Loading...

Table of Content

    21 October 2010, Volume 1 Issue 10
    人工智能
    Rule-based Fault Diagnosis Expert System
    WANG Hao
    2010, 1(10):  1-3,7.  doi:10.3969/j.issn.1006-2475.2010.10.001
    Asbtract ( 936 )  
    Related Articles | Metrics
    According to the existing development methods and experience of fault diagnosis expert system, this system uses rule-based knowledge representation and reasoning mechanisms. It's specified to the specific CNC roll grinder features. Kinds of diagnosis information of numerical control machine are stored in factbase and knowledge database. Decision tree is used to simulate the reasoning process. This rule-based fault diagnosis expert system of numerical control machine can make the correct diagnosis of most common faults.
    Research on Task Allocation and Scheduling in Grid Based on Genetic Algorithm
    YE Jing;XIE Li-cong
    2010, 1(10):  4-7.  doi:10.3969/j.issn.1006-2475.2010.10.002
    Asbtract ( 943 )  
    Related Articles | Metrics
    Reasonable resource scheduling can greatly improve the utilization of the grid. Genetic algorithm (GA) for powerful and implicit parallel space search capability is widely used to solve task allocation and scheduling problems. Based on the research on existing scheduling algorithms, this paper describes the adaptive selection probability combined with niche technology, PCC(parents and children competition) crossover operator, insert mutation operator and elitist strategy to improve GA , it keeps the population's convergence and increases the efficiency of local and global search capability. Simulation results show that this algorithm is more effective for the allocation of resources compared with other algorithm, it can be successfully applied to independent task allocation and scheduling in grid.
    Research on Words Semantic Knowledge Base Construction Framework Based on Internet
    LIU Xing-lin;CHEN Jian-chao;MA Qian-li
    2010, 1(10):  8-11.  doi:10.3969/j.issn.1006-2475.2010.10.003
    Asbtract ( 909 )  
    Related Articles | Metrics
    Internet has become the world’s largest repository of knowledge, but it’s very difficult to acquire useful knowledge from Internet. This paper brings forward one words semantic knowledge base construction framework based on Internet, it includes three modules: Web pages text automatic acquisition, knowledge acquisition and knowledge application. In this framework, people can acquire vast Web pages text on line, extract Chinese combined-word and POS tagging to it, acquire set of synonyms and semantic relation between words, then actualize semantic computation. The construction of words semantic knowledge base will afford foundation for the application of knowledge.
    Multi-parent Crossover Genetic Algorithm and Its Application in Traveling Salesman Problem
    ZHANG Min-qiang
    2010, 1(10):  12-15,1.  doi:10.3969/j.issn.1006-2475.2010.10.004
    Asbtract ( 910 )  
    Related Articles | Metrics
    In order to overcome premature convergence of traditional genetic algorithm (TGA), a multi-parent crossover GA (MPCGA) is proposed. Compared with greedy crossover, the proposed crossover can not only preserve the useful information of parent, but also maintain the diversity of population. In addition, the novel algorithm can also balance the trade-off between the exploitation and the exploration. Simulation results on traveling salesman problem (TSP) show the effectiveness and robustness of the novel multi-parent crossover GA.
    Research on Antinoise Methods of Text-independent Speaker Recognition System
    YE Lei;FANG Peng
    2010, 1(10):  16-19.  doi:10.3969/j.issn.1006-2475.2010.10.005
    Asbtract ( 841 )  
    Related Articles | Metrics
    The text-independent speaker recognition system based on Mel cepstral coefficients and GMM is discussed. In order to improve the recognition accuracy in noisy circumstance, antinoise methods are proposed in two aspects, one is based on speech recognition which changes text-independent system to text-dependent system, the other is based on frame selection method which has better robustness to make speaker recognition. The improvement effects to speaker recognition system of the two methods are analyzed, and it is proved by experiments that the recognition accuracy is enhanced in noisy circumstance by the methods given.
    Parameter Iteratively Modified-KNN
    XU Chao-yang
    2010, 1(10):  20-22,4.  doi:10.3969/j.issn.1006-2475.2010.10.006
    Asbtract ( 904 )  
    Related Articles | Metrics
    With the development of World Wide Web, text classification has become a key technology in organizing and processing large amount of document data. It’s a simple, effective and nonparametric classification method. This paper proposes an algorithm PIM-KNN(Parameter Iteratively Modified-KNN) to adjust parameter in classifier according to results of close test of the KNN algorithm: the sample of wrong judged should reduce the distance between itself and the class which it belongs to, enlarge the distance between itself and the class which wrong judged. The experiments results show that the classification results can be improved significantly by adjusting parameter of the PIM-KNN.
