Loading...

Table of Content

    15 January 2010, Volume 1 Issue 01
    控制技术
    Modeling and Analysis of RUDP Protocol Based on Stochastic and Coloured Petri Net
    ZHANG Ya-kui;WEI Zhen;LIU Zheng-yu
    2010, 1(01):  1-3,11.  doi:10.3969/j.issn.1006-2475.2010.01.001
    Asbtract ( 1094 )  
    Related Articles | Metrics
    In view of the transport layer transport protocol TCP inefficiency and unreliability of the UDP, this paper proposes a new type of wireless multi-frame RUDP, at the same time, a generalized stochastic and colored Petri net (GSCPN) is proposed, and makes use of GSCPN modelling and analysing for RUDP, a better for future research RUDP protocol provides a reference model, with a very good theoretical value.
    Vegetable Greenhouse Control System Based on AT89C51 Single-chip
    PEI Qing-hua
    2010, 1(01):  4-6.  doi:1.3969/j.issn.1006-2475.2010.01.002
    Asbtract ( 1017 )  
    Related Articles | Metrics

    This article mainly introduces the AT89C51 single-chip as host controller, temperature and humidity sensors as the main external components of vegetable greenhouse control system. The system uses AT89C51 single-chip acquisition and processing, monitoring control, and environmental value of the output display for the growth of vegetables to provide a stable environment places. Besides, the system uses a low-cost and stable performance components for implementing high performance. 

    算法分析与设计
    A Set of Intelligence Algorithm Based on Bee Foraging Model
    LI Hai-sheng
    2010, 1(01):  7-11.  doi:10.3969/j.issn.1006-2475.2010.01.003
    Asbtract ( 1269 )  
    Related Articles | Metrics
    Using the feature of bee’s swarm intelligence and mechanism of its foraging behavior, efficient intelligence algorithm and artificial system can be designed. This is a new research direction. Recently, many researchers have explored it extensively. This paper expatiates on two typical intelligence optimization algorithms that based on bee foraging model, named Bees Algorithm (BA) and Artificial Bee Colony (ABC), and gaves a brief description of other intelligence algorithms of this type.
    Research on General Purpose Computation on Graphic Process Unit
    DING Peng;CHEN Li-xue;GONG Jie;ZHANG Yan
    2010, 1(01):  12-15.  doi:10.3969/j.issn.1006-2475.2010.01.004
    Asbtract ( 1061 )  
    Related Articles | Metrics
    With the fast development of GPU, the general purpose computation becomes a new research field. This paper analyzes the GPU programming model, introduces how to accomplish general purpose on GPU, and maps some common algorithm to GPU. Comparing with computation with CPU, it gets the advantage and disadvantage of computation with GPU.
    Framework Detecting in DSP Network Based on Wormhole Algorithm
    XU Jing-hua;ZOU Xiong;WANG Xu-cheng
    2010, 1(01):  16-18,2.  doi:10.3969/j.issn.1006-2475.2010.01.005
    Asbtract ( 1098 )  
    Related Articles | Metrics

    The application of the wormhole algorithm in the multiDSP paralleled processing network is a new project, this paper specially expatiates on processes in the wormhole algorithm based on Tiger SHARC series of processors of AD company in parallel processing network of hardware, and gets the results with this algorithm in the framework detecting. The results prove that the algorithm described in this paper is correct and effective.

    Novel Attribute Reduction Algorithm of Decision System Based on Classification Quality
    GAO Xiao-hong
    2010, 1(01):  19-22.  doi:10.3969/j.issn.1006-2475.2010.01.006
    Asbtract ( 1068 )  
    Related Articles | Metrics
    This paper firstly introduces some kinds of algorithms for attribute reduction briefly, analyses their advantages and disadvantages. According to this, a new algorithm for attribute reduction based on classification quality is presented, which can be used in complete information systems and incomplete information systems, so as to obtain the satisfying attribute reduction. Finally, the algorithm is demonstrated to be true and effective with specific examples.
