Loading...

Table of Content

    20 March 2010, Volume 1 Issue 3
    操作系统
    Platform Customizing and Device Driver Development of Windows CE.NET Based on S3C2410
    ZHAO Meng;;SONG Jie;DANG Li-cheng;GUO Zhen-chao
    2010, 1(3):  1-3.  doi:10.3969/j.issn.10062475.2010.03.001
    Asbtract ( 1109 )  
    Related Articles | Metrics
    The system structure of Windows CE.NET is introduced with Platform Builder 4.2 as tools of developing embedded system kernel and driver program, and the operating system kernel mirrorimage and driver program are customized and saved to the board based on S3C2410 as hardware platform.
    Realization of μC/FS File System on Nand Flash
    TANG Chang-qing;ZHENG Qiang;ZHAN Hui-xing
    2010, 1(3):  4-3.  doi:10.3969/j.issn.1006-2475.2010.03.002
    Asbtract ( 1145 )  
    Related Articles | Metrics

    With the example of embedded file system μC/FS, this paper describes μC/FS file system from four aspects: API layer,file system layer, logicl block layer and device driver layer, and realizes its porting to K9F1208U0M Nand Flash platform.

    图像处理
    Research on Contour Extraction of Colorful Caricature Image
    GUO Tong-hua;TAN Shou-biao;XU Chao
    2010, 1(3):  12-4.  doi:10.3969/j.issn.1006-2475.2010.03.004
    Asbtract ( 1681 )  
    Related Articles | Metrics

    In this paper, an approach to contour extract of colorful caricature image based on its coloration features is proposed. Combining the image segmentation result according to its color information and its edge detection result by color morphological method, it eliminates noise and extracts the object contour. Experimental results demonstrate that the algorithm can extract the contour of the colorful caricature image contour well, and it possesses excellent performance on the noise restrained.

    Research on Parallelization of Threedimensional Scene Based on Multicore Processors
    WU Wei-xin;LU Da
    2010, 1(3):  15-4.  doi:10.3969/j.issn.1006-2475.2010.03.005
    Asbtract ( 1013 )  
    Related Articles | Metrics

    Improving the speed of threedimensional scene has always been a major challenge which programmers need to face. With the appearance and popularization of the multicore processor, using the cores on processor instead multithreading methods to improve parallelism of the program has become a possibility. This article introduces the development of virtual reality tools OpenGL and parallel programming interface OpenMP which is a sharedmemory systems, analyzes the general process of using OpenGL to draw up the threedimensional scene, and takes the texturemapping as an example to discuss how to used OpenMP in the OpenGL program to enhance the parallelism.

    An Approach of Vectorization of Spatial Raster Data
    WANG Ya-ke;MA Jun;
    2010, 1(3):  19-4.  doi:10.3969/j.issn.1006-2475.2010.03.006
    Asbtract ( 1022 )  
    Related Articles | Metrics

    In the process of vectorization, the “island”like map is inadequate to deal with vectorization of raster data, in particular for the relationship between adjacent “islands” of the situation. In this paper, a novel method of vectorization is put forward. This approach can better deal with the relationship with the adjacent “islands” of the situation. Finally, the experiments prove the effectiveness of the method of vectorization.

    Design of Characters Walking Movement Based on Maya Technology
    QIU Ya-ping
    2010, 1(3):  23-3.  doi:10.3969/j.issn.1006-2475.2010.03.007
    Asbtract ( 1113 )  
    Related Articles | Metrics

    This paper expatiates the process of making characters walking, as well as some related considerations with Maya software. Based on analysis of characteristics of human walking, this paper circumstantiates such animation production processes, and discusses application skills adopting Maya technique in such process.

    Application of Edge Testing Operator in Vehicle Logo Recognition
    LI Na;ZHANG Li-wen;WAN Can
    2010, 1(3):  26-3.  doi:10.3969/j.issn.1006-2475.2010.03.008
    Asbtract ( 1035 )  
    Related Articles | Metrics
    With the guidance of digital image technology, this paper studies the edge testing algorithms, discusses Sobel operator and LaplacianGaussian operator. A serious comparison between the two operators is made, and an improved Sobel operator is proposed.
    Research on Graphics of Power Network Management Platform Based on Delphi
    ZHAO Xin;WU Di;SONG Guang-jun
    2010, 1(3):  29-4.  doi:10.3969/j.issn.1006-2475.2010.03.009
    Asbtract ( 948 )  
    Related Articles | Metrics

    Power network management graphic platform has already become an indispensable part in the application software of power system. In the procession of developing the graphic of power network management platform, the paper is directed by the idea of objectoriented analysis, and researches the technology of generating selfdefined table, binding geographic information with power information, and walkingthrough system, the problems about dynamic equipment attribute and importing the power data are solved efficiently. The software shows that those technologies can be exported to other power information managements.