    Design and Implementation of Job Scheduling Algorithm for Multi-User MapReduce Clusters
    WANG Kai;WU Quan-yuan;YANG Shu-qiang
    2010, 1(10):  23-28.  doi:10.3969/j.issn.1006-2475.2010.10.007
    Asbtract ( 1714 )  
    Related Articles | Metrics
    As more enterprises start to use data-intensive cluster computing systems such as Hadoop and Dryad for more applications, sharing MapReduce clusters among multiple users that reducing the cost of establishing an independent cluster and the demand of sharing common data sets resources for users is increasing. Based on fair scheduling algorithm, combining with slot allocation delay and priority technology, the paper proposes an improved algorithm. It can achieve better data locality, improve the performance of the system, such as throughput, response time. To meet the differentiated business services, it sets the appropriate for users to ensure special tasks.
    Multi-objective Fuzzy Flexible Job-shop Scheduling Based on Variable Constraints
    LU Hui;JIANG Fang
    2010, 1(10):  29-33.  doi:10.3969/j.issn.1006-2475.2010.10.008
    Asbtract ( 851 )  
    Related Articles | Metrics
    In actual workshop processing, six factors should be taken into consideration: (1)submit time of work pieces; (2)adjusting time of machine between different processes and corresponding static expense; (3)processing time of machine and corresponding dynamical expense; (4)raw material cost; (5)due dates which obey time window distribution; (6)alternative machine which is available for specific processes. For this type workshop scheduling, aiming at maximizing minimum customer satisfaction and minimizing sum of raw material, static and dynamic cost, a two-objective fuzzy workshop scheduling model with alternative machines is proposed and the evolutionary algorithm based on improved coding and elite reserved strategy is presented. Meanwhile, the rationality of the algorithm solution is briefly analyzed; and an example is employed to verify the effectiveness of the algorithm, which is providing an approach for fuzzy workshop scheduling of multiple objects and multiple constraints.
    Forecasting of Jiangsu Inbound Tourism Demand Based on Composite Pattern
    SU Zhi-ping
    2010, 1(10):  34-37.  doi:10.3969/j.issn.1006-2475.2010.10.009
    Asbtract ( 906 )  
    Related Articles | Metrics
    Inbound tourism is the key factors of development to tourism industry. It is very important and necessary to improve reception efficiency and level of tourist destination that achieve a period of the tourist reception information by forecasting inbound tourism demand. The paper forecasts the inbound tourism demand of Jiangsu province by applying ARIMA model and BP neural network model to supply policy reference and data support for implementing the tourism development strategies of Jiangsu province. The results indicate that the forecast results are good.
    软件工程
    Design and Implementation of Process Monitoring System in Windows
    HUANG Jing-bin;PENG Xin-yi;HUANG Zhi-wei
    2010, 1(10):  38-42.  doi:10.3969/j.issn.1006-2475.2010.10.010
    Asbtract ( 946 )  
    Related Articles | Metrics
    This paper mainly proposes an improved design of process monitoring system and describes methods of their realization, by analyzing the existing process monitoring software in Windows, then focusing on the shortcomings such as information of process is not enough in-depth or comprehensive, information classification is not clear. The system in the design is based on Microsoft Visual Studio 2005 platform, using MFC development. The system calls the Windows operating system ToolHelp32 library and PSAPI library for more detailed process information, and then classifies them to the "basic data", "time resources", "space resources" and "load module", finally uses the data tables, graphs, histograms and other means to demonstrate the results of monitoring. The design not only improves the user experience, but also provides the basis for the effective management of computer.
    Research on Mixed Programming Method of C Language and Assemble Language Based on Keil51
    ZHANG Zhi-ke;WANG Zhen-xi
    2010, 1(10):  43-46,4.  doi:10.3969/j.issn.1006-2475.2010.10.011
    Asbtract ( 904 )  
    Related Articles | Metrics
    This paper analyzes the basic method of mixed programming of C language and assemble language based on Keil51, gives the specific steps of each method. In the application practice, for giving full play to the advantages of both languages and improving the executed efficiency of programs, it can select the appropriate programming scheme according to the special issue. So it can achieve the goal of shortening the process of programming.
    A New Sorting Algorithm Based on Hash Function
    WANG Qiu-fen;SHAO Yan-ling
    2010, 1(10):  47-49.  doi:10.3969/j.issn.1006-2475.2010.10.012
    Asbtract ( 1493 )  
    Related Articles | Metrics
    The paper brings forward a new sorting algorithm based on Hash function. According to the characteristic of the array subscript progressive increase, it establishes effective Hash function by grading to random distributed integers, and completes sorting by mapping repeatedly. Time and space complexity is analyzed, and algorithm’s efficiency is verified by experiments. Algorithm analysis and experimental results show that the algorithm’s time and space complexity is O(n). It improves obviously algorithm’s efficiency when the scale of the problem is large.
