Loading...

Table of Content

    25 November 2010, Volume 1 Issue 11
    算法设计与分析
    Event Detection Overview
    LI Bo;YI Dong-yun;ZHAO Cheng-li
    2010, 1(11):  1-4,8.  doi:10.3969/j.issn.1006-2475.2010.11.001
    Asbtract ( 1028 )  
    Related Articles | Metrics
    Event detection is the course of extracting useful information from a large amount of incomplete, unknown in advance, but potentially useful information, it is summarized into event. Since the event detection has many common attributes to topic detection and tracking, information retrieval, information extraction and other natural language processing, and has the superiority of predicting the development of event, it gradually becomes a research hotspot of current event identifying. This paper introduces the research background, task definition and related algorithms of the event detection, especially the lexical semantic chaining’s correlation algorithm. After analyzing the research situation of current event detection field, points out the trend of development in future.
    A Method of Incremental Outliers-detecting Based on Frequent Patterns
    LIU Yuan-dong;HE Feng
    2010, 1(11):  5-8.  doi:10.3969/j.issn.1006-2475.2010.11.002
    Asbtract ( 1630 )  
    Related Articles | Metrics
    An outlier in a data set is an observation or a point that is considerably dissimilar to or inconsistent with the remainder of the data. This paper presents a method to detect outliers in incremental data mining by frequent patterns, gives a description of outliers in incremental data mining, and uses a iterative process to find outlier by improving the candidate sets, and it is verified by experiments.
    Semantic-based Automatic Text Classification Method
    HU Xiao-hui;XU Ye-ke;LIU Bin
    2010, 1(11):  9-11,1.  doi:10.3969/j.issn.1006-2475.2010.11.003
    Asbtract ( 1794 )  
    Related Articles | Metrics
    Automatic text classification is defined as the task to assign pre-defined category labels to documents.Based on the limitations of Vector Space Model, the Vector Space Model is incapable of expressing the structure of documents effectively.To solve this problem,this paper constructs the sireilar matrix by train text, and achieves the subject information of each category through similar matrix, and then to construct the classifier by the subject information.Finally the classifier is combined with the classic classifier to determine the category of text.The experiment system
    shows the effectiveness of the method.
    A New Hybrid Genetic Algorithm for Traveling Salesman Problem
    HU Zhi-wei;QIE Pei;ZHAO Xin-chao;LI Xian-xu
    2010, 1(11):  12-15.  doi:10.3969/j.issn.1006-2475.2010.11.004
    Asbtract ( 1077 )  
    Related Articles | Metrics
    The paper presents an improved hybrid genetic algorithm to solve the Traveling Salesman Problem (TSP). Based on the traditional genetic algorithm, Guo Tao algorithm is introduced to the crossover operation, which keeps good diversity and global search capability to overcome the shortcomings of premature convergence. PSO algorithm is introduced to the mutation operation, which accelerates the convergence rate, improves the solution quality, and finds the optimal solution more quickly. Verified by many examples from TSPLIB, the obtained results are better than the available optimal solutions, which demonstrate the efficiency and efficacy of the algorithm.
    Incremental Algorithm of Maintaining Concept Lattice
    LIU Na;HE Feng
    2010, 1(11):  16-18,2.  doi:10.3969/j.issn.1006-2475.2010.11.005
    Asbtract ( 1104 )  
    Related Articles | Metrics

    Concept lattice, induced from a binary relation between objects and features, is a very useful formal tool and fit for discovering the potential concept below the data. The algorithm of the lattice is still the hot spot. The structure of node in lattice, which is called association rule lattice and modified according to the requirements and the data structure of linkedlist with a head finger and a trail finger is adopted. Based on this, the incremental algorithm for maintaining concept lattice is put forward. The algorithm is analyzed with better time and space efficiency than other algorithms.

    计算机仿真
    Application of an Improved Path Searching Algorithm for Robot SoccerBased on Diffusion Rules
    LEI Da-jiang;TANG Jin-chuan;LIU Li-rui;LI Qi-hao
    2010, 1(11):  19-23.  doi:10.3969/j.issn.1006-2475.2010.11.006
    Asbtract ( 1052 )  
    Related Articles | Metrics

    This paper proposes a path searching algorithm based on the research of diffusion rules. After a deeply study on the traditional diffusion rules, makes further efforts to give an improved path searching algorithm and use this algorithm to support the motion path planning of soccer robot. The simulation test of soccer robot indicates that the algorithm is feasible and valid.

