extraction in text mining. The calculation approaches has an important impact to the result of text mining. This paper analyzes the shortage of the traditional TFIDF algorithm, and then proposes the new approaches of keyword feature item weighting based on synonymy replace and adjacent merge to reduce the overreliance on word frequency when calculating the weight. In order to test algorithm performance, this paper does the keyword extraction comparative experiment between KSRAM algorithm and the traditional TFIDF algorithm, the result shows that the KSRAM algorithm is better than TFIDF algorithm in precision and recall.
    Study and Implementation of Locationbased Service System
    ZHU Hongjun;WU Jinrong;
    2010, 1(4):  0-114.  doi:
    Asbtract ( 1680 )  
    Related Articles | Metrics
    The core of development of mobile GIS in China is LBS——Locationbased Service. The construction of LBS system provides a blueprint for future space information service and has a great significance to digital city. The paper is based on Shanghai Science and Technology Development Fund projects and Shanghai Information Committee of 653 projects, indepth study of design and implementation technologies of LBS system, including GIS theory and technology, Java ME technology platform, Mobile SVG, XML and so on, and describes design and implementation of LBS system.
    Simulation and Performance Evaluation of IEEE802.15.4 WSN
    JIN Dongfang;LI Shaowen;WANG Kun
    2010, 1(4):  0-121.  doi:
    Asbtract ( 905 )  
    Related Articles | Metrics
    IEEE802.15.4 is a standard to meet the need for lowrate lowcost lowpower wireless personal area network. By using the network simulation software NS2, it does the analysis of the main performance indexes of the WSN based on IEEE802.15.4, and details the slotted CSMA/CA machanism in the IEEE802.15.4 MAC protocol. Finally it makes out the simulation environment and its results, and makes metrics anlysis and expounds the interdependency between the indexes.
    Design of Intelligent Release Based on Wireless Network
    ZHANG Ligang;WANG Quanliang
    2010, 1(4):  0-124.  doi:
    Asbtract ( 879 )  
    Related Articles | Metrics
    According to application of intelligent release, a new method based on wireless network is proposed, the hardware design method and software design method is mentioned in detail. The use of wireless technology simplifies the operation of intelligent release, it has a good practical value.
    Research on Mobile IP Multicast Mechanism Based on Foreign Agent
    CAI Xuelian
    2010, 1(4):  0-128,.  doi:
    Asbtract ( 881 )  
    Related Articles | Metrics
    Inheriting the advantages of ABMoM, a mobile IP multicast based on foreign agent scheme is proposed. Compared with the ABMoM, the foreign agent supports multicast, acting as a local multicast router. The mobile host directly regists to the foreign agent which uses improved group management protocol to manage the local group members, and any routing mechanism to communicate with the other multicast routers. Combining remote reservations and binary tunnel technology, this new scheme proposes a good solution to the communication overhead between the multicast agent and foreign agent. The introduction of FA buffer technology can reduce the impact of switching to ensure that smooth handoff between subnets.
    算法分析与设计
    An Improved Genetic Algorithm for Optimal Path Planning
    QIU Min;WANG Gong-bao;ZHANG Song-tao;ZHANG Peng-tao
    2010, 1(4):  0-8,14.  doi:
    Asbtract ( 908 )  
    Related Articles | Metrics
    Blindness and lower convergent speed is the two puzzling problem in applying genetic algorithm. Based on the given background of path planning, the paper integrates simulated annealing into function and integrates taboo search into mutation. Moreover, the rate of crossover and mutation can be adjusted adaptively during the evolution process. As it is proved by analysis and test, a better result is obtained by the improved genetic algorithm.
    Study on Radar Emitter Signal Recognition Based on Rough Sets and Grey Association Theory
    ZHANG Zheng-chao;;GUAN Xin;;HE You;LI Ying-sheng;GUO Wei-feng
    2010, 1(4):  0-5.  doi:
    Asbtract ( 1060 )  
    Related Articles | Metrics
    Radar emitter signal is described by radio frequency, pulse repeated frequency and pulse wide. Whereas it is not every attribute is in efficiency, the attributes in decision table can be reduced and rules can be extracted by Rough Sets, weight coefficient of attribute can be determined too. The pure signal and approximately pure signal can be recognized by rules extracted from decision table, the impure signal or distortional or multivocal signal can be recognized by calculating the grey association degree from the unknown signal and signals in radar emitter signal database. The weight coefficient of attribute determined by Rough Sets and grey association coefficient are determined the grey association degree, the signal of maximal grey degree is the recognition result. The simulation results show the recognition method based on Rough Sets and grey association theory is efficient in shortening recognition course.