    Research on Instrumentation Technology of CodeTEST Under ADS Development Environment
    WANG Hui;ZHU Xiao-dong;WANG Yi-gang
    2010, 1(10):  50-53.  doi:10.3969/j.issn.1006-2475.2010.10.013
    Asbtract ( 927 )  
    Related Articles | Metrics
    In the tools chain development environment, the embedded software testing tool of CodeTEST could use Makefile to instrumentation source file automatically. This paper uses the instrumentation of CodeTEST more flexible, and implements the automatic instrumentation in project of ADS, for achieve to more extensive testing environment of CodeTEST.
    Analysis & Consideration of MVC Design Model Based on J2EE
    TIAN Juan;XU Zhao
    2010, 1(10):  54-58.  doi:10.3969/j.issn.1006-2475.2010.10.014
    Asbtract ( 1110 )  
    Related Articles | Metrics
    MVC design model is a popular type and widely applied in the program development in enterprises. This article analyzes and discusses the oriented-object MVC design model which is also introduced in the application development. Through the study of MVC design modal, its fundamental theory and operation mechanism are analyzed to realize the development of Web application program based on J2EE platform in applicable situations.
    Research on Reuse of HLA Federates Framework Code Based on Web Service
    CAO Peng-fei;YAO Shi-jun
    2010, 1(10):  59-62.  doi:10.3969/j.issn.1006-2475.2010.10.015
    Asbtract ( 927 )  
    Related Articles | Metrics
    The article proposes a method to develop HLA federates frame code based on Web service, which less need to consider the details of RTI and its bottom interface during simulation system development. In addition, there is a design of federates skeleton code generating utilities, by which the transformation from function call to service call can be easily made for interoperability. Neither do the federates developer have to take the differences of operating platform and developing environment into account when reusing the simulation resource while they are able to better realize the inter-operation among simulation application, and also realize cross platform resource sharing and interoperability and release the standardized interface to Internet.
    Design and Implementation of Visual Compiler
    JIANG Xiu-feng;REN Zhi-xiong
    2010, 1(10):  63-67,7.  doi:10.3969/j.issn.1006-2475.2010.10.016
    Asbtract ( 956 )  
    Related Articles | Metrics
    This paper shows how to implement a compiler’s front end through an actual visual compiler. It’s a visual program contenting C subset and easy to operate. This compiler contents lexical analyzer, syntax analyzer, semantic analyzer, intermediate code generator, and a simple error recovery. Through this project, this paper intuitively shows lexical and syntax's construct processing, and describes lexical and syntax’s function and construct processing.
    图像处理
    Method of Human Faces Synthesis for Virtual Display
    WANG Chang-bo;WANG Long
    2010, 1(10):  68-71.  doi:10.3969/j.issn.1006-2475.2010.10.017
    Asbtract ( 914 )  
    Related Articles | Metrics
    The synthesis of human face is difficult for real-time interaction application, because it is affected by the light, background, gesture of head, etc. In order to generate the synthesis image of human face for virtual display, a quick sample-based learning method is proposed to detect human face from camera image before the display desk, then through the parameterized model of human face samples, certain feature points on human faces are tracked. Finally the synthesis images of perfect faces for different human faces are generated in real time, which is successfully used in virtual display of science and technology museum.
    Application Research on Segmentation Algorithm for Sun-image Based on Iteration Threshold
    DENG Lin-hua;XU Jun;CHENG Xiang-ming;
    2010, 1(10):  72-74.  doi:10.3969/j.issn.1006-2475.2010.10.018
    Asbtract ( 1541 )  
    Related Articles | Metrics
    In the electric-control system of one-meter infrared solar telescope, the sun-image segmentation is the foundation of the follow-up operation, such as centroid detection, etc. The accuracy of segmentation is very important to the tracking control of telescope. The basic principle of thresholding methods and typical threshold selecting methods are introduced, the sun-image segmentation is implemented by iteration threshold method. The experimental result shows that iteration threshold has some advantages compared with typical methods in image processing time and threshold selection accuracy, meets the requirement of control system and achieves the intended purpose.
    Research on Improving Stability of SUSAN Corner Detection Algorithm
    HOU Ming-liang
    2010, 1(10):  75-77,8.  doi:10.3969/j.issn.1006-2475.2010.10.019
    Asbtract ( 948 )  
    Related Articles | Metrics
    Smallest univalue segment assimilating nucleus (SUSAN) is one of the most excellent methods which are robust to noise and less affected by rotation. However, it could not detect all the true corners and generate some false corners in some special case. To solve these problems, an improved SUSAN corner detector is proposed and its performance is compared with SUSAN corner detection. With the improved SUSAN, a corner point is judged based on gray level values of the pixels in a circular neighborhood of the nucleus which is the same as the conventional SUSAN, however, the improved SUSAN calculates the number of the pixels in the univalue adjoining nucleus and connected segment rather than calculate the number of the pixels of univalue nucleus in the neighborhood. Due to this improvement, the improved SUSAN can not only inherit the main merits but also avoid the fatal fault of conventional SUSAN. Experimental results demonstrate that the improved SUSAN corner detection is accurate and efficient.