    Optimization Algorithm of Artificial Immune Network with Swarm Learning
    LI Wei;XU Jia-yi
    2010, 1(01):  23-25.  doi:10.3969/j.issn.1006-2475.2010.01.007
    Asbtract ( 1063 )  
    Related Articles | Metrics
    To balance the exploration and using and improve the efficiency of algorithm, referred to the policies of particle swarm algorithm, this paper proposes a new opitimization algorithm for immune network, it exploites the excellent antibody in group and useful info from parent antibody’s mutation to guide the orientation of mutation according situation. Some typical test functions are applied to the new algorithm, the experiment results show that the algorithm has better global and local searching ability, higher speed for searching optimum solution, better ability of seaching muti-solutions.
    Research on Regress-base System on Data Mining
    MENG Xiao-dong;YUAN Dao-hua;SHI Hui-feng
    2010, 1(01):  26-28.  doi:10.3969/j.issn.1006-2475.2010.01.008
    Asbtract ( 1139 )  
    Related Articles | Metrics
    Regression analysis is one of the important methods in the data mining system. This paper mainly researches how to use the regression models for modeling data mining, introduces the regression model followed by 3 types, the parameter estimation based on the least squares, the significant validation and presents three kinds of optimization algorithm that included the test and deal of disperse extremum, model improvement and the selection of independent variable. Finally, it explains the regression analysis in data mining application through real data.
    Implementation of Text Clustering Based on Self-organizing Map Algorithm
    ZHANG Chun-lu;SHEN Jian-jing
    2010, 1(01):  29-31,3.  doi:10.3969/j.issn.1006-2475.2010.01.009
    Asbtract ( 1086 )  
    Related Articles | Metrics
    Based on Self-rganizing Map algorithm, text clustering is implemented and visualized by U matrix method. The results of mapping show that SOM algorithm has good accuracy and high performance.
    Analysis of Classification Technology of Data Stream
    XIE Yan-song;ZHU Xiao-lian
    2010, 1(01):  32-36.  doi:
    Asbtract ( 994 )  
    Related Articles | Metrics
    With the continuous advancement of scientific and technological development, static data classification technology can not meet the real needs of the situation. Large amounts of data are based on data stream, this paper summarizes the new form of data classification algorithms. The main algorithms which being described are ensemble classification, ANNCAD and VFDT. Through the study of research and experimental comparison of the results, people can find these data streams on classification algorithms performance far exceeds the traditional classification algorithms.
    网络与通信
    Research and Application of J2EE-based System Component Integration Platform
    WAN Li-hui;WU You-xin;WU Wei-sheng;SI Hong-na
    2010, 1(01):  37-39,4.  doi:10.3969/j.issn.1006-2475.2010.01.011
    Asbtract ( 1017 )  
    Related Articles | Metrics
    This paper introduces the background of Service-Oriented Architecture (SOA), WebService and component technology.Then, proposes a construction program of J2EE-based system component integration platform and generally introduces the components and technology roadmap of the platform. Finally, takes OA (Office Automation) system as a case in the application design, including the overall design program, the extraction of reusable components and the details of design, implementation and request service of the electronic form. The practice proves that construction program of the platform and component-based design schema of business system described in this paper has obvious advantages for reusing of components, further decoupling system, reducing the system complexity index, improving development efficiency and reducing development and maintenance costs.
    信息系统
    Design and Implementation of GPS Vehicle Navigation and Guide System 
    REN Bing-zhong;KONG Wen-huan
    2010, 1(01):  40-43.  doi:10.3969/j.issn.1006-2475.2010.01.012
    Asbtract ( 1064 )  
    Related Articles | Metrics
    Urban traffic information management is an important way of solving traffic jam of city. With the wider use of 3G networks, urban information management based on 3G will be a central issue of application. The paper designs a plan of GPS vehicle navigating and guiding system using 3G mobile network and GIS electronic map according to travel behavior of people. It discusses moving object’s time-space attributes which be described by a fivefield and a directed graph. It analyzes the GPS mobile apparatus’s function modules and structure. It improves the function of GPS mobile apparatus which can provide guiding function using the shared information of traffic. The navigation based on the shortest path algorithm is improved to one based on the real-time traffic flow of moving objects. The GPS mobile apparatus can provide the navigating and guiding decision-making for people.
    Design and Implementation of Illustration Management Subsystem in IETM
    WANG Hong;ZHANG Feng;SONG Xin-ai
    2010, 1(01):  44-48,5.  doi:10.3969/j.issn.1006-2475.2010.01.013
    Asbtract ( 1052 )  
    Related Articles | Metrics
    Technical illustration management is an important component of IETM authoring. This paper introduces the present situation and development tendency at home and abroad, establishes a total structure and function of a technical illustration management subsystem. The subsystem can implement illustration database build, illustration management, illustration reference and preview in IETM. Emphasize researches the mechanism of illustration reference, puts forward a new method of the integration between SGML/XML editor and technical illustration management subsystem, gives the description and solution of the key process.
