Loading...

Table of Content

    21 August 2009, Volume 8 Issue 8
    算法分析与设计
    Application of Exploring Decision Trees in Evaluation Subsystem in Intelligent Guidance System
    FU Jie;LI Wen
    2009, 8(8):  1-3,6.  doi:10.3969/j.issn.1006-2475.2009.08.001
    Asbtract ( 233 )  
    Related Articles | Metrics

    This paper presents the characters of intelligent guidance system, and describes the principles of C4.5 algorithm of exploring decision trees, builds a model which is used to evaluate the effect of students’ study on line. Using classify rules from the models, the system predicts, some data and a form of accuracy evaluation are given which empirically shows to be more efficiency in computational efficiency and more flexibility in algorithm.

    Research on Text Categorization Based on Machine
    HE Guo-hui;WU Li-fa
    2009, 8(8):  4-6.  doi:10.3969/j.issn.1006-2475.2009.08.002
    Asbtract ( 1121 )  
    Related Articles | Metrics
    Text categorization based on machine learning is a widely used technology in the field of information retrieval and has gained many advances in recent years. The paper expounds the definition of text categorization and text representation, introduces some machine learning methods applied in text categorization and evaluation methods of text classifiers.
    Research on Load Balancing of Web-server System and Comparison of Algorithms
    LI Kun;WANG Bai-jie
    2009, 8(8):  7-10,1.  doi:10.3969/j.issn.1006-2475.2009.08.003
    Asbtract ( 1980 )  
    Related Articles | Metrics
    This paper simply introduces the types of load balancing strategy, and mainly describes the concept of load balancing of Webserver system. It also includes a detailed presentation of the algorithms of load balancing, which is a key point of judging load balancing strategy, and a comparison of these algorithms. Besides, an introduction of some new load balancing algorithms is presented in the paper. At the end of this paper, the prospect of load balancing on Webserver system is showed.
    软件工程
    Analysis of Numerical Characteristic of J-M Software Reliability Model
    QIN Liang;XU Guang-hui
    2009, 8(8):  11-15.  doi:10.3969/j.issn.1006-2475.2009.08.004
    Asbtract ( 1076 )  
    Related Articles | Metrics
    Software reliability is a important attribute of software quality, and it is a urgent topic that how to improve software reliability. This article summarizes the notion and class of software reliability model, analyses the establishment of parameter equation for J-M software reliability model and gets a better way of the equation.The settlement for the equation is rational by comparing to the result of Smerfs in USA NASA.
    Analysis & Design of Marketing Support System Based on B/S Mode
    HUANG Xi;SHI Yong-ge;ZHANG Jun
    2009, 8(8):  16-18,3.  doi:10.3969/j.issn.1006-2475.2009.08.005
    Asbtract ( 249 )  
    Related Articles | Metrics
    Based on the practice, in view of the demand of the telecom operation bussiness marketing and maintenance service support, a telecom marketing support system software which based on B/S mode is designed and realized. This paper introduces the design idea and schema and the technique feature of a marketing support system which is suitable for the applications in telecom branch in Nanchang.
    Time Series Prediction Based on Mixture of ARMA and SVR Model
    LIN Hui-jun;XU Rong-cong
    2009, 8(8):  19-22.  doi:10.3969/j.issn.1006-2475.2009.08.006
    Asbtract ( 2115 )  
    Related Articles | Metrics
    The prediction of stabled time series often use ARMA model, but to the most of the unstabled time series often use the analysis of certainty and randomness time series. It is a waste of the random information with the analysis of certainty, while after the difference of time series, it comes to ARMA model with the analysis of randomness. The paper gives a way to full use of the residual data with SVR model after using ARMA model. Comparing to the single model used to predicting, the method of the mixture of ARMA and SVR model show to be more practical to improve the prediction precision.
    Research and Implementation of Architecture Evaluation Method
    XU Wei-ke
    2009, 8(8):  23-25.  doi:10.3969/j.issn.1006-2475.2009.08.007
    Asbtract ( 1205 )  
    Related Articles | Metrics
    Architecture evaluation methods to assess the structure of the system play a decisive role, this paper compares the current architecture of popular assessment methods, and analyzes indepth assessment of the basic principles of architecture, implementation steps, from the demand point of view, the development of project management perspective, proposes a more generic authentication architecture evaluation system, with a view to verify the assessment of architecture and provide a theoretical and technical reference.