    Simulation of Desert Plants Based on L-Studio
    HUANG Ting;SU Xin-xin
    2010, 1(10):  78-80.  doi:10.3969/j.issn.1006-2475.2010.10.020
    Asbtract ( 1354 )  
    Related Articles | Metrics
    Simulation of the plants which using the theory of computer graphics is the most challenging subject. The branches, leaves of the desert plants and their distribution area can be modeled by computer, based on which the plants' electromagnetic scattering characteristic could be calculated. This paper introduces L-Studio software from Canada which based on Windows system, then a visual model of desert plants is produced by this software, its result could be used in environmental and military fields.
    Solution of Reducing False-positive Rate in Medical CAD Systems
    ZHONG Ming-xia
    2010, 1(10):  81-82.  doi:10.3969/j.issn.1006-2475.2010.10.021
    Asbtract ( 1663 )  
    Related Articles | Metrics
    Many scholars are keen to study how to raise the sensitivity of breast cancer computer-aided diagnosis system (CAD), especially the images for Asian women and young women with dense tissue. A solution of the images is proposed before and the experiment also shows that the method can improve the system sensitivity (true positive rate TP), but people found that the increase in TP is also accompanied by a false-positive rate (FP) of the growth. Therefore, this article aims to continue research on the basis of the former, namely, to ensure the sensitivity of CAD systems while reducing the false positive rate as much as possible.
    信息系统
    Design and Implementation of College Integrated Service Warning System Based on .NET
    LU Qing-wu
    2010, 1(10):  83-86.  doi:10.3969/j.issn.1006-2475.2010.10.022
    Asbtract ( 1648 )  
    Related Articles | Metrics
    It introduces how to merge all the warning systems of college and how to set up a set of warning process and develop integrated service warning system based on the network, as it integrates human-working, Web, IM, message service. The warning system can warn on line, automatically distribute, settle, record the result and decision analysis. Therefore, it can save the sources and improve the efficiency, management and service.
    Design of Medical Imaging Workstation Based on DCMTK
    KONG Xiang-yong;SONG Jian;GU Wen-jun
    2010, 1(10):  87-91,9.  doi:10.3969/j.issn.1006-2475.2010.10.023
    Asbtract ( 971 )  
    Related Articles | Metrics
    With the development of visualization technology, modern medicine has become increasingly inseparable from the medical image information. The medical imaging workstation as an important subsystem of PACS system breakthroughs in recent years, the development and extensive application to imaging diagnosis of activities from the past experience led gradually to a more scientific and precise changes in the digital mode. In this study, VC++ and DCMTK3.5.4 is used to develop image workstation based on DICOM3.0. The paper introduces that DCMTK download, compile, call the static library method and system for the functional design and preparation process. System can achieve the display of DICOM image files, editing, transmission, storage, graphic report editing, and common image format conversion, and support for C-STORE, C-MOVE, C-GET, C-FIND and other services.
    P2SP Technology-based Digital Library’s Prototype
    CHEN Yong-xuan;
    2010, 1(10):  92-95.  doi:10.3969/j.issn.1006-2475.2010.10.024
    Asbtract ( 891 )  
    Related Articles | Metrics
    This paper introduces briefly the current development of digital library and the development of P2SP technology in digital libraries at home and abroad. Also, the paper analyzes the features of P2SP technology and puts forward the P2SP technology-based digital library’s prototype on the basis of the analysis.
    Material Online Monitoring System and Improvement of Client Program
    HUANG Zheng-hong
    2010, 1(10):  96-98.  doi:10.3969/j.issn.1006-2475.2010.10.025
    Asbtract ( 847 )  
    Related Articles | Metrics
    This paper introduces the principle, composition and function of materials online monitoring system in Zigong Honghe Chemical Co., Ltd., and improves client program to solve the problem of complicated setup and run instability.
    Design and Application of Gain Algorithm of RFID in Resource Management System
    LIU Yan-ning;PAN Yun-yun
    2010, 1(10):  99-101.  doi:10.3969/j.issn.1006-2475.2010.10.026
    Asbtract ( 865 )  
    Related Articles | Metrics
    At present, most RFID readers only read and write a general range, rather than an accurate distance reading and writing. This makes the application unable to determine the correct application of scenarios, and when found that the distance can not meet the requirements to read and write, you must manually change to the application of this inconvenience. To solve this problem, the paper presents an optimized strategy, namely that the RFID-based auto-loop gain adjustment algorithm is applied to RFID-based transportation management systems of the ore shipped in the automatic recognition of vehicle segments.
    Design and Realization of Digital Information Management Freedom Report Forms System
    JIN Chao-bo;FAN Pei-qin
    2010, 1(10):  102-105,.  doi:10.3969/j.issn.1006-2475.2010.10.027
    Asbtract ( 1714 )  
    Related Articles | Metrics
    This paper introduces the design and realization of a digital information management freedom report forms system. This system uses maturely application software design technology and software development platform, provides a report forms secondary development platform. Using this platform can maintenance independency digital dictionary, view, report forms molding board and design general, freedom report forms. This system can insert into digital information management system or independency. This system can sufficiently enhance system performance.