    网络与通信
    Website Traffic Analysis System Based on AJAX
    WANG Bo;LI Jian-min;LIN Zhen-rong
    2010, 1(01):  49-52.  doi:10.3969/j.issn.1006-2475.2010.01.014
    Asbtract ( 1142 )  
    Related Articles | Metrics
    It’s very important for Website operators to keep abreast of the status of Website traffic, Website traffic system can provide effective analysis information, with which Website operators can improve service quality and make business decision so as to enhance the market competitiveness. Website traffic analysis system could be implemented in a variety of ways, such as analyzing network layer packages, analyzing Web server log files or inject analysis scripts into Web pages, all these technologies have their own strength and weakness. This article introduces using AJAX, a new technology to implement such a system, which can efficiently analyze Website traffic.
    Research and Implementation of ActiveX-technology in Network-teaching
    LIANG Zhi-jian
    2010, 1(01):  53-55.  doi:10.3969/j.issn.1006-2475.2010.01.015
    Asbtract ( 1009 )  
    Related Articles | Metrics
    The paper firstly introduces the importance of ActiveX-technology which is used in network-teaching platform,then researches the design method of ActiveX controls in detail, and sets forth the controls’ design-procedure which based on the algorithm of bubble sort in C language. By using the ActiveX-technology in network-teaching platform, it expands the functions of Web applications, provides the perfect crossplatform for users, therefore, the platform plays an auxiliary role in teaching.
    Design and Realization of Network Telephone System Based on Java
    LI Feng-qin;LU Jing;LIU Hong-feng
    2010, 1(01):  56-58,6.  doi:10.3969/j.issn.1006-2475.2010.01.016
    Asbtract ( 1166 )  
    Related Articles | Metrics
    This paper designs and develops a network telephone system based on Java, and the voice communication is realized between PC to PC, the tested software reaches the need of actual communication in timbre and time-delay.The paper introduces the system flow and key technologies in detail, and the features of the system software are described, too. 
    Solution of SaaS Based on Integrated Service Management
    DING Wen-ding
    2010, 1(01):  59-62.  doi:10.3969/j.issn.1006-2475.2010.01.017
    Asbtract ( 1034 )  
    Related Articles | Metrics
    This paper analyzes the function and structure of SaaS, and describes the process to apply service, then puts forward a solution of SaaS based on operation and integrated service management, and analyzes the design of module and the relationship between modules in detail. Then the paper discusses the process of integrating services to the platform, sets a standard to apply service, and provides aviable option to implement SaaS platform.
    Distributed Broadcasting Algorithm Based on Hopfield Neural Network
    ZHANG Tao-tao;WU Jun-lin;ZHANG Yan
    2010, 1(01):  63-65,6.  doi:10.3969/j.issn.1006-2475.2010.01.018
    Asbtract ( 1151 )  
    Related Articles | Metrics
    This paper proposes a distributed broadcasting algorithm based on optimized Hopfield neural network for sensor networks. The basic idea is as follow: it parts cluster according to the reference, then optimized the Hopfield Neural Network is used to find the optimal route starting from the broadcasting source node and traversal each node in the network, then return the source node. The data broadcasting and gathering can be achieved by the positive feedback of the Hopfield neural network. The simulation results show that the algorithm is high efficient and scalable than other two classic algorithms.
    Research and Implementation of Ajax Based on DWR and EXT
    LI Wei-jian;BIAN Yi-jie
    2010, 1(01):  66-69.  doi:10.3969/j.issn.1006-2475.2010.01.019
    Asbtract ( 1106 )  
    Related Articles | Metrics
    DWR is a excellent framework of Ajax, which encapsulates the asynchronous communication details between browser and server. It is possible for clientside to access the Java object of serverside asynchronously, but its capability of operating DOM and building a rich UI Web interface is limited. However, EXT which is also a rich Ajax framework, is able to develop rich Web interface and makes up the deficiencies of DWR. This paper discusses the core technique of DWR and EXT, and introduces how to combine them to play the best effect, so as to improve efficiency of development and the user’s experience.