    Technological Comparison and Tendency Analysis of Software Cost Estimation
    LI Wen-yan
    2009, 8(8):  26-28,3.  doi:10.3969/j.issn.1006-2475.2009.08.008
    Asbtract ( 1119 )  
    Related Articles | Metrics
    This paper summarizes the research and application situation to software cost estimation. On base of comparing and analyzing six types of estimation method, six types of building model technology, twelve types of cost estimation tool, proposes the development tendency of software cost estimation. It provides references for research and application.
    Design and Implementation of Technological Project On-line Declaration System Based on Web Framework
    LU Yan-er;WU You-xin
    2009, 8(8):  29-33.  doi:10.3969/j.issn.1006-2475.2009.08.009
    Asbtract ( 1345 )  
    Related Articles | Metrics
    Lightweight J2EE (Struts+Spring+Hibernate) as a popular J2EE development framework in recent years, not only focuses on reducing the complexity of code, but also tries to avoid unnecessary complexity in developing their own functions. In this paper, according to status of the current project with the declaration, examination and approval, it takes the MVC design pattern that widespread used currently, combines with the characteristics of the management system, uses the technology of framework integration, proposes the project declaration system solutions based on the multilayered framework. It uses the multilevel architecture to divide the platform layer into customer layer, Web layer, application layer and EIS layer. Compares with the traditional declaration the system is more flexibility, reusability and maintainability.
    网络与通信
    Research on Instant Messaging System Based on P2P
    LI Yong-ming;
    2009, 8(8):  34-39.  doi:10.3969/j.issn.1006-2475.2009.08.010
    Asbtract ( 1089 )  
    Related Articles | Metrics
    This article describes the design and realization process about a simple instant messaging system based on the P2P. This system implementes the functions of realtime information transmission as well as the file transferring for the online users on the network. The system uses the mixed P2P pattern, in which the server program adopts the multithread technology used in the identification authentication and the inquiry about condition information when registering clients. The information communication on the P2P network is carried on directly among the clients. The instant messaging system based on the P2P has many advantages. It is convenient, effective, inexpensive, instant and so on. Therefore it is rapidly becoming an important tool for the application during the individuals and enterprises.
    Design of a Collaborative Learning Information RSS Syndicator
    ZHANG Zhi-ping;ZHOU Xi-liu
    2009, 8(8):  40-42,4.  doi:10.3969/j.issn.1006-2475.2009.08.011
    Asbtract ( 1155 )  
    Related Articles | Metrics
    Network RSS feeds information collaborative learning platform based on Web service provides customized information services for learning network to support the collaborative learning environment. This paper uses of RSS technology as a learning network to support collaborative learning environment in the transmission of information, and uses of Web service technologies for the network of distributed learning environment to provide information processing, extended interface and cross-platform.
    Building Web Application System Based on Architecture of Struts 2 & Spring & Hibernate
    WU Bao-zhu;LIANG Sheng-zhuo;NIU De-xiong
    2009, 8(8):  43-46.  doi:10.3969/j.issn.1006-2475.2009.08.012
    Asbtract ( 1448 )  
    Related Articles | Metrics
    It can quickly build Web application system, and make the structure of system to be clear taking Struts2 & Spring & Hibernate framework, along with have good expansibility and maintainability, so it greatly improves the reusability of the Web application system. This paper introduces three frameworks: Struts2, Spring, Hibernate, and integrates them in the Web application system.
    Research and Realization of Zero-IF Demodulator Technique for UHF RFID Reader
    ZHANG Yu-ming;JIANG Tai
    2009, 8(8):  47-48,5.  doi:10.3969/j.issn.1006-2475.2009.08.013
    Asbtract ( 1042 )  
    Related Articles | Metrics
    Based on the research work theory for the UHF RFID reader, a new RF interface circuit of reader is introduced. The demodulation techique for reader is selected, and the research focuses mainly on zeroIF quadrature demodulator, gives its solution.