    Design of Digital Image Management System for Flight Coupon
    YU Gang
    2010, 1(10):  106-108,.  doi:10.3969/j.issn.1006-2475.2010.10.028
    Asbtract ( 1539 )  
    Related Articles | Metrics
    This paper discusses a new model and purport of digital image management system for flight coupon, including system main functions and technical performance indicators, system design and architecture, key technologies, etc.
    Design of Vehicles Command and Monitoring System for Electric Power Emergency Service
    ZHANG Jun-min
    2010, 1(10):  109-112.  doi:10.3969/j.issn.1006-2475.2010.10.029
    Asbtract ( 891 )  
    Related Articles | Metrics
    Establishing a sound and effective mechanism for electrical safety emergency response is very important. This article describes the design of a vehicles command and monitoring system for electric power emergency service, including system design goals, system design and software design.
    Design and Implementation for Automatic System of Electric Calculating Rate Based on CAN
    HUANG Wen-lang
    2010, 1(10):  113-115.  doi:10.3969/j.issn.1006-2475.2010.10.030
    Asbtract ( 862 )  
    Related Articles | Metrics
    This thesis introduces the designing scheme of automatic system of electric power measure and calculating rate using CAN network techniques, gathering techniques, CAN repeaters and MCU techniques. Then it designs hardware circuit of CAN repeaters and CAN intelligent node, provides a vigorous tool and technique means for efficient management of electric power department.
    网络与通信
    Development of Navigation Software System for Blind on Windows Mobile Platform
    XU Zhu-bao;XU Yong;YANG Jun
    2010, 1(10):  116-119,.  doi:10.3969/j.issn.1006-2475.2010.10.031
    Asbtract ( 1853 )  
    Related Articles | Metrics
    Traditional navigation products are designed for the visually normal people, the use of the blind community has been limited. By the integration of Global Positioning System with Geographic Information Systems (GIS), a navigation software system specially designed for the blind is developed on the smart phone platform that running Windows Mobile system. This paper works out a navigation strategy special for the blind users by providing the custom-built map data and an optimized Dijkstra shortest routing algorithm. The software has the functions of route customization, location sharing and peripheral searching for the blind users. And the users can interact with the system by means of voice and buttons.
    Research and Realization of SIP Server and Embedded Terminal Based on VoIP
    YANG Zhao;QIN Ya-juan;
    2010, 1(10):  120-124.  doi:10.3969/j.issn.1006-2475.2010.10.032
    Asbtract ( 911 )  
    Related Articles | Metrics
    As the fast development and popularity of IP network, voice technology based on IP has been widely applied. The VoIP communication system and its critical technologies are analyzed firstly. SIP server and embedded terminal based on ARM10 of SIP are realized. Then the structure of system and realization of hardware and software are discussed. Finally, the integral performance of the system is analyzed.
    An Improved Bayesian Mail Filtering Algorithm
    XIA Chao;XU De-hua
    2010, 1(10):  125-128,.  doi:10.3969/j.issn.1006-2475.2010.10.033
    Asbtract ( 911 )  
    Related Articles | Metrics
    Bayesian filtering algorithm is one of most widely used methods of anti-spam filtering technology. Taking into account the fact that the wrong classification of the mail causes different losses to recipients, so introducing a message that if judging as a spam mail is λ times that of judging as a normal mail, it can conclude that this is a spam mail. Meanwhile, in order to improve the quality of classification, the paper uses genetic algorithm to distinguish between tokens in the body and tokens in the subject. Finally, using the sample to validate the improved algorithm, the result shows that using new algorithm can improve the quality of the message classification.
    Research on Two Exit Campus Network Routing Control Technology
    SONG Hai-jun;ZHOU Tong
    2010, 1(10):  129-132.  doi:10.3969/j.issn.1006-2475.2010.10.034
    Asbtract ( 1690 )  
    Related Articles | Metrics
    Now many university campus networks have two or more exports such as Cernet and ChinaNet. It results in the situation of multi-export route accessing the Internet. This connection greatly increases the access speed of different network resources, but as part of dissymmetries of access path, it results in some problems, such as the E-mail is rejected to accept in case of sending or receiving E-mail. By analyzing and researching the method to control the access path, using the methods of source address-based policy routing and creating the extended NAT address mapping, configuring the router reasonably, the goal of solving these problems can be attained.
    Simulation and Analysis of Transmission Efficiency in Wireless Network Based on 802.11e EDCA
    DENG Hong-wei;LI Lang;JIANG Han-yang;ZOU Chao-jun;WANG Xiang-wen
    2010, 1(10):  133-135.  doi:10.3969/j.issn.1006-2475.2010.10.035
    Asbtract ( 921 )  
    Related Articles | Metrics
    The paper discusses the difference between 802.11 DCF and 802.11e EDCA which is analyzed theoretically firstly, then the NS2 network simulation software is used to simulate the performance in different network with video, FTP and exponential traffic stream to prove that the EDCA can support QoS and improve transmission efficiency of the wireless network.