    网络与通信
    Research on CTMM Based on Mobile Multimedia
    JI Hong-ying;GONG Cun-qun;CUI Lin
    2010, 1(3):  33-6.  doi:10.3969/j.issn.1006-2475.2010.03.010
    Asbtract ( 925 )  
    Related Articles | Metrics

    Considering server problem for MM (Mobile Multimedia) systems, such as the bandwidthconstrained, the burden of server and proxy, which is affected by client persistent increasing. In order to improve the network transmission bandwidth of mobile multimedia, reduce the load of multimedia source server and proxy server, and improve the hit rate of multimedia requested data, reduce response time, this paper proposes CTMM (Clusterbased Threetier Middleware Model) architecture, based on traditional mobile multimedia twotier structure model. Firstly, it elects the local mobile nodes with excellent performance. Secondly, it organizes and manages these nodes to form clusters. Then it uses cluster supernode selection strategy to select appropriate local nodes to provide resource for servicerequestors. Simulation results demonstrate validity of CTMM.

    Hop-Fault-Tolerant Algorithm in Mesh
    LI Wang-yuan;WANG Chang-shan
    2010, 1(3):  39-4.  doi:10.3969/j.issn.1006-2475.2010.03.011
    Asbtract ( 1055 )  
    Related Articles | Metrics

    With the improvement of chip integration, network on chip(NoC) which is based on the system on chip (SoC) has already become the importance of the chip design. With the increase of the intellectual property (IP) core, the fault in node and links is significantly increased, so making the use of faulttolerant in order to enhance the reliability of the system becomes the focus on the design of NOC. Based on the traditional faulttolerant technology and the 2DMesh topology, this paper proposes a hopfaulttolerant algorithm based on the turn model and then does performance comparison with OPNET.

    Test System of Networked Bent and Tensile Strain Based on Virtual Instrument
    LU Na;ZHU Li-hua
    2010, 1(3):  43-2.  doi:10.3969/j.issn.1006-2475.2010.03.012
    Asbtract ( 1000 )  
    Related Articles | Metrics

    This paper gives a test system of the bent and tensile strain of the networked based on LabVIEW and its characters, composition, principle and advantages, gives some new methods about flexuraltensile strain signal data acquisition, processing, remote data transmission, aimming at the engineering applications. This system has a good extensibility.

    Research and Design of Resource Discover Mechanism Based on Passive Grid Computing
    WEI Dong-sheng;ZHANG Zhao-hui
    2010, 1(3):  45-4.  doi:10.3969/j.issn.1006-2475.2010.03.013
    Asbtract ( 1730 )  
    Related Articles | Metrics

    How to better organize and register gridresources, in order to discover convenient resources fast, has been the development of the modern grid’s main focus. For this purpose, and strongly reducing network information flows generated by resource registration, the paper proposes a model that is based on the passive resource registeration mechanism. This gridresources discovery model uses resources similarities to classify and adjacency list to storage data, improves the comprehensive performance of gridresource retrieval.

    Research on Mobile Payment System Based on WPKI
    LI Bi-yun;SHI Jun-ping
    2010, 1(3):  49-3.  doi:10.3969/j.issn.1006-2475.2010.03.014
    Asbtract ( 964 )  
    Related Articles | Metrics

    Mobile E-commerce is the integration product of mobile messaging services and E-commerce, building secure and flexible mobile payment mechanism is the key links to business model. From the applications of mobile E-business, the structure and composition of WPKI is analyzed. The payment and payment process for mobile E-commerce is elaborated, and mobile Ecommerce transaction model is divided. E-commerce security framework is proposed based on WPKI of mobile.