    Movable Instant Messaging System Based on SIP
    HE Gang;TIAN Sen-ping;TIAN Hui-ping
    2010, 1(01):  70-72.  doi:10.3969/j.issn.1006-2475.2010.01.020
    Asbtract ( 1082 )  
    Related Articles | Metrics
    This paper builds a movable instant messaging system model based on SIP, making full use of the coincidence of C/S model of both instant messaging and SIP, the movability determined by the structure of SIP and the connection manner of “base stationmobile equipments” in wireless communication network. This makes SIP, wireless communication network and instant messaging system may be combined together well.
    System of Network Office Cooperation Platform Based on MOSS 2007 Technology
    LIU Ya-feng;YANG Chen;ZHU Xue-lei
    2010, 1(01):  73-76.  doi:10.3969/j.issn.1006-2475.2010.01.021
    Asbtract ( 1080 )  
    Related Articles | Metrics
    In order to improve the sector’s service efficiency and levels, it is particularly important that cooperation, timely communication and discussion, sharing of resources among colleagues. This article introduces how to use the features and advantages of Sharepoint technology to build a simple and practical network office collaboration platform system. The lower cost of the system development and maintenances is favorable to rapid development.
    Application of Expert System Knowledge Acquistion Based on BP Nural Network
    LUO Feng-hua;CHEN Mu-jun;TU Yun-tao
    2010, 1(01):  77-79.  doi:10.3969/j.issn.1006-2475.2010.01.022
    Asbtract ( 1061 )  
    Related Articles | Metrics
    This article proposes the neural network knowledge acquistion method in the power circuit failure diagnosis expert system based on BP, uses the self-study function of neural network, solves the problem which the knowledge updating, and makes up expert system’s insufficiency in knowledge acquistion to a certain extent.. 
    Implementation and Framework for Grid Service Mining
    LUO Yu-dong
    2010, 1(01):  80-83.  doi:10.3969/j.issn.1006-2476.2010.01.023
    Asbtract ( 1036 )  
    Related Articles | Metrics
    This paper carries on the introduction to the grid service mining background, expounds the grid service mining definition, puts forward an adapted framework for grid service mining, and makes a concrete description to the framework implement core principle for grid service mining.
    Communication Ability Analysis of a Multi-Hop Double-Loop Networks Under 1-2 Node Failure Conditions
    AO Zhi-gang;WU Hai-ping;AO Wei-qing;WANG Guan
    2010, 1(01):  84-86.  doi:10.3969/J.ISSN.1006-2475.2010.01.024
    Asbtract ( 287 )  
    Related Articles | Metrics
    Multi-hop doubleloop networks is a comparatively reliable network topology structure. This paper analyses the capability of network communication with each other between normal nodes under the node failure conditions from one to two.It points out this network in relation to network node number, hop distance, and establishes the mathematics relations under various conditions. It also gives the curve so as to compare.
    Research and Implementation of Web Application System’s Searching Technology Based on NuSOAP and Google Search API
    ZHANG Er-jun;GU Shao-yuan
    2010, 1(01):  87-89,1.  doi:10.3969/j.issn.1006-2475.2020.01.025
    Asbtract ( 1140 )  
    Related Articles | Metrics
    Web Services has been used as the important technology to solve the distributed problems. Google search engine which bases on the Web Services technology provides developers the Google Search API. By using the API, the developers can access the Google Web services for the search service in their own applications. This paper describes how to use the NuSOAP component to access Google Search API and builds the search system in PHP integrated development.
    Research on Mobile Real-time Video Play Based on H.264 Protocol
    GONG Qi-lin
    2010, 1(01):  90-91,9.  doi:10.3969/j.issn.1006-2475.2010.01.026
    Asbtract ( 1032 )  
    Related Articles | Metrics
    With the development of mobile communication value added service, streaming media technology has been taken more attention. This paper through designing a specific application of wireless streaming media, analyses the operation background of the application. Aiming at the development of mobile streaming, the paper describes current data operations.
    计算机仿真技术
    Reseach on Method of Visual Simulation Radar Scanning Base on Vega
    GUO Jian;LI Yong;SONG Fa-xing;YUE Yi
    2010, 1(01):  92-94.  doi:10.3969/j.issn.1006-2475.2010.01.027
    Asbtract ( 1210 )  
    Related Articles | Metrics
    According to the basic equation of radar and the characteristic of Vega program, this paper analyses whether Vega visual simulation the radar scanning, and points out the key of simulation; And then a method of visual simulation as well as the programmer’s map is presented using Vega radar application interface.