    Research on Privacy Preserving Inner Product for Malicious Model
    JIANG Dong-jie
    2010, 1(4):  0-33.  doi:
    Asbtract ( 924 )  
    Related Articles | Metrics
    The existing privacy preserving methods mostly based on semihonest models and concentrate on a single algorithm, and secure multiparty computation are inefficient, so this paper proposes a privacypreserving method based on random distribution for vertically partitioned data to compute inner product. The technique is suit for malicious models by choosing random matrix which according with some condition, and protects the inner product between different attributes effectively. Theoretic argument and example analysis demonstrate that our scheme is secure and maintain the validity of data.
    Simulated Annealing Genetic Algorithm of Solving Problem from Surface Distance
    YU Wen-li;FU Jian-zhong
    2010, 1(4):  0-14.  doi:
    Asbtract ( 859 )  
    Related Articles | Metrics
    A uniform approach, simulated annealing genetic algorithm(SAGA)for calculating the separation between smooth surfaces is presented. The algorithm computes the distance between surfaces by combining genetic algorithm with simulated annealing algorithm. Most surfaces which are commonly used in the industry are parameterize uniformly, and the distance problem between parameterized surfaces is solved by the genetic algorithm with simulated annealing mechanism. Because simulated annealing mechanism is introduced and a few special individual is added artificially, the ability of climb hilling is enhanced largely.
    Research on Pulse Wave Signal and Time-domain Feature Extraction Algorithm
    TANG Ming-yi;LI Kai;MA Xiao-tie
    2010, 1(4):  0-17,2.  doi:
    Asbtract ( 858 )  
    Related Articles | Metrics
    The paper researches the pulse wave signal feature, as well as timedomain extraction algorithms. For the pulse wave signal has a clear physical significance of a number of feature points (such as wave, tidal waves, heavy pumpwave, etc.), the extreme value method is used to extract the signal from the pulse feature points and feature points are calculated in accordance with the pulse cycle. The simulation results prove that by using of extreme value method with the traditional extraction method compared to the pulse signal, the pulse of external feature extraction method is more concise and accurate.
    An Approach to Generating an Approximate Ontology from  Information System Based on Granular Computing
    YUAN Xin-di;YAO Xiao-kun;QIU Tao-rong;YAO Li-wen
    2010, 1(4):  0-22.  doi:
    Asbtract ( 865 )  
    Related Articles | Metrics
    It’s not only necessary but also important to study approximate concepts and approximate ontology generated from approximate concepts. By applying the principle of granular computing and viewing information tables as context of domain ontologies, a data model and some algorithms for capturing approximate concepts and generating approximate ontologies are built and proposed respectively. And the algorithms illustrated by using a real example are effective.
    Research on Grey Relevancy Prediction Models for Local GDP
    HOU Li-min;MA Guo-feng
    2010, 1(4):  0-29.  doi:
    Asbtract ( 901 )  
    Related Articles | Metrics
    GDP is a dynamic grey system restricted by many factors. Considering many influencing factors, the primary factors are determined using grey relational analysis, this paper can set up grey relevancy prediction models GM(1,N) and GM(0,N), and then coordinates and synthesizes the different prediction results to obtain the comparatively logical predicted values. It greatly elevates reliability and application values.
    数据库与数据挖掘
    Research on Data Stream Mining Methods
    WU Xue-ting;ZHOU Ming-jian
    2010, 1(4):  0-50.  doi:
    Asbtract ( 846 )  
    Related Articles | Metrics
    As data stream compared to traditional static data, it is a challenge to analyze and mine it effectively. This paper gives an overview of the progress of data stream mining nowadays. Firstly, the basic conceptions about data stream, data stream models and synopsis description are introduced. Then, the relate algorithms in mining data streams are summarized. Finally, according to its use in different fields, the importance of data stream mining is analyzed.