    Implementing Read/Write/Deletion for Mobile Phone Message
    RUAN Wei-hua
    2010, 1(3):  52-3.  doi:10.3969/j.issn.1006-2475.2010.03.015
    Asbtract ( 983 )  
    Related Articles | Metrics

    This paper discusses the technology how to read, write and delete internal information through serial communication, which mainly applying in mobile phone book, calendar, documents and messages and so on. In addition, it gives systematic design, and implementation of the framework, and realizes the functions of read, write and delete internal information through serial port.

    应用与开发
    Development of Species Navigation Traditional Chinese Medicine Information System
    LAI Xin-mei;LIN Duan-yi;YANG Xue-mei;ZHOU Chang-en
    2010, 1(3):  55-3.  doi:10.3969/j.issn.1006-2475.2010.03.016
    Asbtract ( 1143 )  
    Related Articles | Metrics

    Traditional Chinese Medicine(TCM)has a long history. It is a gem in Chinese cultural treasurehouse. As mankind entering the 21st century and the life sciences rapid developing, back to nature has become a trend. So TCM should be expressed by the modern scientific terms, then its means to prevent and cured diseases would be understood widely and accepted in today’s world. Today it has used the natural classification system for plant to describe the species of traditional Chinese drugs. This study develops the species navigation TCM information system based on JSP. It can establish a link among databases of TCM information system through the species navigation, and that will be beneficial to lead the outcome of natural products research into TCM system.

    Research and Application of Business Intelligence System Model
    ]HU Yao-min;YU Ming-hui
    2010, 1(3):  58-4.  doi:10.3969/j.issn.1006-2475.2010.03.017
    Asbtract ( 1003 )  
    Related Articles | Metrics

    According to analysis of key technologies about business intelligence and relationship of them, a business intelligence system model based on SQL Server 2008 is provided. And the business intelligence system is developed based on this model.

    Evaluation Model Based on Information Entropy and Clustering Analysis
    KONG Li-ying
    2010, 1(3):  62-3.  doi:10.3969/j.issn.1006-2475.2010.03.018
    Asbtract ( 1023 )  
    Related Articles | Metrics

    Evaluation model based on information entropy and clustering analysis is set up, the information entropy is used to determine the index weight, and comprehensive evaluation is described by clustering analysis. The validity of the model is verified by analysis of example.

    Study of Three Kinds of Simulation Methods Based on Matlab 7.0
    YE Qing-di
    2010, 1(3):  65-5.  doi:10.3969/j.issn.1006-2475.2010.03.019
    Asbtract ( 927 )  
    Related Articles | Metrics

    This paper analyzes the linear analog modulation principle, and separately uses scripts, Simulink and GUI to simulate the AM modulation system, explains the general simulation process of communication system based on the three methods, and illustrates the three simulation methods characteristics by examples. The results prove that the three methods have both advantages and disadvantages. The script is relatively simple, the method based on the Simulink can reflect the dynamic process, and the method based on GUI has a good demonstration effect. All of them are powerful tools to study and design the communication systems.

    Construction of Interactive Multimedia Learning Community Website Based on ASP.NET
    GONG Qi-lin
    2010, 1(3):  70-3.  doi:
    Asbtract ( 915 )  
    Related Articles | Metrics

    For the need of interactive multimedia learning community, the paper designs and develops an interactive multimedia learning community site using ASP.NET 2.0 technology, discusses online teaching, and multimedia learning, and introduces the site’s main function and key codes in detail.

    Research and Application of SQLite3 Database in Portable
    TIAN Xiao-qiang;CHEN Bo
    2010, 1(3):  73-5.  doi:10.3969/j.issn.1006-2475.2010.03.021
    Asbtract ( 1835 )  
    Related Articles | Metrics

    This paper introduces the architecture of the Portable Electromedical Ultrasonic Equipment (PEUE) and analyzes the feasibility of applying SQLite3 database in such instrument. Based on the research of PEUE project, this paper presents a method that using SQLite3 as database middleware in PEUE to replace the way that using files to manage and storage all medical records. The method improves the efficiency of records index, searching and accessing in PEUE, especially when using FLASH chip as the storage media.

    Design of Laboratory Signin System Based on OpenCV
    XIE Ming-hua;LIU Hui;WANG Xin-hui
    2010, 1(3):  78-3.  doi:10.3969/j.issn.1006-2475.2010.03.022
    Asbtract ( 1077 )  
    Related Articles | Metrics

    The article designs a laboratory signin system. The system which is based on the OpenCV function library is realized by the platform of VC++6.0. It adopts the face detection technique and keeps accurate records of the photograph of the students. The system is easy and reliable to operate and the operation time of checkin is very short. It can prevent student from singing in for others and facilitate for administrators to manage.