    Display System Design for Aero-engine Control Semi-physical Simulation System
    YE Xiang;HUANG Xiang-hua
    2010, 1(01):  95-100.  doi:10.3969/j.issn.1006-2475.2010.01.029
    Asbtract ( 1015 )  
    Related Articles | Metrics
    As a mass of parameters and data which come from helicopter model computer and engine model computer in aero-engine control semi-physical simulation system, this paper realizes visualized simulation of helicopter flight in VC++ platform with the OpenGL module library, and transforms nonrepresentational data information to intuitionistic graphic information. At last, Computers in this system are connected by Ethernet, data is transmitted with the UDP protocol.
    Design and Implementation of Web Service-based Visual Scenario Generation System
    HU Peng;YAO Shi-jun
    2010, 1(01):  101-104.  doi:10.3969/j.issn.1006-2475.2010.01.030
    Asbtract ( 1004 )  
    Related Articles | Metrics
    This paper designs a Web service-based visual scenario gegeration system, the system is loosely coupled with other specific simulation systems, and can rapidly reuse the scenario data regardless of the base data format heterogeneity of C4ISR systems, combat simulations, and scenario generation systems. It can make the development of scenario more efficient, and the interoperability between different simulation systems more flexible.
    Study and Simulation of PIM-SM Multicast Protocol Based on NS2
    XU Jia;FU Guang-xuan
    2010, 1(01):  105-108.  doi:10.3969/j.issn.1006-2475.2010.01.030
    Asbtract ( 991 )  
    Related Articles | Metrics
    PIM-SM(Protocol Independent MulticastSparse Mode)is currently the preferred intra-domain multicast routing protocol. Comparing with other PIM protocol, the switching from shared tree to the shortest path tree can effectively reduce the network delay and the load of RP. NS2 is an objectoriented simulator based on discrete event. It can availably simulate network topology and network data transmission. This article is to simulate the process of switching from RPT to SPT with NS2 and analyze the simulated data in detail. The result illustrates the superiority of the switch from RPT to SPT.
    图像处理
    Color Image Segmentation Based on Adaptive Local Thresholds
    RAN Yu-mei;WANG Hong-guo;YANG Yu-hui;XU Zhen
    2010, 1(01):  109-112.  doi:10.3969/j.issn.1006-2475.2010.01.031
    Asbtract ( 1168 )  
    Related Articles | Metrics
    The using of minimum spanning tree based on graph theory can obtain global division effect and good operating efficiency. But the number of arcs is too large, and the method through fixed global threshold doesn’t adapt to all color images. This paper aims at these problems, combines the minimum spanning tree method with watershed algorithm, firstly, transform the initial segmentations into nodes and arcs of graph, then merge them through minimum spanning tree. By analyzing the local changes of the regions characteristics, adaptive local thresholds are derived. The experiment indicates that, the minimum spanning tree method based on adaptive local thresholds is better than the minimum spanning tree based on global threshold.
    Research on Graph-based Normalized Cut Image Segmentation Method
    YANG Yu-peng;ZHAO Wei-dong;WANG Zhi-cheng;CHEN Gang
    2010, 1(01):  113-116.  doi:10.3969/j.issn.1006-2475.2010.01.033
    Asbtract ( 1246 )  
    Related Articles | Metrics
    Graph-based image segmentation method is newly developing technique in recent years. Normalized cut is one of typically graph-based segmentation methods. This paper introduces correlative content of normalized cut, analyzes advantages and disadvantages of it, and proposes some efficiently solutions for improving. Finally, experimental results show that good result of segmentation can be obtained by the normalized cut algorithm.
    Performance Analysis of Threshold De-noising Method Based on Dyadic Wavelet Transform
    JIANG Shan-shan;TURGHUNJAN Abdu-kirim
    2010, 1(01):  117-119.  doi:10.3969/j.issn.1006-2475.2010.01.033
    Asbtract ( 1000 )  
    Related Articles | Metrics
    A threshold de-noising method based on dyadic wavelet transform is proposed here based on the wavelet shrinkage put forword by D.L. Donoho and I.M. Johnstone. To analyze the de-noising performance of this method, denoising experiments is conducted on the same image in different levels of Gaussian noise. The simulation results show that the threshold de-noising method based on dyadic wavelet transform not only suppresses the Gibbs phenomenon near the edge of the image effectively, but also it makes the peak signal to noise ratio of the de-noising images have a large extent improved at different noise levels, and have a very small range of fluctuation in different noise levels, which results indicate that de-noising performance of the threshold de-noising method based on dyadic wavelet transform has a strong stability.