    算法分析与设计
    An Attribute Weighting K-means Algorithm Based on Synthetic Weight
    SHANGGUAN Ting-hua;FENG Rong-yao;LIU Hong-chuan
    2010, 1(4):  0-36.  doi:
    Asbtract ( 1512 )  
    Related Articles | Metrics
    This paper proposes an attribute weighting K-means algorithm based on synthetic weight in order to improve the clustering quality. The weighting schemes are Entropy weighting scheme and Mean-square-deviation weighting scheme. Experimental results on real life datasets show that it is superior to algorithms without weight with respect to adjusted rand index measures.
    Analysis and Improvement of Feature Selection for Text Categorization
    XU Chao-yang
    2010, 1(4):  0-39.  doi:
    Asbtract ( 1622 )  
    Related Articles | Metrics
    With the development of World Wide Web, the text classification becomes a key technology in organizing and processing large amount of document data. Information gain is an effective feature selection in text classification based on vector space model. This paper improves the information gain feature selection: Reduce the negative contribution to the classification; improve the evenness of the feature in the class contribution to the classification. The experiments results show that the classification results can be improved significantly by improving the information gain feature selection.
    Approach of Conflict Evidence Combination Based on Modification Model
    LIN Xue-mei;ZHANG Zheng-hui
    2010, 1(4):  0-42,5.  doi:
    Asbtract ( 1528 )  
    Related Articles | Metrics
    A method is developed for dealing with seriously conflicting evidence when the DempsterShafer combination result can not identify the actual conditions. The method imports the distance function, makes sure the support degree among the evidence, then decides the weight value of evidence, adopts average evidence instead of conflicies evidence, through weight value of evidence modifies evidence model, so based on Dempster combination rules, goes along evidence combination.
    Research on an Optimization Method of Warshall and Floyd Algorithm
    ZHU Can-shi
    2010, 1(4):  0-45,5.  doi:
    Asbtract ( 862 )  
    Related Articles | Metrics
    In linear programming, Warshall and Floyd algorithm is widely used, but the algorithm efficiency is the key to restrict its application. Especially for the handling of a complex directed graph, there exists an obvious shortage of the algorithm. Based on the research on Warshall and Floyd algorithm, this paper proposes an improvement of the algorithm, aiming at improving the efficiency of the algorithm’s time, and the improved algorithm is verified to achieve a satisfactory result.
    数据库与数据挖掘
    Design and Application on Data Integration Model of Mine Enterprise Based on XML
    GAO Xiao-ling;WANG Yan
    2010, 1(4):  0-53.  doi:
    Asbtract ( 828 )  
    Related Articles | Metrics
    It’s difficult to realize information sharing because of the complex data environment between the mine enterprises. It has become holding back progress of enterprise’s informatization. The paper designs the data intergration model based on XML technology, with analyzing the data environment of mine enterprise. And then the key technology of the integration model is researched and realized in detail.
    How to Achieve Approximate Divide and Exact Relation Division in Relational Algebra with SQL
    QIAN Shao
    2010, 1(4):  0-56.  doi:
    Asbtract ( 819 )  
    Related Articles | Metrics
    Relational algebra is based on relational database theory, SQL is a concrete realization of the standard computer language. Particularly, the division problem in relational algebra, that’s only the abstract theory problems. This paper analyzes relational algebra in depth, and that is devided two parts: approximate divide and exact relation division. The paper achieves SQL in approximate divide and exact relation division by relational algebra.
    网络与通信
    Research on AXML Peer’s Characteristics
    GAO Yong-bing;ZHAO Fei;HU Wen-jiang;WU Ling-juan
    2010, 1(4):  0-132.  doi:
    Asbtract ( 1045 )  
    Related Articles | Metrics
    ActiveXML is defined as a dynamic XML, Web Services is embedded in the XML. It is to facilitate the deployment of distributed applications based on distributed data sharing at large. It mainly aims at ActiveXML peer for effectively supporting ActiveXML language respectively from two aspects of the client and the server to its characteristics for further analysis.