    Design of Environmental Noise Monitor System Based on VI and Web
    YANG Jian-xiong
    2010, 1(3):  81-3.  doi:10.3969/j.issn.1006-2475.2010.03.023
    Asbtract ( 1157 )  
    Related Articles | Metrics

    Combining with the fact of environmental noise remote monitor, the paper puts forward a kind of environmental noise monitor system scheme which is based on VI and Web. It introduces the technique of hardware and scheme of software based on the LabVIEW software platform, the debug is convenience, the exploitation period is short. This system can collect and analyze noise varying from time to time, and it also can remote monitor and save noise signal. It has broad application prospects.

    Investigation of Game Framework Based on ActionScript 3.0
    XU Zhe-jun;YU Shu-yan
    2010, 1(3):  84-3.  doi:10.3969/j.issn.1006-2475.2010.03.024[
    Asbtract ( 1060 )  
    Related Articles | Metrics

    Aiming at the current development problem of the Flash game, this paper presents a game framework based on the ActionScript 3.0. This game framework is designed by layer, frame and ActionScript code. So on the one hand it’s conveniently to edit the scene with Flash, on the other hand, it keeps the ActionScript 3.0 code separately, and improves the maintainability and the reusability of the code. Also it simplifies the development procedure and improves the efficiency.

    How to Throw Weapons in Torque Game Engine
    LV Lan
    2010, 1(3):  87-2.  doi:10.3969/j.issn.1006-2475.2010.03.025
    Asbtract ( 940 )  
    Related Articles | Metrics
    This paper introduces how to throw weapons using script language in the Torque engine.
    Application of LabVIEW Software in Teaching
    CHEN Chun-chao;LI Chun-yang;LI Jiu-dong;LIU Ming-fei
    2010, 1(3):  89-4.  doi:10.3969/j.issn.1006-2475.2010.03.026
    Asbtract ( 1057 )  
    Related Articles | Metrics

    isual instruments are the basis of modern laboratory. Visual instruments are designed to replace the laboratory hardware equipment with LabVIEW and fuses textbook knowledge of test technology curriculum. It is elaborated that visual instruments based on LabVIEW have the strong usability in the modern teaching.

    Research and Design of Fire Protection Information System
    DING Xiangguo
    2010, 1(3):  93-3.  doi:10.3969/j.issn.1006-2475.2010.03.027
    Asbtract ( 997 )  
    Related Articles | Metrics

    To settle isolated islands of the information system of fire protection and to implement intercommunication and share of the information systems, the thesis analyzes principle, benefits and shortcomings of the traditional application integration, and introduces basic concept, architecture and advantages of SOA. Combining the practice of fire protection information system, this thesis proposes fire protection information system integration architecture based on SOA.

    Research and Realization of Webbased Face Recognition System
    FAN Zhong;GAO Zhi-yong;HUANG Zheng-hua;WANG Lin
    2010, 1(3):  96-4.  doi:10.3969/j.issn.1006-2475.2010.03.028
    Asbtract ( 1035 )  
    Related Articles | Metrics

    The deficiency of traditional face recognition system is analyzed, and a new face recognition system is provided using J2EE technology. Problems such as poor reusability, complicated development and distribution, and tight coupling are solved within the system. This article discusses the component design, the principle of PCA face recognition algorithm and the Matlab program calling under the Web. The system uses distributed J2EE techlogy, organic integrated with Matlab. It is a safe and common system. 

    Documents Transmission System Security Design and Implementation Strategy
    LI Shi-wu;YANG Yi;MA Yong-xiang
    2010, 1(3):  100-3.  doi:10.3969/j.issn.1006-2475.2010.03.029
    Asbtract ( 913 )  
    Related Articles | Metrics

    With the development of information technology in some areas, industries, units, the supporting security is relatively lagging behind applying modern communications and office technology, it causes more security leaks and loopholes, and some units even in a defenseless state. There are serious security documents hidden. This article ensures overall security of documents transmission process, uses data encryption, digital signatures, digital envelopes to identity authentication, authorization, encryption, signatures, audit based on PKI. It helps speed up the pace of information processing, enhances informationprocessing capacity, enhances quality and services level of party and government organs at all levels, so as to better prefectural economic construction and social development.