    Design and Implementation of Web Browser Based on Qt/Embedded
    SONG Jie;CAO Zhu-dong;WANG Shu-ju;TAN Lin-xin
    2010, 1(10):  136-138.  doi:10.3969/j.issn.1006-2475.2010.10.036
    Asbtract ( 1026 )  
    Related Articles | Metrics
    This paper introduces the design and implementation of Web browser based on Qt/Embedded. It first introduces the development of embedded Linux GUI overview, and it also briefly describes building of the Qt/Embedded platform. Then it introduces that focusing on the embedded Web browser design principles and Qt/Embedded in Web browser development process.
    Algorithm Optimization of P2P Streaming Media Based on Gossip Protocol
    YUAN Xue-ping;ZHOU Fang;CHEN Lu
    2010, 1(10):  139-141.  doi:10.3969/j.issn.1006-2475.2010.10.037
    Asbtract ( 938 )  
    Related Articles | Metrics
    Through analysis of representative Gossip protocol used in P2P streaming system, for its ignorance of its nodes and heterogeneous network of dynamic factors, this paper puts forward dynamic adaptive Gossip protocol which sorts the nodes through their ability, and fully takes advantages of the strong nodes. This protocol has a good feasibility and can reflect the dynamic of the nodes and resources in P2P network, to some extend, it can improve the efficiency of the overall system.
    Reconstruction of Sparse Signal
    LIU Hong-jiang
    2010, 1(10):  142-146.  doi:10.3969/j.issn.1006-2475.2010.10.038
    Asbtract ( 1552 )  
    Related Articles | Metrics
    The traditional sampling method records the level of signal at the pre-determined time. Therefore the levels sampled are often uniformed. There is another sampling model-implicit sampling, it records the timing of level-crossings which are determined before sampling. Under this situation, the signal determines the times but not level of sampling. In the condition that one scalar factor exists, Logan theorem provides enough conditions for signal reconstruction from zero crossings. Since there are some noises in the measurement of timing, the reconstruction usually is not robust. So this paper introduces additional condition: there are some sparse bases in the signal so that it makes reconstruction robust. Under this assumption, it can regard the reconstruction as minimization of sparsity inducing cost function and provide an algorithm. Although the problem is not convex, the experiments show in the classic cases the algorithm is converged and gives a correct solution with high probability.
    Gateway Architecture and Implementation Based on Multi-ISP Access
    WU Xu-jun
    2010, 1(10):  147-149.  doi:10.3969/j.issn.1006-2475.2010.10.039
    Asbtract ( 909 )  
    Related Articles | Metrics
    Based on the study of the multi-ISP access gateway architecture in the campus network construction, application of multiple routing protocols, QoS strategy, intelligent DNS and NAT technology, the paper explores the feasibility of achieving a reasonable distribution of access bandwidth, making full use of multiple Internet links, reducing network usage costs, breaking through the speed constraints existing in network interconnection between ISP operators, improving the internal site of external service quality, and enhancing network security.
    LDAP Content Synchronization
    ZONG Shi-qiang;LIN Jian-ning;ZHU Shuang-hua
    2010, 1(10):  150-153.  doi:10.3969/j.issn.1006-2475.2010.10.040
    Asbtract ( 904 )  
    Related Articles | Metrics
    Based on the introduction to the directory service, this paper deals with the relationship of the LDAP and the X.500 protocol, discusses the LDAP content synchronization operation, and analyzes the five modes of content synchronization replication in OpenLDAP which can be used in various scenarios where the content synchronization replication is needed.
    Design of Computer Network Access Management Information System
    WU Hai-guang
    2010, 1(10):  154-157.  doi:10.3969/j.issn.1006-2475.2010.10.041
    Asbtract ( 841 )  
    Related Articles | Metrics
    Based on the theory of information system development, this paper discusses the issue that how to design a computer network access management information system to realize the goal of integration with desktop management, equipment management, software security management and network management and to provide an integrated supporting system for operation in computer network access progress.
    Location Estimation Based on Scene Fingerprinting with Received Signal Strength in ZigBee Network
    YANG Wen-ji;WANG Ming-yan;SU Wu
    2010, 1(10):  158-160,.  doi:10.3969/j.issn.1006-2475.2010.10.042
    Asbtract ( 911 )  
    Related Articles | Metrics
    Firstly, the paper presents some location methods based on the received signal strength identification(RSSI) and scene fingerprinting in ZigBee network. Secondly, the article proposes a location method—RSS scene fingerprint location which integrates the two positioning methods above. The method uses received signal strength identification as fingerprinting to establish fingerprint database, and then to determine the mobile station’s location with KNN matching algorithm. The experiment results demonstrate the validity of location estimation, with high precision, strong adaptability and fault tolerance, which has the characteristic of low-cost, low power consumption and easy to implementation.