    Design and Development of Intelligent Decision Support System About Internet Marketing
    CHEN Ji-xiang;;XU Su
    2010, 1(4):  0-136.  doi:
    Asbtract ( 1668 )  
    Related Articles | Metrics
    This article emphatically analyzes the intelligent decisionmaking support
    program in the network marketing application.First, the background of the discussion topic is explained based on Internet.After that, the development present situation electronic commerce and decision support system and its development tendency are narrated.Finally, the decision support system importance is expressed through the design and the development of the network marketing intelligence decision support
    system.
    Design and Realization of Broadband Telecommunications Line Quality Statistical Analysis System Based on .NET Platform
    SU Zhi-wei;SHI Yong-ge;HAN Jian-qiang
    2010, 1(4):  0-140.  doi:
    Asbtract ( 867 )  
    Related Articles | Metrics
    In order to simplify the workflow, save bandwidth resources and improve the efficiency of the daily work of telecommunications, based on detailed analysis of the relevant requirements, this article introduces the procedure of the broadband telecommunications line quality statistical analysis system based on .NET platform, which includes several important functions: port broadband estimation, statistical reporting analysis and system management. In the meanwhile, it describes some technical features and module functions during the designing.
    Software Implementation of Precision Clock Synchronization Technology Based on LXI
    ZHANG Yuan;KUANG Li-qun;HAN Xie
    2010, 1(4):  0-145.  doi:
    Asbtract ( 880 )  
    Related Articles | Metrics
    Based on the characteristics of the LXI bus technology, the overall framework of network test system is analyzed. Software implementation of precision clock synchronization technology based on LXI in network equipments is studied. With the use of the TCP/UDP protocol, the software implementation of the IEEE1588 network clock synchronization protocol based on the LXI class B instruments is discussed. The result indicates that for the LXI class B test equipments, it can reach submicrosecond synchronization precision by using the pure software method to achieve clock synchronization between equipments.
    人工智能
    Research on Multi-agent Simulation System of Production Scheduling
    YAN Tao
    2010, 1(4):  0-155.  doi:
    Asbtract ( 853 )  
    Related Articles | Metrics
    This paper deeply analyzes production scheduling system. A model of the system is proposed that based on MAS (Multi Agent Simulation) and HLA (High Level Architecture). Specific scheduling algorithm or rule could be turned into conducting rules of Agent. This simulation system is a flexible, universal and scalable platform for simulating the production scheduling system with Jade and Jess as developing tools.
    网络与通信
    Dsign and Realization of Pretreatment System of Telecom Broadband Obstacle Based on .NET
    LAI Lin;SHI Yong-ge;SU Zhi-wei
    2010, 1(4):  0-148.  doi:
    Asbtract ( 1037 )  
    Related Articles | Metrics
    In order to improve the rate of Telecom broadband pretreatment, to totally promote the operational quality and the satisfaction of customer, this paper, based on the practice, designs and implements the pretreatment system of Telecom broadband obstacle, which based on .NET platform, includes parts of diagnosis and pretreatment of the obstacle, forecasting of the bandwidth, management of the operating record and management of the system. The paper describes the functions and the main technique specialty of the course of design, and introduces the interface design, system architecture, main function and database design.
    应用与开发
    Study and Design of Weapons Techonology Document Platform Based on SSH Framework
    WANG Qing-min;WU Xiu-ling;ZHANG Shu-juan
    2010, 1(4):  0-170.  doi:
    Asbtract ( 854 )  
    Related Articles | Metrics
    The paper introduces the SSH framework to process the documents of weapons subject, and studies and designs the platform on weapon science document that has the function of unified information retrieval. The paper gives the design mode and the main technology of SSH, and then puts forward the function modules and architecture of system, finally gives the main technology of system.
    人工智能
    Research on Enterprise Management Information System Based on Agent
    WANG Jian;;LI Yi-ming;NIE Feng-ying
    2010, 1(4):  0-151,.  doi:
    Asbtract ( 885 )  
    Related Articles | Metrics
    Recently, with the development of ERP, MIS of enterprise level can be connected by LAN. However, the connection in outside of enterprises, specially, between enterprise users and enterprise partners, adopts tradition ideas, which doesn’t exert advantage of networks. This article, from the angle of different MIS systems of integrated enterprises, explores new methods to enhance the development of enterprise MIS and to improve the business management by using Agent technology. It also proposes a model, by using Agent technology, integrating together production, sale, purchase and stock and integrating MIS and e-commerce system.