    A New Charge Pump for CMOS Charge Pump Phase Locked Loop
    SUN Peng;XU Yuan-xu;YAO En-yi;HU Yong-shuang
    2010, 1(11):  24-26,3.  doi:10.3969/j.issn.1006-2475.2010.11.007
    Asbtract ( 1106 )  
    Related Articles | Metrics

    In order to solve the problems of charge sharing, current mismatch, charge injection and clock feedthrough in charge pump of traditional structure, a differential input and singleended output charge pump in adjustable cascode structure is implemented. The circuit is designed in TSMC 0.18μm CMOS RF process. The simulation results with ADS show this charge pump has the advantages of low phase noise, smooth output current, low output voltage harmonic and small switching delay. While the output voltage of the charge pump is varied from 0.7V to 2.4V, the matching of charge and discharge currents is very good.

    图像处理
    Design of Indoor Scene Video Structured Description System
    LIANG Chen;ZHU Li-ying;ZHANG Hong-zhou;SHA Miao-miao
    2010, 1(11):  27-30.  doi:10.3969/j.issn.1006-2475.2010.11.008
    Asbtract ( 1056 )  
    Related Articles | Metrics

    Video Structured Description (VSD) is a technique that extracting and refining information from video data, to structure it to be a text information which can be read by both human and machine according to information’s intrinsic semantic relations. To distill knowledge from video, typical methods could be employed, such as spatialtemporal segmentation, feature extraction, object recognition and so on. This paper introduces a VSDbased indoor scene description system which implements scene description, description storage and dispatching. Experiments show the VSDbased system is efficient for video content application.

    Design of Remote Image Monitoring System Based on Embedded Linux
    TANG Ren-cai;LIU Lian-hao
    2010, 1(11):  31-34,3.  doi:10.3969/j.issn.1006-2475.2010.11.009
    Asbtract ( 449 )  
    Related Articles | Metrics

    The system uses embedded microprocessor S3C2440 and Linux as the core platform. The application programming interface V4L2 and Qt/Embedded library are two key technologies to realize image acquisition, realtime display and JPEG picture saving by using USB camera. This design of image acquisition and transmission is a low power consumption, high reliability and inexpensive system, which achieves encoding or decoding of images by libjpeg library and remote transmission of Ethernet.

    Research on Multi-viewpoint Navigation Based on Spherical Panoramic Images
    FENG Xiao-feng;CHEN Jun;SHI Xiong
    2010, 1(11):  35-38.  doi:10.3969/j.issn.1006-2475.2010.11.010
    Asbtract ( 1021 )  
    Related Articles | Metrics

    Spherical virtual space modeling using fisheye image is accomplished based on fisheye image mosaics, and then multi-viewpoint navigation is discussed. Test proves that virtual browsing speed can be improved using re-projection technology and browsing effect can be improved using zooming tehnology, thus immerse sense in virtual environment is enhanced, and good result is gained. 