    Design of Water Source Locating System Based on PDA and GPS
    NIU Li;YU Jin-ming;YU Su-ping;CAI Hai-lin;YAN Qin
    2010, 1(3):  103-4.  doi:10.3969/j.issn.1006-2475.2010.03.030
    Asbtract ( 1114 )  
    Related Articles | Metrics

    This paper introduces a design of water source locating system based on GPS/PDA. The design includes an improvement of the spherical distance algorithm, which is too complicated to be used on handheld equipments in traditional. A water source locating system is developed with C# based on .Net platform in Windows Mobile. This paper describes the way to collect the location of water source, create location database, and operate the database. This system reduces the complexity of the algorithm while assuring the accuracy, so that it enhances the useableness and realtime performance.

    Design and Implementation of Enterprise Credit Evaluation Information System
    YU He-ling
    2010, 1(3):  107-4.  doi:10.3969/j.issn.1006-2475.2010.03.031
    Asbtract ( 927 )  
    Related Articles | Metrics

    This paper introduces the design and implementation of enterprise credit evaluation information system. The system uses enterprise credit evaluation model based on artificial neural network, collcets and processes enterprise credit information using mobile agent technology, develops network procedure and user interface using Java. The enterprise credit evaluation information system is computerized.

    Feature Extraction Method Based on New Wavelet Filter in Speech Recognition
    BAI Mao-rui;ZHENG Yu-zheng;ZHANG Jie
    2010, 1(3):  111-4.  doi:10.3969/j.issn.1006-2475.2010.03.032
    Asbtract ( 1017 )  
    Related Articles | Metrics

    This paper introduces a feature extraction method based on a new wavelet filter. At first, the new wavelet’s theory is introduced. Then, the new wavelet filter is designed according to the concept of human critical frequency band, and the scale parameter which the new wavelet filter need is given. The SDA9000 is used for spectral analysis, the LSP is applied for FPGA hardware simulation. The SNN (Synergetic Neural Networks) is used in train and recognition, and the Gauss wavelet filter is used to compare with the new wavelet filter. The characteristics of numerical and application for the methods are illustrated by using PC simulation of Matlab GUI. After the analysis of the spectrogram and the recognition result, it is found that the new wavelet filter has higher recognition rate and better robustness than traditional feature.

    信息安全
    A New IDbased Group Signature Scheme
    GU Wei-na
    2010, 1(3):  115-3.  doi:10.3969/j.issn.1006-2475.2010.03.033
    Asbtract ( 1009 )  
    Related Articles | Metrics
    In those existing IDbased signature schemes, people need to trust Private Key Generator (PKG). PKGs can forge the signature because PKGs make the private key. In order to solve the problem, some papers proposed that many PKGs can be imported, if it is insured that at least one PKG is honest, the scheme is safe. But enough PKGs can also forge the signature, so the problem isn’t solved fundamentally. This paper proposes a new IDbased signature scheme without honest PKGs. It solves the problem of key escrow. 
    Abnormal Intrusion Detection Based on Immune Negative Selection Algorithm
    XU Ming;FANG Xian-jin;HUANG Li
    2010, 1(3):  118-3.  doi:10.3969/j.issn.1006-2475.2010.03.034
    Asbtract ( 1017 )  
    Related Articles | Metrics
    The protection mechanism of natural immune system brings us great inspiration for the design of computer intrusion detection, and it supports an information security technology which can solve complex intrusion problem. This paper offers a new abnormal intrusion detection algorithm which can generate effective detectors and detect the realtime intrusion.
    Model of Campus Network User Behavior Hazard Assessment Based on LEC Method
    MEI Zhen-kun;CHEN Dong-fa;HUANG Jia-lin;GAN Miao-jin
    2010, 1(3):  121-4.  doi:10.3969/j.issn.1006-2475.2010.03.035
    Asbtract ( 943 )  
    Related Articles | Metrics

    Network management is a necessary condition for stable operation of the network. It is an area that contains a variety of issues, not only technical issues, but also includes law, management, psychology and other nontechnical issues. The core of the network is people, network failures are mostly from people who do something with intentional action or unintentional action. As long as managing the network user behavior, the network will be able to basically stable running. The core of user behavior management is user behavior hazard assessment, only the correct assessment of impact and harm of user behavior on the network has been done, the user’s behavior management has actual meaning. This paper presents a model of campus network user behavior hazard assessment based on the LEC method, and introduces its practical application on network management system.