    应用与开发
    Detecting Engine’s Surface Defects Based on Computer Vision
    XU Lin-hong;ZHANG Gui-mei;CHEN Shao-ping
    2010, 1(4):  0-158,.  doi:
    Asbtract ( 821 )  
    Related Articles | Metrics
    Defect detection of engine’s surface is an important tool to ensure its safety in use. The existed defects detect method can’t ensure engine’s detect precision and the detect efficiency. A method for detecting engine’s surface defects based on computer vision is proposed. Firstly, the images of engine’s inner surface are collected by industry endoscope. The median filter is chosen to denoise and the Canny operator is employed to detect the image edge in terms of image characteristic and experiments comparison. The defects are segmented from background by making use of the similarity and discontinuity of pixel greyscale. Then area and perimeter are introduced to regard as criterion for judging defect. And combining the above operations, a system for detecting the engine’s inner surface defect is designed. The experiment results show the proposed detection method is feasible and effective.
    Communication Design of MCU Controlling RF Chip of Vehicle Exhaust Monitoring System Based on WSN
    WANG Hai-hao;LIU Zhi-qin;ZHANG Wei-dong
    2010, 1(4):  0-162.  doi:
    Asbtract ( 1499 )  
    Related Articles | Metrics
    In view of vehicle exhaust which brings us so much influence and harm, this paper states the vehicle exhaust element content monitoring system based on Wireless Sensor Network (WSN), the end monitoring device has chosen radio frequency module CC2420, micro controller ATmega128. Monitoring object will be wirelessly transmitted by RF module which is controlled by micro controller, so that the whole system can effectively monitor the vehicle exhaust. This statement, which can get over the shortcoming of traditional offline monitoring and has the ability to get the exhaust element content timely and at the same time to analyze and manage it, has a good application prospect.
    Application of C4.5 Algorithm in Analysis of Insurance Suspicious Transactions
    WANG Xue-yuan;ZHANG Jun;DU Ping
    2010, 1(4):  0-166,.  doi:
    Asbtract ( 899 )  
    Related Articles | Metrics
    Reporting of suspicious transactions is one of the daily work of the insurance companies. Now, suspicious transactions are selected by people while checking them in accordance with the “management practices of reporting suspicious transactions and large transactions in financial institutions” which released by The People’s Bank of China. This paper builds a system using C4.5 decision tree algorithm, which can automatically identify a part of the suspicious transactions.
    Application of Smart Client Technology in Capital Construction  Projects Management Information System
    SUN Zhen;LIANG Ying;CHANG Chong
    2010, 1(4):  0-179,.  doi:
    Asbtract ( 817 )  
    Related Articles | Metrics
    Aiming at the deficiency in the application of B/S or C/S structure of management information system software, the paper introduces the architecture of Smart Client, which could be taken as the solution of system. By introducing the Smart Client technology and its merits, it gaves design objective and framework of system, and expatiates the implementation on the key technology of Smart Client.
    Data Mining on Library Circulation Data Based on Clementine
    ZHANG Wen-hua;JIANG Nian-de;WANG Yi-yun
    2010, 1(4):  0-173,.  doi:
    Asbtract ( 871 )  
    Related Articles | Metrics
    Digital library has changed the traditional model of library services, it accumulats a large number of readers information which provide base data for personalized service. This article focuses on a cluster analysis technique and its application in the library, using clementine’s twostep clustering model of cluster analysis on readers. Readers are clustered into three types: negative type, general type and positive type, library can provide personalized service for different types of readers.
    Research on Application of Data Transfer in Social Security Service
    ZHENG Shi-yong;WANG Ya-wei;CAO Zhong-feng;WANG Xin-xing
    2010, 1(4):  0-183.  doi:
    Asbtract ( 1762 )  
    Related Articles | Metrics
    Along with the development of social security informatization, the data migration plays an important role in upgrade process of society guarantees system. This article discusses the design concept and the key technologies of data migration, simultaneously, based on the demand of society guarantees system, improves the method and the flow of data migration and uses the database’s components to complete the work. The actual movement result indicates that this way can complete the data migration of social security service newold system correctly and ensure the data integrity.