    Medical Image Compression Based on Multi-wavelet Transform
    HUANG Li-fang;FANG Zhi-jun
    2010, 1(11):  39-41,4.  doi:10.3969/j.issn.1006-2475.2010.11.011
    Asbtract ( 1053 )  
    Related Articles | Metrics
    Due to locality and multiscale of wavelet transform, the wavelet transform can be applied to the medical image compression and get good performance. However, since it generated by single scaling function, it cannot be collected in orthogonality and symmetry at the same time. So this paper proposes the multi-wavelet theory on medical image compressing. The experiment results show that it performs better than wavelet in the aspects of perception and PSNR. 
    Design of LCD Numeric Display Virtual Model Based on GL Studio
    TU Shuai;ZHANG Hui-yan;ZHANG Xiao-yu;XIAO Chu-wan
    2010, 1(11):  42-44.  doi:10.3969/j.issn.1006-2475.2010.11.012
    Asbtract ( 1677 )  
    Related Articles | Metrics
    GL Studio is a professional simulation platform, it is very convenient to make use of GL Studio in the development of virtual models of mechanical instrument. But with the growth of electronic and information technology, more sophisticated and complex electronic display devices have been widely used in the field of machinery, electronics, aviation and military training, which left a difficult problem to the development of virtual instrument. LCD numeric display is a kind of familiar electronic display devices. Aiming at the characteristics of the LCD numeric display, a method to the development of the LCD numeric display virtual models based on GL Studio is put forward, and it is resulted to be available through an experiment. 
    管理信息系统
    Information Processing in Spiking Neurons
    CAI Rong-tai;WU Qing-xiang;WANG Ping
    2010, 1(11):  45-49.  doi:10.3969/j.issn.1006-2475.2010.11.013
    Asbtract ( 1737 )  
    Related Articles | Metrics
    This paper introduces the mathematical descriptions of the model of integrate and fire spiking neuron. The transformation from stimulus into spike trains in spiking neuron is discussed. The generation of output spike trains from input spike trains of the neuron is presented. The experimental results show that the spiking neuron does well in information representation, information distinguish and image reconstruction. The method of employing spiking neural networks in information processing is proposed.
    Research on Construction and Application of Customer Service Management System for Digital Urban Planning
    WU Wei;SHUI Xue-min;LU Qiang
    2010, 1(11):  50-52,5.  doi:10.3969/j.issn.1006-2475.2010.11.014
    Asbtract ( 1770 )  
    Related Articles | Metrics
    Urban planning has entered into a new era of digital planning. The development of urban planning relies on information system more and more. The efficiency of customer service has become an important thing to assure the urban planning informatization. This essay introduces the experiences of customer service management system in Guangzhou planning bureau. At last, it predicts the future development of customer service in the field of urban planning.
    Product Similarity Computation Based on Ontology Domain’s Hierarchical Structure
    XU Jing;CHEN Xia-lu;HE Zhong-xiu
    2010, 1(11):  53-55.  doi:10.3969/j.issn.1006-2475.2010.11.015
    Asbtract ( 1797 )  
    Related Articles | Metrics
    In ontology domain, the products have characters of large numbers of quantity and category. How to classify and enquiry effectively are difficult. This paper uses hierarchical structure to express the products in some a ontology domain, and designs algorithms to calculate similarity among the various products. This computation is the basis for inquiry and classification of products, products recommendation to consumers, and even the analysis of user browsing behavior.
    Research and Development of Rural Information Service System Based on Pen-based Operating Platform
    YUAN Qin;XIAO Yun;YANG Guo-qiang
    2010, 1(11):  56-59.  doi:10.3969/j.issn.1006-2475.2010.11.016
    Asbtract ( 1039 )  
    Related Articles | Metrics
    Through the analysis of the current pen application development techniques, methods and environment, this paper researches on cross-device pen operating platform’s architecture and construction principle. Combines with the current practice of rural information service, the paper proposes pen-based operating platform’s application development ideas which appropriated the rural information service.
    Design and Research on Web Data Mining Model Based on XML
    ZHOU Xin;DENG Rong
    2010, 1(11):  60-62.  doi:10.3969/j.issn.1006-2475.2010.11.017
    Asbtract ( 1040 )  
    Related Articles | Metrics
    Because there are lots of information resources in the Internet, Web mining has become a hotspot in data mining. This paper introduces the technology of Web data mining simply, and compares with HTML and XML. Finally, the paper makes full use of the superiority of XML to propose a data mining model based on XML, and describes the characteristic and purpose of the mining model in detail.
    网络与通信
    Research on Technology of Dynamic Interactive Virtual Community Based on X3D
    XU Wen;FU Da-jie;CHEN Rong-hua
    2010, 1(11):  63-65,7.  doi:10.3969/j.issn.1006-2475.2010.11.018
    Asbtract ( 954 )  
    Related Articles | Metrics
    Three-dimensional virtual community which has a powerful and widely commercial value, it is a virtual reality of the application of technology. X3D is the new generation of Internet 3D graphics standard. It provides the solutions for building 3D applications based on Web. This paper discusses on the technology of building a X3D-based interactive dynamic virtual community from virtual scene modeling, virtual scene optimizes and dynamic interactive technology of virtual scene.
    A Hardware Design of Video Monitoring System Based on ARM
    WANG Xiao-bin
    2010, 1(11):  66-71.  doi:10.3969/j.issn.1006-2475.2010.11.019
    Asbtract ( 1722 )  
    Related Articles | Metrics
    The embedded Web technology is contributing to reducing monitoring system cost and improving system reliability greatly, so the remote image monitor and control system based on ARM will become new research focus. This paper presents a hardware design of a kind of monitoring control system based on embedded Web technology, the design realizes the online remote supervision, management and maintenance, using a standard Web browser over Internet without timespace constraints. An ARM7-core processor AT91SAM7X256 is selected as a control chip in embedded video network server, with video signal captured by CMOS image sensor OV7640 and message transmitted by network module RTL8021BL. Practical results demonstrate the favorable stability and real time characteristic of the hardware system which can meet the most of network application demands and is worth popularizing.
    Improvement of LEACH Protocol Clustering Mechanisms
    XU Wei-ke
    2010, 1(11):  72-73,7.  doi:10.3969/j.issn.1006-2475.2010.11.020
    Asbtract ( 1003 )  
    Related Articles | Metrics