    Implementation of Data Communication Using Parallel Ports with WinIo
    YUAN Jun;TAN Yong-dong;REN Jun
    2009, 8(8):  49-53.  doi:10.3969/j.issn.1006-2475.2009.08.014
    Asbtract ( 1836 )  
    Related Articles | Metrics
    Because of security, the I/O ports can’t be accessed directly in Windows 2000/XP/ NT. To realize the communication between PC and peripheral equipments by parallel ports, this paper proposes an approach which circumvents Windows protection mechanisms using virtual X device provided by WinIo library. Based on the analyses of hardware principle and working modes of parallel ports, finally through interface experiment the process of operation, codes to realize communication in application program with functions in dynamic link libraries (DLL) are given.
    Design and Implementation of Agent Based on EPON Network Management System
    WANG Feng;ZHANG Shu;FANG Yu
    2009, 8(8):  54-57.  doi:10.3969/j.issn.1006-2475.2009.08.015
    Asbtract ( 1177 )  
    Related Articles | Metrics
    EPON what based on IEEE802.3ah standard becomes the best solution for optical access network, so it is necessary to provide a reasonable and effective network management for EPON. This paper analyses the basic structure of EPON, and proposes the design of agent of EPON network management system according to the actual demand, and implements it.
    Design and Realization of Cisco’s Online Laboratory
    YAN Qian-he;YAN Zhen-ping;KUANG Li-hua
    2009, 8(8):  58-60.  doi:10.3969/j.issn.1006-2475.2009.08.016
    Asbtract ( 1062 )  
    Related Articles | Metrics
    This paper proposes a build scheme of Cisco’s online laboratory, solves the problem of the key technology in building process, makes computer network special field teacher, student and network amateur can make use of the network equipment laboratory to carry out teaching and study sufficiently, conveniently and rapidly and securely, and share realizing resource.
    Design of Interconnection Mode of Bluetooth Cell Phone Scatternets
    LIN Chun-qiang;WANG Shuo
    2009, 8(8):  61-64.  doi:10.3969/j.issn.1006-2475.2009.08.017
    Asbtract ( 1066 )  
    Related Articles | Metrics
    The advantage of Bluetooth technique and its restriction on the communication distance, facilities quantity, interconnection stability etc. are analyzed and a novel interconnection mode based on scatternets of Bluetooth cell phone is proposed which implements the integration of these scatternets. These modes can extend the promulgation and search scope of Bluetooth resource and improve the performance of Bluetooth scatternets holistically.
    控制技术
    Adaptive-Fuzzy-Smith Controller Design of a Class of Systems with Time Delay
    XU Hong-zhou;GONG Lei
    2009, 8(8):  65-67,7.  doi:10.3969/j.issn.1006-2475.2009.08.018
    Asbtract ( 1063 )  
    Related Articles | Metrics
    Smith predictive controller is an effective method to control the time delay systems, however, the drawback of high rigourness of Smith controller limits its application. Fuzzy-Smith control belongs to PD control and can’t avoid the steady-state error. An adaptiveFuzzy-Smith controller is designed, combining the advantages of fuzzy control, Smith predictive control and adaptive control, it keeps the good robustness of fuzzy control and improves the dynamic performance of the system. The simulation results show the effectiveness and superiority of the adaptiveFuzzy-Smith controller.
    Design of Portable Testing Equipment for Flight Data Recording System
    WANG Wen-jia;LI Kai-yu;ZHANG Yao-dong
    2009, 8(8):  68-72.  doi:10.3969/j.issn.1006-2475.2009.08.019
    Asbtract ( 1895 )  
    Related Articles | Metrics
    Upon the problem that the structure of testing equipment for fight data recording system is complex, large and not able to work in field, a portable testing instrument for a fight data recording system is designed, which being able to perform all tasks wanted, makes the testing instrument smaller and lowpower.Based on introducing the fight data recording system, it analyses the design of the testing instrument and sums up its strongpoints. The design has a reference value on the improvement to the testing equipment upon the other type flight data recording system. 
    信息系统
    Research on Web Information Extraction Based on Combining Block Importance Model and Xpath
    PANG Qiu-ben;GU Ping;YANG Xiao-mei
    2009, 8(8):  73-75,7.  doi:10.3969/j.issn.1006-2475.2009.08.020
    Asbtract ( 1059 )  
    Related Articles | Metrics
    Approaches of page segment reduce the unit of Web information extraction from page to block. This paper studies the main approaches of page segment and the basedlearning block importance model, and analyses the approach of Xpathbased Web information extraction. Combining the advantages of the two approaches, this paper proposes a new Web information extraction based on combining block importance model and Xpath, discusses its design process, and gives its formalized description and experimental result. The result shows that this approach is fit for extracting from the Web which has many records.