    Design of Writing Level Practice System About Order of Strokes of Chinese Characters
    YU Hai-tao;ZHAO Xi-wu
    2010, 1(4):  0-195.  doi:
    Asbtract ( 1588 )  
    Related Articles | Metrics
    It is an important measure of examine about writing Chinese characters to spread normative character, the written order of strokes of Chinese characters is just one of standards that reflect writing specifications. The system is designed for normal university students, constructs characters database on the code of order of strokes according to characteristics of the order of strokes of Chinese characters, and offers environment for students to carry practice and test on their own.
    Design of Retinex Real-time Video Processing System Based on DSP
    WEN Di;LI Wu-jin;GU Bo;ZHANG Chi;WANG Ming-hui
    2010, 1(4):  0-187,.  doi:
    Asbtract ( 812 )  
    Related Articles | Metrics
    This paper introduces the hardware and software development for a real-time fog video processing system which makes the highperformance fixedpoint digital signal processor (DSP) as the core. The system adopts Retinex as the algorithm, and chooses the method of lookup table, enhanced directmemoryaccess(EDMA), software pipelining to do amount of optimizations for the algorithm features such as: large number of data, highspeed data transmission, and complex calculation. All of these reach the satisfied result and realtime performance.
    A New Single-phase Shunt Active Power Filter
    LIU Xiao-jie;SUN Pei-de;TU Li-jun
    2010, 1(4):  0-199.  doi:
    Asbtract ( 1492 )  
    Related Articles | Metrics
    Through analyzing the basic principles and structure of active power filter (APF), this paper proposes a new predictive control method on current closed loop control of APF. Meanwhile, harmonic current detecting circuit is set up by threephase current d-q transform of singlephase current delaying 60°. The reference current generated by main inverter circuit can be calculated by fundamental component of load current. In addition, active power filter system, simulated with “SimPowerSystems Blockset” of Simulink, is combined with PI control to employ the steady DC (direct current) side capacitor voltage of converter. From the testing, the APF designed with the model detects and measures high order harmonic constituent and compensates current rapid. The result shows that it is coherence with theoretical analysis.
    Research on ARINC 661 Specification and Its Application Development
    LIU Jian;LIU Qin;SUN Yong-rong;CAO Meng
    2010, 1(4):  0-192.  doi:
    Asbtract ( 1672 )  
    Related Articles | Metrics
    With the rapid development of electronic technology, requirements of avionics integration and humancomputer interaction are getting higher and higher. However, due to lack of specifications of the industry and differences among interfaces of avionics devices, the aircraft Cockpit Display System (CDS) developed slowly and ARINC 661 specification emerged in this background. After the amendments and additions in recent years, it has gradually become the standard of the industry, which is used in the Boeing, Airbus, Dassault, etc. However, it is rarely found some related research of the ARINC 661 specification at domestic, so developing the realization of the ARINC 661 specification is especially important. This paper makes an interpretation of ARINC 661 specification firstly, and then gives the concrete application steps. Finally, it gives a sample of the cockpit instrument based on VAPS XT, which shows that the method in the paper is reasonable and feasible, and can provide reference for subsequent study.
    Analysis and Application of Voice Spectrum
    SUN Yan;JIANG Zhan-cai;WANG De-fang
    2010, 1(4):  0-202.  doi:
    Asbtract ( 977 )  
    Related Articles | Metrics
    Speech spectrum analysis shows rich spectral content. This paper introduces principles and concept of variety of voice spectrum, for example: Shorttime spectrum, LPC, LPCC, Cepstrum. Speech spectrum is implemented with MATLAB. This paper clarifies relationship between the methods of variety of speech spectrum, characteristics and their applications.
    Method of Disguised Missing Data Detection Based on  Identically Distributed and Unbias Sample
    WU Ding-hui;YANG Xiao-hua;YIN Ji-yuan
    2010, 1(4):  0-206.  doi:
    Asbtract ( 801 )  
    Related Articles | Metrics
    Data quality has fundamental significance to the running of the whole information system of education administration. This paper proposes a method to clean the disguised missing data of the education administration based on the educational theory and the research on data quality, and proves the approach in the theory and verifies through experiment, and solves the problem of disguised missing data in the system, and improves the reliability of the data which is analyzed by the education administrator.