    This paper proposes a routing algorithm of the LEACH protocol mechanisms to improve the strategy clusters. In the cluster building phase, a distributed clustering algorithm and a centralized clustering algorithm combine clustering methods, the optimal number of clusters dynamically according to network conditions change the number of cluster type selection. That cause the network in the condition of a lower energy level to obtain more reasonable clustering class division.

    Research and Design of Meta Search Engine Based on Agent
    DONG Xu-hui;LU An-jiang;ZHANG Zheng-ping
    2010, 1(11):  74-76,7.  doi:10.3969/j.issn.1006-2475.2010.11.021
    Asbtract ( 973 )  
    Related Articles | Metrics
    This paper proposes a system based on agent meta search engine, and a intelligent meta search engine’s overall framework is designed, the meta search engine agent module features is described, the key technology of the system is analyzed. Finally, the tested performance of the system shows the system precision and recall rate can be enhanced.
    Evaluation Research of Communication Jamming Effectiveness in Training of Electronic Countermeasure
    LIU Li-wei;WEI Cheng-wei;LI Yong;ZHANG Ya-miao
    2010, 1(11):  77-79.  doi:10.3969/j.issn.1006-2475.2010.11.022
    Asbtract ( 1010 )  
    Related Articles | Metrics
    This text studies the fundamental principle of communication jamming effectiveness in training of electronic countermeasure, analysises the fundamental equation of communication jamming and evaluates the fundamental norm of the evaluation of communication jamming effectiveness, basing on the norm the effectiveness speech analog communications is evaluated and the results is obtained.
    TC Principle of Linux Traffic Control Tool and It’s Practical Case Analysis
    LONG Heng
    2010, 1(11):  80-84,8.  doi:10.3969/j.issn.1006-2475.2010.11.023
    Asbtract ( 1109 )  
    Related Articles | Metrics
    As an open source software for Linux system, TC is a traffic control tool with powerful and superior performance, and it’s as good as those professional equipments of flow control. This article introduces the concept and function of the main components of TC, and the relationship between these components and how they work coordinately, then explains the design process of a method by an example. The example can help to understand the high flexibility and powerful features of TC.
    Enhanced Design of Online Exam System on ASP.NET Platform Based on Ajax Technique
    ZHOU Yong-qiang;LU Jian-de
    2010, 1(11):  85-88.  doi:10.3969/j.issn.1006-2475.2010.11.024
    Asbtract ( 1585 )  
    Related Articles | Metrics
    With Ajax technique combining with ASP.NET, this paper makes enhanced design to online exam system. It improves the traditional B/S online exam system in the aspects such as the pages multiple reloading, the heavy server loads, the network congestion, and the inaccuracy timing. Ajax realizes the asynchronous communication to servers, the improved system has made full use of capabilities of the clients’ computation, reduced the server’s burden is reduced, and the fully new visual experience is given.
    Design of Net Check Attendance System Based on RFID Technology
    HE Tong-yu;YANG Shu-ying;XING Ruo-nan
    2010, 1(11):  89-91,9.  doi:10.3969/j.issn.1006-2475.2010.11.025
    Asbtract ( 1011 )  
    Related Articles | Metrics
    With the mature of RFID technology, the related products are widely used and the management efficiency is improved. The paper introduces the construction, the design idea, the main models and functions of net check attendance system based on RFID technology and the model.
    Design of Distributed Remote Laboratory for Embedded System Based on Web Services
    YIN Wei-feng
    2010, 1(11):  92-95.  doi:10.3969/j.issn.1006-2475.2010.11.026
    Asbtract ( 1069 )  
    Related Articles | Metrics
    Remote laboratories are becoming widely accepted in universities for providing distance education and for augmenting traditional laboratories.In this paper, a remote laboratory for embedded system is presented, where students at remote sites can perform actual experiments using actual hardware equipment and tools concurrently.A Distributed architecture is presented using Web Services technique to share laboratories resource for multiuser.A integrated learning environment for remote experimentation for embedded system is provided for convenient learning by students self.