    Design and Implementation of Management Information System for Child Plan Immunity Based on C/S and B/S Modes
    LIU Yu-xian;MAO Xin-peng
    2009, 8(8):  76-79.  doi:10.3969/j.issn.1006-2475.2009.08.021
    Asbtract ( 1154 )  
    Related Articles | Metrics
    This paper analyses characteristic of C/S and B/S modes, combining plan immunity management information system, discusses the design and implementation and the key technology of child plan immunity management information system based on C/S and B/S modes. 
    数据库
    Design and Research on Visual Standardization of Data Conversion System Based on Middle Library
    WU Jie
    2009, 8(8):  80-83.  doi:10.3969/j.issn.1006-2475.2009.08.022
    Asbtract ( 1054 )  
    Related Articles | Metrics
    The source of data collection is from different information management systems based on the different fields. The diversity of data format brings the inconvenience for the unified data management. A visual data standardization conversion system is researched and designed for the harmonization and standardization of data acquisition data. The system uses selfcustomized data rules and can change the nonstandard source data into the standard target data via the establishment of data source and metadata mapping logic. The standardization of data conversion system has features of interoperable, fast and it can be applied to other areas of data collection work.
    Research on Fault Diagnosis Method Based on Rough Set and Database Techniques
    ZHANG Lei;SONG Yi-gang;LI San-qun;LIANG Si-yang
    2009, 8(8):  84-85,8.  doi:10.3969/j.issn.1006-2475.2009.08.023
    Asbtract ( 1072 )  
    Related Articles | Metrics
    A new method of extracting and filtering rules based on rough set is proposed, and the application of database mining techniques in knowledge autoacquisition and simplified design of reasoning machine is researched and discussed. The results indicate that the algorithm of reasoning is simple but it can satisfy the need of real time fault diagnosis.
    Realization of Remote Sensing Image Pyramid Based on Oracle GeoRaster
    GUAN Zhong-zhu
    2009, 8(8):  86-89.  doi:10.3969/j.issn.1006-2475.2009.08.024
    Asbtract ( 966 )  
    Related Articles | Metrics
    Spatial data management based on Oracle GeoRaster is deeply analyzed, and the remote sensing image pyramid based on Oracle GeoRaster is realized.
    Research and Implementation of Data Model Projection Tool Based on Epicentre
    ZHAO Hai-feng;LIU Yi-na;YANG Guo-qiang
    2009, 8(8):  90-92,9.  doi:10.3969/j.issn.1006-2475.2009.08.025
    Asbtract ( 1102 )  
    Related Articles | Metrics
    Aiming at the problem that Epicenter data model doesn’t provide a projection support for their own application data model, in the full of studying Epicenter data model and the theory of projection of POSC, based on combining characteristics of Sinopec’s SPDM1.0, this paper develops a projection tool to complete data conversion between SPDM1.0 logical model and physical model.
    Technical Methods of Data Extraction on Data Center Construction of State [JZ]Administration for Industry & Commerce(SAIC)
    ZHAO Yan-mei
    2009, 8(8):  93-96.  doi:10.3969/j.issn.1006-2475.2009.08.026
    Asbtract ( 1881 )  
    Related Articles | Metrics
    The basic data sources of SAIC is complex, mainly concluding the data from the state bureau of AIC and the local governmental bureau of AIC.There are differences construct and development among the local bureaus, such as the database, data structure, data standard etc. so, when constructing the data center, SAIC must choose suitable technical methods according to the actual circumstance of local AIC bureaus first, then upload the local data to the data center of SAIC after extracting, transferring and integrating them. So, this paper introduces the actual technical methods of data extraction.
    Research on XML-based Application Layer Data Exchange Technology
    YIN Jian-zhang
    2009, 8(8):  97-100,.  doi:10.3969/j.issn.1006-2475.2009.08.027
    Asbtract ( 1085 )  
    Related Articles | Metrics
    At present, many enterprises have been efforts to establish a variety of computer applications in order to help business operators. While that has had a significant improvement in the efficiency, but it does not extend to companies outside the business. These businesses cover a variety of companies applications or business operations of the exchange and communication. Many cases, enterprises and their business partners, suppliers and customers there are islands of information. Between enterprises and their business partners and their exchanges are still dependent on manual processing, so efficiency is very low. Electronic Data Interchange (EDI) is considered to be the solution to this problem, and the application layer data exchange technology is the top priority of the program, this paper studies the electronic data exchange technology in applicationlevel XML data exchange technology.