    数据库
    Evolution of Database Operation in ASP.NET
    WANG Fang
    2010, 1(10):  161-163.  doi:10.3969/j.issn.1006-2475.2010.10.043
    Asbtract ( 1649 )  
    Related Articles | Metrics
    Web application becomes to be the most important application of computer programming and database operation plays an essential role in it. The powerful database operation is one of the reasons for the success ASP. The history of database operation in ASP is recalled to illustrate the evolution of it. From ADO and ADO.NET to the DataSource controller, ASP.NET provides a successful balance of powerful function and convenient usage in database operation.
    Research and Implementation of Database Intelligent Connection Pooling Framework
    TU Yun;ZHOU Qi-yun;LUO Xiao-ming
    2010, 1(10):  164-166.  doi:10.3969/j.issn.1006-2475.2010.10.044
    Asbtract ( 936 )  
    Related Articles | Metrics
    On the basis of the traditional database connected pool, the paper advances a new frame of intelligent database connected pool. This frame has the ability to analyze the requested information, excavate the priority of the queue of dynamic adjusting service requirement, and forecasted-execute on the application which contents the forecast condition, achieve self-optimization of the connected pool, improve the operating efficiency of the database, and all these have been achieved in large-scale application.
    Research and Implementation of Test Assignment Model Based on Normal Distribution
    JIANG Bin;ZHOU Qi-yun;ZHU Hu-ping
    2010, 1(10):  167-169.  doi:10.3969/j.issn.1006-2475.2010.10.045
    Asbtract ( 856 )  
    Related Articles | Metrics
    This paper issues a model of test assignment based on normal distribution, according to commonly used algorithms of automatic assignment. In this model, test space is divided into different difficulty levels of test set, then the difficulty levels are distributed according to the normal distribution. The model has a simple structure, fast, efficient, focused topics and feasibility of good features and has been applied to the subjective test examination on computer programming system.
    信息安全
    A Network Intrusion Detection Model Based on Protocol Analysis and Immunological Principle
    GENG Jun-cheng;NIU Shuang-xia;MO Jian-song
    2010, 1(10):  170-173.  doi:10.3969/j.issn.1006-2475.2010.10.046
    Asbtract ( 890 )  
    Related Articles | Metrics
    With theoretical analysis of protocol analysis and biological immunity system, this paper presents a new intrusion detection model based on protocol analysis and immunological principle. The model can sort the set of detectors according to the protocol type, and generate the relevant subsets of the detectors. Designing a new detector structure can sort the detectors further. The detectors of each subset can mutate, evolve alone and the whole detectors update based on subset. In practical detection, the patterns to be detected match the relevant subset of the detectors, so the detection speed can be effectively improved, making up the deficiency of past modes.
    A Forward-secure Threshold Signature Scheme
    HE Qi-fen;CHU Jing-jing;ZHUANG Chen-jie
    2010, 1(10):  174-176.  doi:10.3969/j.issn.1006-2475.2010.10.047
    Asbtract ( 873 )  
    Related Articles | Metrics
    The security of a forward-secure threshold signature scheme proposed by MI Jun-li is analyzed. It points out that it can be forged, and not forward. At the end, this paper proposes a new scheme based on ELGamal forward-secure system.
    ERP Logging in System Based on USB Interface
    HE Li-hong;WANG Xin-guo
    2010, 1(10):  177-179.  doi:10.3969/j.issn.1006-2475.2010.10.048
    Asbtract ( 1646 )  
    Related Articles | Metrics
    In order to avoid the message of enterprise letting out, it is important to improve the safety of the ERP logging in system. A new ERP logging in system is offered to remove the danger, which combining the hardware with the software. The system is constructed with USB interface. It is expanded with the core of the safe SOC chip of Beijing HONGSI electronics. The frame of the hardware construction theory and the design method of software of the system are offered. The system has the advantage of high safety, high integration and has high extending value in practice.
    Application and Research on Data Destruction Technology
    WEI Cheng-wei;LIU Li-wei;WANG Nan;LI Yong
    2010, 1(10):  180-182.  doi:10.3969/j.issn.1006-2475.2010.10.049
    Asbtract ( 903 )  
    Related Articles | Metrics
    Combing the current mainstream data destruction techniques and the characteristics and limitations of each destruction technology, according to realities in the general grass-roots unit of army, the paper analyzes the possibility of a variety of destruction techniques applied in the work, and proposes the program of solving data safely destructing in the grass-roots unit of army work.