    A Distributed Computing Related Works Method Based on Grid
    KANG Wen;LI Yang-ting
    2010, 1(11):  96-99.  doi:10.3969/j.issn.1006-2475.2010.11.027
    Asbtract ( 960 )  
    Related Articles | Metrics
    Through the research of the grid computation in the resources coordination dispatch mechanism, according to this mechanism’s resources coordination assignment demand, this paper proposes a take Globus Toolkit as the platform based on the grid computation distribution coordination computation model. In the scheduling mechanism’s tendering mechanism based on economic model, this paper gives the price function of a more comprehensive model and the corresponding job completion time prediction model, the design cost function model provided by the initiative of resources, makes resource allocation more reasonable and fast. Meanwhile, it also gives a backup job scheduling based on fault-tolerant mechanisms in a distributed computing model.
    Design and Implementation of Speech Communication, Video Conference and〖JZ〗 Video Monitoring Fusion System
    WANG Ling;CHENG Chun-sheng;LIU Zheng;ZOU Ai-guo
    2010, 1(11):  100-102.  doi:10.3969/j.issn.1006-2475.2010.11.028
    Asbtract ( 964 )  
    Related Articles | Metrics
    This article expatiates on the applications of the unified communications technology, the video conference system and video monitoring system in actual application.
    Application of Intelligent DNS on Multi-outlet Campus Network
    ZHAO Tian;HOU Guo-ping;DENG Cheng-jun
    2010, 1(11):  103-105,.  doi:10.3969/j.issn.1006-2475.2010.11.029
    Asbtract ( 1077 )  
    Related Articles | Metrics
    According to the Chongqing electrical power college’s actual situation, this paper puts forward different server IP address methods via intelligent DNS and source requirement address analysis in the multi-outlet network enviornment, thus it accelerates the access speed of the Internet and education network users visiting campus network resources.
    计算机控制
    Design of Micro-printer Interface Circuit Based on 80C196
    LIU Yi-chen;ZHANG Xu-xiang
    2010, 1(11):  106-108,.  doi:10.3969/j.issn.1006-2475.2010.11.030
    Asbtract ( 1812 )  
    Related Articles | Metrics
    The application of single-chip micro-printer is very wide, such as intelligent
    instrument, medical equipment, fire alarm pricing, etc, it almost becomes a standard system configuration.With rich input-output functions of single-chip microcomputer 80C196 and TPμP-T series micro-printer interface of a higher degree of intelligence, based on the analysis of TPμP-T micro-printer control principle,this paper designs a micro-printer interface circuit in which a single-chip microcomputer 80C196 is the control core.This paper mainly introduces the design and implementation of printing function.
    Application Research on Neural Network Predictive Control Based on GGAP-RBF for Supercritical Main Steam
    LI Yun-juan;FANG Yan-jun
    2010, 1(11):  109-113.  doi:10.3969/j.issn.1006-2475.2010.11.031
    Asbtract ( 1802 )  
    Related Articles | Metrics
    This paper presents a RBF(Redial Basis Function) neural network controller on superheat temperature system in supercritical units, a sequential algorithm for RBF networks referred to as the generalized growing and pruning algorithm for RBF (GGAPRBF) is introduced and then uses it in the learning algorithm to realize parsimonious networks. The structure of this controller makes no need to use another neural network for online system identification and determining the structure of neural network controller in advance.The simulation for Super Heat Temperature control system using presented method is take out.The results show that the control system performance is better than the conventional PID control system.
    数据库
    Design and Implementation of Thesis Management System Based on B/S Model
    YUE Fu-qiang
    2010, 1(11):  114-116,.  doi:10.3969/j.issn.1006-2475.2010.11.032
    Asbtract ( 1033 )  
    Related Articles | Metrics
    Based on discussing the requirement of a thesis management system, the paper describes the design, development process and implementation technology of system in detail. It also introduces the application of threetier architecture and Ajax technology of .NET framework in the system implementation. 
    Application of Enterprise Data Integration Based on SOA
    WEI Qiang;ZHANG Guo-xuan