    Real-time Face Detection and Statistics Based on Video Image
    XU Qi;WANG Ji-cheng
    2010, 1(01):  120-123,.  doi:10.3969/j.issn.1006-2475.2010.01.034
    Asbtract ( 1473 )  
    Related Articles | Metrics
    This article describes how to judge whether there are any faces in the video or image, if there are, it will count out the number of the faces. The principle of implementation is based on AdaBoost algorithm. This paper selectes Haar-like characteristics and trained cascaded classifiers to recognize the faces. The improvment is adjusting weight to every cascaded classifier dynamically, set heavy weight for cascaded classifiers with higher accuracy and low weight for cascaded classifiers with lower accuracy. Experimental results indicate that the method is fast and reliable and meets the requirement of realtime system.
    Research on Image Retrieval Based on Multi-features
    ZHANG Shu-juan;WANG Qing-min
    2010, 1(01):  124-127.  doi:10.3969/j.issn.1006-2475.2010.01.035
    Asbtract ( 1059 )  
    Related Articles | Metrics
    In order to retrieve image effectively, contendedbased image retrieval technique comes into being. The color feature and texture feature are respectively studied. The color feature is demonstrated by the histogram. The texture feature is extracted by Gabor filters. On the basis of above contents, the article proposes a method for image retrieval using combined color feature and texture feature. The results of experiments show that the retrieval results obtained from combined features are better than the retrieval results obtained from single feature.
    A Feature Conformity Method for Stationary Image Based on Visual C++
    WANG Li-li;LI Ping
    2010, 1(01):  128-130,.  doi:10.3969/j.issn.1006-2475.2010.01.036
    Asbtract ( 1007 )  
    Related Articles | Metrics
    Via research on vision image stationary feature conformity methods, this paper proposes a method to realize color and shape feature information conformity based on Visual C++, introduces how to develop graph class in VC environment, and uses CPtrArray to solve the problem of dynamic storage for image object. Realizes TXT data read function with CStdioFile class, and solves the problem of transformation from string type to integer type. At last draws the feature image using OnDraw function in MFC. Experimental results show that, it can receive a better effect.
    信息安全
    Research on Trusted Campus Network System Based on Authentication Technology
    YAN Hao;ZHANG Yan;YAN Xiao-yong;
    2010, 1(01):  131-135.  doi:10.3969/J.ISSN.1006-2475.2010.01.037
    Asbtract ( 1019 )  
    Related Articles | Metrics
    The traditional campus network system uses firewall and some access control policies to ensure its security, the network of this model just can prevent the danger from external, but can not effectively guard against the internal hidden security flaws, therefore, improving the internal security is an important link for secirity of the whole campus network. This paper analyzes the principle and characteristic of trusted network, applies the trusted network into the campus network, puts forward a new campus network system based on the authentication technology, at the same time, also describes its structure and elements, and gives the network topology diagram, finally analyzes the priciple of security mechanism and the specific methods for achieving this. 
    Access Control Technology for Spatial Database
    DENG Rui-zhi;ZHU Sheng-lin
    2010, 1(01):  136-139.  doi:10.3969/j.issn.1006-2475.2010.01.038
    Asbtract ( 995 )  
    Related Articles | Metrics
    With the development of GIS, the security of spatial database is becoming more and more important. But now the research of spatial database is focused on how to provide strong operational ability to spatial database, such as storing, querying and retrieving spatial data and spatial analysis to spatial data, while less consider how to guarantee its security. This paper introduces its status, and emphatically introduces spatial database’s access control technology.
    A Collaborative Blog Spam Filtering System Model Using Percolation Search
    YANG Jing-li
    2010, 1(01):  140-142,.  doi:10.3969/j.issn.1006-2475.2010.01.039
    Asbtract ( 1028 )  
    Related Articles | Metrics
    This paper proposes a novel collaborative filtering method for link spams on Blogs. The key idea is to rely manual identification of spams and share this information about spams through a network of trust. The bolggers who has identified a spam tells a small number of fellow bloggers(content implantation), and those who have not heard about it start a search using a percolation search, combined with content implantation, they confirm the information about identified spam.