    Analysis of Meta Table in Hypertable System for Massive Data Distributed Management System
    ZHANG Zhi-hai;ZHANG Xiao-qing;PAN Qing;FEI Jiang-tao
    2009, 8(8):  105-107,.  doi:10.3969/j.issn.1006-2475.2009.08.029
    Asbtract ( 1146 )  
    Related Articles | Metrics
    The paper introduces the system architecture and tables structure of Hypertable system, analyzes the structure and expatiates on the search principle of meta table. At last, it is contrasted of two kinds of meta table structure while introducing the meta table of Bigtable system.
    Description of Qualitative Combined Model of Spatial Relationship
    YAO Yan-na
    2009, 8(8):  108-111,.  doi:10.3969/j.issn.1006-2475.2009.08.030
    Asbtract ( 941 )  
    Related Articles | Metrics
    At present, most current application systems use independent description model of direction relations and topologic relations, they influence the precision of spatial reasoning and spatial expression. The ultimate aim of this paper is to work out a combined model for topologic relations and direction relations based on Voronoi diagram, so that spatial relationship can be described more integrated.
    计算机仿真
    Improvement of Soccer Robot Sensor System by Using Neutral Network
    LAO Jian-wei;ZHANG Guo-liang
    2009, 8(8):  112-115.  doi:10.3969/j.issn.1006-2475.2009.08.031
    Asbtract ( 1787 )  
    Related Articles | Metrics
    The accuracy and stability of position data, which is offered by the unique visual sensor, can not satisfy the requirement of control system. The learning function of the BP neutral network is used to solve this problem. The state information of football and robot is treated as sample data, the visual sensor, accelerometer and compass are treated as the input of network, and the outputs of the neutral network assist soccer robot to track football. Simulation shows that the neutral network improves the accuracy of the location for football and robot. The expected result is obtained. The average relative error is superior to the traditional Kalman filter.
    Radar Train Simulation System Based on Multithread Technical
    YIN Tang-chun;SHEN Ge-ting;LIU Zhao-hui;BAI Hua
    2009, 8(8):  116-118.  doi:10.3969/j.issn.1006-2475.2009.08.032
    Asbtract ( 1097 )  
    Related Articles | Metrics
    This paper discusses multithreaded applications under Windows environment, introduces the Visual C++ 6.0 in the multithreaded programming, cites multithreaded mechanism in the radar application of simulation training. The system runs stability, and has simple software architecture to satisfy the requirements of the computer network transform, fault analysis and simulation of display realtime multi-tasking.
    Research on Routing Protocol in Ad hoc
    GONG Zhui-fei;ZHANG Li-hong;HU Jun
    2009, 8(8):  119-122.  doi:10.3969/j.issn.1006-2475.2009.08.033
    Asbtract ( 1006 )  
    Related Articles | Metrics
    Since every node in Ad hoc networks acts as both a host and a router, routing protocol is a main research issue in the Ad hoc wireless networks. Various routing protocols have been put up in recent years by researchers around the world, and the related performance analysis and evaluation of academic studies have become hot. This paper compares three typical Ad hoc routing protocols which is AODV, GPSR and ADV, makes the performance analysis and evaluation on packet delivery ratio, routing cost ,average endtoend delay and throughput of UDP and TCP traffic by simulation.
    Design of Role Assignment Based on Path Cost of Robocup
    LI Peng
    2009, 8(8):  123-125,.  doi:10.3969/j.issn.1006-2475.2009.08.034
    Asbtract ( 1862 )  
    Related Articles | Metrics
    Strategy system of smallsize Robocup robot is a multiagent system of coordination and control, which mainly includes vision information processing, coordination tactics, role assignment, action implementation and so on. To do research for role assignment in this paper, a role assignment algorithm of optimal combinatorial path cost is proposed and realizes whole design of dynamic role assignment based on Play tactics. The test of simulation platform shows that ability of overall cooperation is improved greatly.