    2010, 1(11):  117-119.  doi:10.3969/j.issn.1006-2475.2010.11.033
    Asbtract ( 1017 )  
    Related Articles | Metrics
    The main realizations of data integration is introduced, for promoting the informatization of Anhui tobacco. The paper proposes a application method of enterprise data integration based on SOA, which realizes the effective integration of data resources.
    Design of CA System Based on PKI Technology
    HE Yao-guang;KANG Wen;ZHAN Xian-xing;WEN Xiao-qun
    2010, 1(11):  120-123,.  doi:10.3969/j.issn.1006-2475.2010.11.034
    Asbtract ( 988 )  
    Related Articles | Metrics
    This paper demonstrates the CA system based on PKI technology which is the best choice for solving the problem of information safety in network, a system is design through analyzing the basic principles of PKI technology and the functions of CA system based on PKI technology. The paper gives a total structure of CA system and prototype project of CA system based on PKI technology combining with our country management style and application need.
    Multi-dimensional Analysis of Library Loans of College Staff Based on Data Warehouse
    LIU Lin
    2010, 1(11):  124-126.  doi:10.3969/j.issn.1006-2475.2010.11.035
    Asbtract ( 942 )  
    Related Articles | Metrics
    This paper introduces the process of constructing data warehouse of college library loans, builds multi-dimensional data set of library loans, uses OLAP data analysis approach to analyse stuff library loans, and analyses and explains the result carefully. Also this paper points out that college teachers are supposed to enhance their ability to meet the requirement of development.
    信息安全
    Research on a RBAC-based User-to-user Delegation Model
    HUANG Ye;WANG Han-hu
    2010, 1(11):  127-131,.  doi:10.3969/j.issn.1006-2475.2010.11.036
    Asbtract ( 669 )  
    Related Articles | Metrics
    With the rapid development of information and technology, the security of information is becoming a hot field of research. As a solution of security, the model of RBAC is widely used. The article firstly discusses the model of RBAC, and points out the shortcoming of this model. And then, the paper proposes a delegation model between users. At last, it shows the direction of research about this model.
    Research and Application of VPN Information Security Experiment
    LONG Qiao-ling;PANG Zhi-yun
    2010, 1(11):  132-135.  doi:10.3969/j.issn.1006-2475.2010.11.037
    Asbtract ( 1839 )  
    Related Articles | Metrics
    Practical experiment has an important assistant effect on theory teaching. It is necessary to study thoroughly methods of practical experiment because information security is a new specialty. Considering sharing with basic specialty experiment equipment for fee is restricted, it is difficult to ensure experiment having scientific, advanced and practicable in network laboratory. In this paper, how to develop VPN experiment in basic network laboratory is introduced. Students of security specialty should do VPN experiment as VPN is a typical security technique which can ensure data transmission security by Internet.
    Fuzzy Risk Assessment of Information Security Based on WOWA
    WU Ye-ke;SONG Ru-shun;CHEN Bo
    2010, 1(11):  136-138,.  doi:10.3969/j.issn.1006-2475.2010.11.038
    Asbtract ( 1106 )  
    Related Articles | Metrics
    Starting with the theory and research of information security risk assessment, combining with Weighted Ordered Weighted Averaging aggregation (WOWA) and fuzzy analytic hierarchy process approach and a information security risk fuzzy assessment method based on WOWA is proposed. The study of the case shows that this method can be used very well to information security risk assessment.
    Workflow Access Control Model Based on Task and Role
    ZHA Zong-xun;WANG Ming-yan
    2010, 1(11):  139-141,.  doi:10.3969/j.issn.1006-2475.2010.11.039
    Asbtract ( 1721 )  
    Related Articles | Metrics
    This paper proposes a role and task based workflow access control model, describes the relationship both the key elements of the model, static and dynamic constraints. And then an intuitive formal language called ERCL is proposed, which takes the model as context to specify workflow authorization constraints based on role and task. ERCL uses system functions, sets and variable symbols as its basic elements. Finally, gives a application of the model in a workflow system.
    应用与开发