    Broadcasting Multisignature on Generalized Conic Curve over Zn
    ZHOU Yan;JIANG Ming-ming
    2010, 1(3):  125-3.  doi:10.3969/j.issn.1006-2475.2010.03.036
    Asbtract ( 958 )  
    Related Articles | Metrics

    On basis of the introduction of the order and the base point on the generalized conic curve over Zn, the discrete a logrithm problem, plaintext embedding and decoding algorithm, this paper discusses a broadcasting multi-signature scheme. The security of the scheme is based on the factoring and discrete logarithms simultaneously. It can not only speed up the inverse operation and embed plaintext easier, but also resist PohligHellman’s attack and Wiener’s attack.

    中文信息技术
    Applications of Ontology for Tourism Information System
    FENG Xin;WANG Cheng-liang
    2010, 1(3):  128-5.  doi:10.3969/j.issn.1006-2475.2010.03.037
    Asbtract ( 969 )  
    Related Articles | Metrics

    Introducing the semantic Web technology into traditional tourism information system is a response to some problems of the present tourism information system in a Webbased environment. This paper presents the ontology establishing process and ontological architecture for the semantic Web. The methodology consists of building two separate ontologies, one for the user profile and another concerning tourism information and data. The classes hierarchy, properties, relations, instances and axioms derived from classes and slots are clearly defined to support the transparent information sharing and interoperability in semantics. The process of ontology evaluation indicates that, through the tourism ontology applications, the system can guarantee the consistency and completeness of domain knowledge and provide intelligence services in a more efficient way.

    Handwriting Identification Algorithm Combined with Characteristic of Single Character
    GAO Xue-tie
    2010, 1(3):  133-5.  doi:10.3969/j.issn.1006-2475.2010.03.038
    Asbtract ( 995 )  
    Related Articles | Metrics

    This paper researches the algorithm of handwriting identification based on the background of selfstudy examination of higher education. Firstly, multichannel Gabor filter is used in the texture analysis to gain handwriting features.It uses the Euclidean distance as a classifier to classify, then, finds the most similar 5 handwritings with test sample in the training sample library. On this basis, using of thecharacteristics of 9/7 lifting wavelet algorithm which can extract the minutiae of the high frequent of image extract the features for the single character. Through comprehensive analysis, it gives the final results of the identification. Experimental results show that this algorithm has good identification rates.

    Implementation and Research on Word Output Technology for Web
    LI Lan-you;Wang Ji-sheng
    2010, 1(3):  138-3.  doi:10.3969/j.issn.1006-2475.2010.03.039
    Asbtract ( 968 )  
    Related Articles | Metrics

    In order to meet the demand of Word document output format based on Web system for specific users, this paper makes the second development for Java2Word class library based on J2EE platform, puts forward a kind of design idea and method of customized output Word file format. The practical application in digital archives system shows that the result is effective and userfriendly.

    Application Study of Automatic Text Classification Combined with Language Model
    ZHAO Min-ya
    2010, 1(3):  141-3.  doi:10.3969/j.issn.1006-2475.2010.03.040
    Asbtract ( 964 )  
    Related Articles | Metrics

    This paper studies the application of bigram model from statistical language model in the automatic text classification. Referring to the shortcoming of the hypothesis that the terms are independent from each other in VSM (Vector Space Model), it puts forward a method to improve the result of text classification with mutual words’ information and sequence. The experiment shows that the method is feasible and efficient.

    Approach of Adaptive Web Site Construction Based on Web Logs Mining
    MU Li-li
    2010, 1(3):  144-4.  doi:10.3969/j.issn.1006-2475.2010.03.041
    Asbtract ( 1604 )  
    Related Articles | Metrics

    daptive Web site construction based on Web mining could improve the service quality for users. The adaptive Web site general framework is proposed. A detailed analysis is made for main modules of the framework, including data preprocessing, data mining, page recommendation and site adjustment. An effective algorithm of user access patterns identification is proposed in data mining module. The algorithm utilizes database query to simplify the find of the most frequent access paths set, and then forms a frequency access patterns map preparing for page recommendation and site adjustment. Finally, the adaptive Web site design principles are proposed.