    Research and Design of Computeraided System for Construction Project Tendering and Bidding
    GAN Bin;SHI Yong-ge;GAO Chun-xiao
    2010, 1(01):  143-146.  doi:10.3969/j.issn.1006-2475.2010.01.041
    Asbtract ( 1061 )  
    Related Articles | Metrics
    By exploring the process and analyzing the system security of E-opening sealed tenders system, this paper designs and realizes a secure and efficient construction project E-opening sealed tenders system.To meet the demands of safety and security of E-opening sealed tenders system, the design of security architecture is taken into account for this system. The system realizes user authentication and access control and ensures the integrity and security of bidding information in the course of transmitting and storing. The paper introduces implementations some special functions in the system, which is founded based on Delphi platform.
    Design of Network Flow Detection Module Based on Secure Access Platform
    HU Dan
    2010, 1(01):  147-149,.  doi:10.3969/j.issn.1006-2475.2010.01.041
    Asbtract ( 1037 )  
    Related Articles | Metrics
    This paper introduces the framework of secure access platform, the basic principle and component of flow detection, the component and functional design of flow detection module are described later, introduces the high-level design and lowlevel design in detail.
    Study on Invulnerability of Network Based on Effect Evaluation
    REN Lian-xing;SHAN Hong
    2010, 1(01):  150-152,.  doi:1.3969/j.issn.1006-2475.2010.01.042
    Asbtract ( 926 )  
    Related Articles | Metrics
    The network invulnerability is the capacity that the network maintains it’s function when it suffers some initiative attacks. The network invulnerability is not only an important index in the evaluation of network security, but also important in research of network attack. At present, there are different methods in measurement of invulnerability here. Based on the fundamental indices of network and combined with effect evaluation of network attack, this paper brings forward the measurement of network invulnerability.
    数据库
    A Dynamic Creating Chart Method Based on OWC in Web Page
    LIN Yong-xing;XU Xiao-yan
    2010, 1(01):  153-155.  doi:10.3969/j.issn.1006-2475.2010.01.043
    Asbtract ( 1081 )  
    Related Articles | Metrics
    The article proposes a dynamic creating chart method, which also can show realtime chart in the Web page. This approach bases on data selected from DB, and renders charts in Web page through OWC components in the ASP.Net platform. Practice shows that this method can get visual and real-time charts result for data analysis of high-volume.
    Business Application System Development Based on Framework Technology
    LI Juan
    2010, 1(01):  156-159.  doi:10.3969/j.issn.1006-2475.2010.01.044
    Asbtract ( 1068 )  
    Related Articles | Metrics
    This article analyses the traditional problems in Web development, and introduces some framework technology. Using a business application system, deeply discusses how to choice some frameworks together and how to implement concretely, to mitigate the difficulty in the whole Web project and improve efficiency of development.
    Design and Implementation of Examination System Database Based on Data-driven
    ZHANG Yi
    2010, 1(01):  160-161,.  doi:10.3969/j.issn.1006-2475.2010.01.045
    Asbtract ( 1026 )  
    Related Articles | Metrics
    Data flow design is one of the various methods of database design. This thesis is based on dataflow design, introduces the relevant concepts and design methods about data-driven with the application to database design of examination system, which showed satisfactory effects.
    Application of Data Warehouse and Data Mining in CRM of Country Credit Organization
    WANG hai-zhu;YAN Hong-yin
    2010, 1(01):  162-165.  doi:10.3969/j.issn.1006-2475.2010.01.046
    Asbtract ( 1078 )  
    Related Articles | Metrics
    The country credit organization of China as the only one group that survive and develop in the nation vast rural area is a disadvantaged group in all commercial banks, it should do use advanced technology and scientific management for survival and development. This article introduces that how to build the data warehouse and decision tree’s application in the country credit organization to reader, double samples are used for training and pruning the decision tree. When the tree are used for forecasting and classification the customers, it gets the accurate rate of 70 percent.