    Design and Construction of Decision Support System of Financial Security During War
    LIANG Chuan;LIU Ting-long;DA Bo;LI Hong
    2010, 1(11):  142-145.  doi:10.3969/j.issn.1006-2475.2010.11.040
    Asbtract ( 1115 )  
    Related Articles | Metrics
    With the implementation of diversified military tasks, the financial security of the geographical and spatial dependence has been increased, therefore it needs to rely on a digital map of the financial security management decision support system. Using GIS and combined with GDI+ graphics technology, the system achieves universal and regional financial standard query, plotting aid financial security, support entities and elements of statistical analysis and financial security funds calculation, which greatly improves the diversification of financial security forces under the military mission accuracy and availability of funds, provides decision support aid for the head of agencies.
    Application of ObjectARX Technology in 3D Surficial Modeling
    ZHANG Jie
    2010, 1(11):  146-148.  doi:10.3969/j.issn.1006-2475.2010.11.041
    Asbtract ( 1000 )  
    Related Articles | Metrics
    This paper introduces the constitutes of AutoCAD graphics database, and gives an implement method of extracting data from AutoCAD graphics by using ObjectARX. It has achieved good results to apply the method to extracting the data of topographic contours and geological borderlines used in threedimensional surficial modeling. It proposes a fast way for the data extraction of three-dimensional surficial modeling.
    Knowledge Discovery Method in Training Planning System Based on Rough Set
    MENG Xiao-jing
    2010, 1(11):  149-151,.  doi:10.3969/j.issn.1006-2475.2010.11.042
    Asbtract ( 1684 )  
    Related Articles | Metrics
    In using the intelligent training planning system, the historical data in the system database will be increased day by day. Whether people can make use of these valuable data and discover some implicit knowledge of training methods, to better assist the user to complete the training plan, which has become a concern. Based on roughset theory, how to process the historical data is explained, and a knowledge discovery method for the historical data is presented. Finally, it gives a example to illustrate the knowledge discovered by this method has great practical significance.
    Implementation of Similar MVC Program Frame Based on COM/DCOM
    FANG Wei-qing
    2010, 1(11):  152-155.  doi:10.3969/j.issn.1006-2475.2010.11.043
    Asbtract ( 1033 )  
    Related Articles | Metrics
    Based on network client/server program pattern, the program lack of flexibility and scalability under traditional design pattern. By designing a pattern similar to MVC based on COM/DCOM, it can make the system have fine structure, increasing flexibility and scalability, and improve programming efficiency. This paper uses Delphi RAD tool to implement a similar MVC 3-tires program frame combining with COM/DCOM component. 
    Tacit Knowledge Management in Technical Group for Complicated Task
    YANG Bin;JI Ya-lin;MENG Yan
    2010, 1(11):  156-158,.  doi:10.3969/j.issn.1006-2475.2010.11.044
    Asbtract ( 1622 )  
    Related Articles | Metrics
    Many technical group’s task will be affected by terrain, weather or technician and equipments changing. KM in group is hard to deal with special circs and tacit knowledge management suffocate especially. Quantizing non-structure document of tacit knowledge can redound to management and decision-making.
    Modules Development Based on Axis2 Architecture
    WU Zhi-jun;YAO Jian
    2010, 1(11):  159-161.  doi:10.3969/j.issn.1006-2475.2010.11.045
    Asbtract ( 1008 )  
    Related Articles | Metrics
    Axis2 is the next generation of Apache Axis1.x,it’s a much more flexible and extensible new architecture. The motivation of Axis2 is searching for a more modular, flexible and efficient architecture that can easily be plugged into the implementation of other associated Web services standards and protocols.
    A New Method for Chinese New Word Identification Based on Inner Pattern of Word
    LIN Zi-fang;JIANG Xiu-feng
    2010, 1(11):  162-164,.  doi:10.3969/j.issn.1006-2475.2010.11.046
    Asbtract ( 1750 )  
    Related Articles | Metrics