    计算机控制
    Testing System of Solar Cell I-V Speciality Based on Delphi
    XU Jin-song;ZHOU Han-yi;LIU Hong-jie
    2010, 1(3):  148-3.  doi:10.3969/j.issn.1006-2475.2010.03.042
    Asbtract ( 992 )  
    Related Articles | Metrics

    This paper introduces work principle, hardware design, program demonstration and measure result of the solar cell I-V capability test system based on Delphi. The result shows that the test system has friendly interfaces, convenient operations, high roboticizeddegrees and applied values.

    Measurement of Thermistor Property Curve Based on Computer Remote Control
    XIANG Ying;WU Xian-qiu
    2010, 1(3):  151-3.  doi:10.3969/j.issn.1006-2475.2010.03.043
    Asbtract ( 1036 )  
    Related Articles | Metrics

    A hardware circuit for the measurement of thermistor characteristic curve and a lowcost lockinamplifier (LIA) based on virtual instrument is successfully designed. Then the measurement system of the thermistor property curve based on computer remote control is developed. The result of remote experiment based on virtual instrument is consistent with the experiment of traditional laboratory.

    数据库与数据挖掘
    Programming for Quickening Input of Micropaleontology Data
    LI Shao-rong
    2010, 1(3):  154-4.  doi:
    Asbtract ( 942 )  
    Related Articles | Metrics

    Micropaleontology data should be input into computer so that the data could be managed, analyzed, used for statistics and studied on computer. As micropaleontology data containing species names which are verbose Latin words, data input is a slow, timeconsuming, errorprone process. The program developed with automation programming techniques provides a way for fast input of micropaleontology data into Excel worksheet. Simultaneously, qualities of input data are well controlled.

    Research on Dynamically Updating Method of B/S Pattern Oil Fingerprint Database
    YANG Xin-zhong;JI Min;HUANG Ai-fang
    2010, 1(3):  158-4.  doi:10.3969/j.issn.1006-2475.2010.03.045
    Asbtract ( 994 )  
    Related Articles | Metrics

    The construction of oil fingerprinting database and spilled oil identification system plays an important role in identifying leaked oil. At the same time updating of database is vital to the actuality of database. The definition of GIS database updating is explained firstly, then incrementalupdating and completeupdating methods of GIS database updating are explained. Based on the data content and the analysis of data updating requirement in the digital identification of oil fingerprint system, the data updating method of B/S database is discussed and the process of updating is explained specifically.

    Research on Optimistic Concurrency Control Based on ADO.NET Offline Data Processing
    HU Zeng;LI Wen-jie
    2010, 1(3):  162-4.  doi:10.3969/j.issn.1006-2475.2010.03.046
    Asbtract ( 976 )  
    Related Articles | Metrics

    In database system, the data access technology is developed from connecting model to disconnected model. At present, the disconnected model wins a wide range of applications, such as the development of distributed systems, network services applications, Web applications and so on. In ADO.NET disconnected model, it supports offline access to data and data processing, but it also needs to make more closely control to the offline processing of data updating. This paper first introduces the principle of ADO.NET data offline, as well as three of the existing open concurrent update strategy, and puts forward the new strategy for concurrent updates on this basis.

    An Integration Method of Heterogeneous Data in Egovernment
    CHENG Chuan-hui;CHENG Xue-xian
    2010, 1(3):  166-4.  doi:10.3969/j.issn.1006-2475.2010.03.047
    Asbtract ( 1021 )  
    Related Articles | Metrics

    Building egovernment needs information from mass distributed agent points. The information comes from different MIS systems which are heterogeneous. It is a hot topic how to receive information efficiently realtime and communicate between centre and agents dynamically. An integration method of heterogeneous data in egovernment is introduced which stipulates a message answer mechanism. Data structure and content of message/answer are defined. The method is a selfadaptive technology which can test and modeling data structure automatically and based on distribution, obtain, transform, coordination and usage of entropy of information in P2P network.