    Technology Summarization of Mass-data Management System Based on Table Structure
    FEI Jiang-tao;ZHANG Xiao-qing;PAN Qing
    2010, 1(01):  166-169,.  doi:10.3969/j.issn.1006-2475.2010.01.047
    Asbtract ( 1058 )  
    Related Articles | Metrics
    The paper briefly introduces research background of mass-data management system. After that, the data model of Bigtable system is described. The paper analyzes the architecture, function and key technology of Bigtable and Hypertable. At last, it contrasts the difference between two systems.
    软件工程
    Design and Realization of Daily Business Management System in Telecom Enterprise
    HUANG Jiang;SHI Yong-ge;GAN Bin
    2010, 1(01):  170-172.  doi:10.3969/j.issn.1006-2475.2010.01.048
    Asbtract ( 1040 )  
    Related Articles | Metrics
    In order to achieve the standardization of information management in the enterprise and simplify the management of daily work load, this paper designs and realizes a system based on B/S model, which includes several important functions: the work of management, staff management, logbook management and plans for the next week. The paper introduces the design idea, design project ,main functions and the technique specialty in detail.
    Design and Implementation of Embedded Stock Machine System Based on Internet
    YANG Yi-jun
    2010, 1(01):  173-175,.  doi:10.3969/j.issn.1006-2475.2010.01.049
    Asbtract ( 1035 )  
    Related Articles | Metrics
    A new Internetbased stock machine is proposed in this paper. The main features include sharelist display, technical analysis, information and stock trading. Being based on embedded OS and B/S architecture, it is very convenient for users’ operation and content updating. It reduces not only the operation difficulties, but also the cost of stock trading. The potential market requirements are very huge.
    A Component Based on Workflow Management System
    PENG Ting-ting;LÜMing-qi

    • Ming-qi
    2010, 1(01):  176-179.  doi:10.3969/j.issn.1006-2475.2010.01.050
    Asbtract ( 1022 )  
    Related Articles | Metrics
    Workflow management system is the key module to achieve the process automation of various information management systems. This paper proposes a workflow metamodel and the workflow modeling approach based on this metamodel, and also implements a component based workflow management system which supports the workflow modeling process and provides the workflow execution environment. This system can be integrated into external system as a component.
    应用与开发
    Design and Implementation of Enterprise Internal Management System Based on Flex
    ZHANG Ying;GUAN Hong-yun;BAI Wen-jiang;LIU Wei-lin
    2010, 1(01):  180-184.  doi:10.3969/j.issn.1006-2475.2010.01.051
    Asbtract ( 1012 )  
    Related Articles | Metrics
    This paper achieves the system function by using Flex technology, which is one of the technologies to implement RIA. The system uses Cairngorm framework as a program design model while using serviceoriented architecture middleware platform to realize business logic tier. A unified, orderly and efficient operation is created to supervise enterprise project processes, project management, personnel management, financial management and other activities. The system operation is very convenient and has a good maintenance. It also enhances user experience.
    Research and Implementation of Java2 Swing Component Expansion
    WANG Le;ZHOU Qi-yun;XIAO Xiao-fang;JIN Hai-feng
    2010, 1(01):  185-187.  doi:10.3969/j.issn.2010.01.052
    Asbtract ( 1011 )  
    Related Articles | Metrics
    Java2 Swing standard components to meet the general needs of the desktop program, but the actual projects will encounter needs of some special components, these special components are often a combination of standard components or features of the rewrite. First, this article describes the architecture of Swing components, then analyzes each of the Swing components of the composition of the object, gives the standard components of the expansion of the steps and multistage pull-down menu to realize the key to the code at last.
    Research on a Runtime Verification Framework Based on MaC
    XU Shuai;SUI Ping
    2010, 1(01):  188-190.  doi:10.3969/j.issn.1006-2475.2010.01.053
    Asbtract ( 239 )  
    Related Articles | Metrics
    This paper introduces a runtime verification(RV)framework that based on a RV tool named Monitoring and Checking(MaC). Based on the concept of anticipatory semantics, and also combines with the research on the working principle of MaC, a rather mature runtime verification tool, it puts forward a kind of runtime framework. The meaning is that, the logical expression ability of MaC is fully used, which makes it simple to define events and conditions. On the other way, it widens the ability with the introduction of monitor with anticipatory semantics, and makes the runtime verification framework some kind of forecasting, and what’s more, it lays very good foundation for further research on the online active monitoring based on anticipatory semantics. 