    As to new word identification problem, this paper proposes a new method for Chinese new word identification based on the inner pattern of word. After repeat finding based on suffix arrays and longest common preffix, it propses the weighting of the improved PWP and inside word probabilities in view of the inner pattern of word. At the meanwhile, the paper uses AV and MI statistics to identify Chinese new words. By comparison, find that this method is effective in recognition of Chinese new words.
    Analysis and Research on Data Paging Technology Based on ASP.NET
    ZHANG Hong
    2010, 1(11):  165-167.  doi:10.3969/j.issn.1006-2475.2010.11.047
    Asbtract ( 1018 )  
    Related Articles | Metrics
    Data paging is a technique that often used in ASP.NET dynamic data Web page design. Performance is different in different of data paging. Based on the analysis of a variety of paging technology, gives their characteristics in detail, applies to the rational use of the environment.
    Intelligent Transport Cloud: ITS Based on Cloud Computing
    QIAN Shao;ZHANG Yun-peng;HUANG Shao-bo
    2010, 1(11):  168-171.  doi:10.3969/j.issn.1006-2475.2010.11.048
    Asbtract ( 1889 )  
    Related Articles | Metrics
    Based on cloud computing and Intelligent Transport Systems (ITS), this paper proposes a concept of “Intelligent Transport Cloud”. Intelligent Transport Cloud not only makes ITS avoid the investment of computer hardware and software, but also makes construction of ITS changed. The traditional construction mode that sources of information are determined to the system service purposes to change the services which are innovated from the information resources expanded. Intelligent transport cloud is a open, scalable, and innovative (dynamic evolution) system.
    Design and Implementation of Medical Instruments Registration Assistant Website
    KONG Xiang-yong;GU Wen-jun
    2010, 1(11):  172-175.  doi:10.3969/j.issn.1006-2475.2010.11.049
    Asbtract ( 1711 )  
    Related Articles | Metrics
    Along with the rapidly development of medical apparatus and instruments, such as Nanomedical device and lasertype medical equipment, it is difficult to deal with the diversity of various medical apparatus and instruments. This article aims to introduce the selfregistrationweb, named as medical instruments registration assistant website, based on the development of Asp.Net and Access. The Website help to provide every device testing standard for the company via comparing the data supplied by the user with the recording database, and provides professional suggestion of the questions leaved by merchant online, makes it easy to get through the exam, accelerates the speed of the appearance on market of the product.
    Analysis and Realization of Redevelopment for IC Card Reader Based on VC 6.0
    ZHOU Zhen
    2010, 1(11):  176-179.  doi:10.3969/j.issn.1006-2475.2010.11.050
    Asbtract ( 1902 )  
    Related Articles | Metrics
    Using the IC card reader of Shenzhen Kington technology Co., Ltd., combining the design and realization of MIS, the key points in redevelopment for IC card reader in VC6.0 environment are illuminated in detail.
    Research and Implementation of Ambiguous Path Indentification Based on RFID Dual Frequency Card
    HU Yao-min;
    2010, 1(11):  180-183.  doi:10.3969/j.issn.1006-2475.2010.11.051
    Asbtract ( 995 )  
    Related Articles | Metrics
    There is ambiguous path between the start point and end point in highway network, which leads to highway’s complex and inaccurate toll separation. How to indentify ambiguous paths is related to whether networking tolling is able to implement largescale. In this paper, ambiguous path indentification method based on dual frequency card is provided, which can solve all the problems such as vehicle toll collection, separation and settlement of highway, on condition that unchange the software and hardware of lane in highway tolling station. 
    Fault Diagnosis Expert System for Aerial Electronic Instruments Based on Knowledge
    ZHANG Su-qin;WANG Zhen-xing;WU Chun-lin;XUE Qing-zeng
    2010, 1(11):  188-190.  doi:10.3969/j.issn.1006-2475.2010.11.053
    Asbtract ( 1108 )  
    Related Articles | Metrics
    In order to solve the problem of aerial electronic instruments which is complicated, a fault diagnosis expert system for aerial electronic instruments is designed based on knowledge.It can implement fault reasoning and diagnosis by knowledge expressing mode,uncertainty reasoning method based on certainty theory model which supports the mode, and reasoning method based on demonstration, and the reliability of the rule can achieve an ideal degree.