    算法分析与设计
    Research on Heuristic Knowledge Reduction Algorithm for Incomplete Decision Table
    ZHANG Zheng-hui;DAI Xiao-peng;Xiong Da-hong;CHEN Ken;DENG Sheng
    2010, 1(3):  170-3.  doi:10.3969/j.issn.1006-2475.2010.03.048
    Asbtract ( 1025 )  
    Related Articles | Metrics

    he classic theory of Rough sets is based on incomplete information systems. In practicing, decision tables are, however, usually incomplete due to the causes of data outputting or processing. That is to say, there are often default values. In order to deal with incomplete systems, Kryszkiewicz puts a Rough sets model on the basis of error tolerance relations. According to this model, constructing discernibility matrixes and discernibility functions are the familiar approach by the current knowledge reduction algorithms. By this means, all reductions can work out. But it has been proved that it is a problem of “NPhard”. So it is more effective when a heuristic search algorithm is used to attain the most optimized or the second most optimized reduction. In this paper, the importance of attributes is defined and used as heuristic information. Then a complete knowledge reduction algorithm is put forward.

    Material Cutting Optimization Question Special Solution
    SHI Jia-qi;WEI Zu-kuan
    2010, 1(3):  173-3.  doi:10.3969/j.issn.1006-2475.2010.03.049
    Asbtract ( 1136 )  
    Related Articles | Metrics

    The material cutting optimization question is a kind of questing which usually appears in life. Socalled material cutting means to have sections and plates to certain shape and size with using cutting way. In order to save materials, the appropriate cutting plan must be selected to make consumed the least materials. Regarding the largescale material cutting question, this paper
    gradually approximates the problem’s optimal solution with the way of solving the limited row subproblems (a row generator method). Finally, this paper promotes the unidimensional material
    cutting model to a more common situation.

    Application of Common Cause Failure in Reliability Analysis of Underground Railway Interlocking System
    RONG Jia;JIANG Shang
    2010, 1(3):  176-4.  doi:10.3969/j.issn.1006-2475.2010.03.050
    Asbtract ( 1050 )  
    Related Articles | Metrics

    In terms of the high security characteristics of the underground railway interlocking system, dynamic fault tree analysis method is often used. But the increasing of computational complexity is brought by the increasing of the fault tree. This paper uses common cause failure factor replacing the Hot Spare Door of dynamic fault tree, so that the computation is reduced.

    Simulation of Airport Queuing System Based on TPA Method
    LIU Chong;ZHUANG Chang-yuan
    2010, 1(3):  180-4.  doi:10.3969/j.issn.1006-2475.2010.03.051
    Asbtract ( 1073 )  
    Related Articles | Metrics

    In analysis of the M/M/C/N/∞ queuing system in the scene of airport, this paper proposes how to deal with the Btype event which is changed to Ctype event due to the additional conditions using Three Phase Approach simulation strategy to design specific simulation system. Meanwhile, the existing TPA is improved, so that the TPA process can be described more clearly, and makes the program design more easily. The simulation system is realized by C#.NET and Linq, two languages focusing on logical process. The simulation result can be obtained with the change of the parameters track and queue in the system. The simulation system can handle the condition in track≥1 and queue≥1. At last, this paper gives a simple analysis of the simulation result and compares the simulation result to the theoretical result by queuing theory. 

    Method for Intervalbased Program Invariant Detection
    CHEN Cai
    2010, 1(3):  184-4.  doi:10.3969/j.issn.1006-2475.2010.03.052
    Asbtract ( 984 )  
    Related Articles | Metrics

    The detection of program invariants is an effective way to improve software quality. Static analysis is one research direction of discovering program invariants. This paper, based on the theory of mathematic and combined with graphical methods, gives a simple and effective static analysis method for the interval invariant, describes its testing process, and validates this method with examples.

    Algorithm of Two Levels Threethreshold Endpoint Detection
    SUN Yan;JIANG Zhan-cai
    2010, 1(3):  188-3.  doi:10.3969/j.issn.1006-2475.2010.03.053
    Asbtract ( 998 )  
    Related Articles | Metrics
    The endpoint detection is the key technology of speech signal process. Selecting the short time energy and the short time average zero crossing rate as the feature, according to the algorithm of two levels threethreshold detection, this paper uses relationship operator to avoid the
    pointbypoint comparison looping statements, realizes quick and convenient search to endpoint. The restults of simulation experiments on the algorithm show that this method has high accuracy, and makes certain robustness.