    应用与开发
    Research on Simulation Platform for Sudden Water Pollution Accident Based on B/S
    HU Guo-jian;XIAO Bin;DING Tao
    2010, 1(10):  183-185,.  doi:10.3969/j.issn.1006-2475.2010.10.050
    Asbtract ( 1699 )  
    Related Articles | Metrics
    For defending sudden water pollution accidents’ impact on water environment and providing accident disposal plans with scientific basis, simulation platform for sudden water pollution based on B/S are researched. Taking a river located in Zhejiang province as example, this paper combines traditional instantaneous source water quality model and modern computer science using PHP+MySQL frame. The platform can estimate water quality variation process, unattainment time, unattainment rate and polluted river range. The development of platform provides decision evidence for hydraulic and environment department to know probable impact caused by accidents and work out disposal plans.
    Complex String Validation Through Use of CLR in SQL Server 2005
    CHANG Jie
    2010, 1(10):  186-188.  doi:10.3969/j.issn.1006-2475.2010.10.051
    Asbtract ( 851 )  
    Related Articles | Metrics
    Complex string validation in SQL Server 2005 is very difficult by check constraint. For SQL Server 2005 integrates CLR, so using the regular expression of C# is able to solve the problem. The paper describes the application of CLR in the SQL Server 2005 basically. The important step and code for SQL CLR to validate email is also given in detail.
    Study on Simulating Virtual Atmospheric Condition
    WANG Zhong-chao;GU Da-quan;QIU Bin;CHEN Mao
    2010, 1(10):  189-190,.  doi:10.3969/j.issn.1006-2475.2010.10.052
    Asbtract ( 918 )  
    Related Articles | Metrics
    The passage describes the processes of atmosphere simulation in virtual scene, and proposes a way to realize clouds and mist. Vega can realize real-time scene rendering very well in virtual simulation and make the virtual scene more vivid. It is widely used in the field of visual simulation.
    A Method of Computer Hardware Checking Through LAN Based on PXE Technique
    ZHENG Yu;SONG Bao-lian;MA Wei-yin;LUO Jian-ping
    2010, 1(10):  191-193.  doi:10.3969/j.issn.1006-2475.2010.10.053
    Asbtract ( 914 )  
    Related Articles | Metrics
    This article introduces a method on computer hardware checking. Using this method, which based on PXE technique in LAN, it can increase the efficiency of computer labs’ management to a certain extent.
    Design of Mold Vehicle Controller
    GONG Qi-lin;LI Zhong-zhi;HUANG Hong
    2010, 1(10):  194-197.  doi:10.3969/j.issn.1006-2475.2010.10.054
    Asbtract ( 1592 )  
    Related Articles | Metrics
    This design of mold vehicle controller is based on control technologies of single-chip microcomputer and PWM direct current motor. The controller can receive and judge the main control signals from the imitate driving room and put out signals to control the mold vehicle according to different main control signals, such as headway, retreat, accelerate, decelerate, turn a corner and put on brakes, etc. Adopting 16-bit single-chip machines of Lingyang to control slice outside 8253 to put out signal of PWM, the output signal has characteristics of small error, high control series and good stability.
    Present Situation and Difficulties of Electronic Medical Record
    YUAN Xue-li
    2010, 1(10):  198-200,.  doi:10.3969/j.issn.1006-2475.2010.10.055
    Asbtract ( 902 )  
    Related Articles | Metrics
    By reading lots of papers, the paper compares domestic and overseas present situation of electronic medical record, then summarizes its difficulties in the process of practice. The practice of electronic medical record is a complicated system engineering, no matter in the aspect of law, technology or management, it needs to be solved through effort of various aspects.
    Research on Alleviating Obstacle-detecting Blind Zone of Obstacle-avoiding Robot
    YANG Qi-dong;
    2010, 1(10):  201-204.  doi:10.3969/j.issn.1006-2475.2010.10.056
    Asbtract ( 1477 )  
    Related Articles | Metrics
    In order to enhance the obstacle-detecting rate, prevent from collision in the process of obstacle avoidance, the relationship between sensor-distributing manner and obstacle-locating blind zone is discussed based on the technology of multi-sensor data fusion. The conception of absolute blind zone and relative blind zone is defined. Sensor distributing manners are classified into three types: dispersing, intercrossing and mixing. The merits and demerits of each type are mentioned respectively. Several sensors are arranged in mixing manner on the target robot. The detecting results of multi sensors are combined to form a flag which determines the branch of the algorithm. The flag also makes the obstacle location available on the upper computer. The results of the experiment indicate that it is effective to reduce the obstacle-locating blind zone.
    Local Application of Exchange Server 2007
    CHEN Shu-hong
    2010, 1(10):  205-206.  doi:10.3969/j.issn.1006-2475.2010.10.057
    Asbtract ( 862 )  
    Related Articles | Metrics
    This paper analyzes the problems of Exchange Server 2007 at home, then combining the actual of the unit, discusses the four aspects of Exchange Server 2007 in the localization of applications, finally summarizes the results of localization applications, and forecasts Exchange Server 2007 in the domestic application prospects.