    信息安全
    Research on Conditional Access Technique for Cable TV Based on Cardless Model
    YAN Yi-gong;DONG Guo-zhen
    2009, 8(8):  126-129.  doi:10.3969/j.issn.1006-2475.2009.08.035
    Asbtract ( 2060 )  
    Related Articles | Metrics
    In the traditional digital cable TV CA (Conditional Access) system, the encryption of user entitle information, which is transmitted by headend system, is archived by the encrypted ECM (Entitle Control Message) and EMM (Entitle Management Message), and the decryption of the encrypted data in the receiver side, is completed by the smart card which is integrated in the SetTopBox. This paper proposes a new model of cardless LCA(Local Conditional Access) system based on DES(Data Encryption Standard). In this system, the user entitle information, ECW (Encrypt Control Word) and Email etc. are carried within EMM which is transmitted by the headend management server, and in the SetTopBox side, the controlling of the entitle information is achieved by parsing the EMM information. 
    Special Analysis of Vulnerability Based on Network Models
    ZHANG Jing-jing;DA Xin-min
    2009, 8(8):  130-132,.  doi:10.3969/j.issn.1006-2475.2009.08.036
    Asbtract ( 1049 )  
    Related Articles | Metrics
    Using the model which depicted airplane kidnappers attacks in the US as the source of data, this paper idealizes it and obtains another two structures with the same scale, such as uniformly distributed structure and hierarchical structure. Under the existing attacking strategies, experiments have done to analyse the vulnerability of three given structures. At last, it gets the descendent rate of efficiency by attacking the networks. So the aim for quantifying the discrepancy of different structures is realized.
    Research on Campus Network Main Security
    LI Jian;YANG Xing;YANG Li-sha;CHEN Ming
    2009, 8(8):  133-136.  doi:10.3969/j.issn.1006-2475.2009.08.037
    Asbtract ( 1810 )  
    Related Articles | Metrics
    At present, the campus network has already become very important supporting platform for information construction of colleges and universities, but for self’s vulnerability, the universality attacking, difficult management and the opening to the outside world, the campus network faces serious security problem. This paper studies the main security problem, and gives corresponding treatment measures. These measures can make the campus network more safety and stable by practice.
    Provably Secure ID-based Signature Scheme Without Trusted Party
    CHEN Hua;CAI Guang-xing
    2009, 8(8):  137-139.  doi:10.3969/j.issn.1006-2475.2009.08.038
    Asbtract ( 1081 )  
    Related Articles | Metrics
    An efficient IDbased signature scheme without trusted party is proposed, against the problem of key escrow of IDbased signature system. The new scheme could solve the key escrow problem through binding two partially public keys with a same identity. Under the random oracle model, it has been proved secure against existential forgery on adaptively chosen message and ID attack based on the hardness of the computation diffiehellman problem(CDHP). 
    图像处理
    Research on JPEG Compression Algorithm Based on Wavelet Transforms
    XIONG Bin
    2009, 8(8):  140-143.  doi:10.3969/j.issn.1006-2475.2009.08.039
    Asbtract ( 1058 )  
    Related Articles | Metrics
    JPEG compression algorithm based on DCT transform produces the diamonds effect when working at low bit rate transform, and it influences the vision effect of decoding image badly. The main reason is the DCT transform lose too many high frequency information, so this article tries to improve it. And the main methods is to replace the DCT module in JPEG arithmetic with wave transform, moreover simulates and analyzes it with MATLAB language, and obtaines a better vision effect.
    Research on Image Retrieval Arithmetic Based on Edge Direction Histogram
    CHEN Ze-bin;HUANG Xiao-hua
    2009, 8(8):  144-146.  doi:doi:10.3969/j.issn.1006-2475.2009.08.040
    Asbtract ( 1176 )  
    Related Articles | Metrics
    This paper describes an extraction method of shape feature of images based on edge direction histogram. The shape feature extracted is invariant to scale, translation and rotation. The experiment result illuminates that the method has a good retrieval performance for images that contain a single background and obvious shape.
    Electrode Defects Edge Detection Based on Adaptive Canny Operator
    SUN Zheng-jun;LI Jie;ZOU Zhong;CHEN Xiang-tao;WU Mian-li
    2009, 8(8):  147-149,.  doi:10.3969/j.issn.1006-2475.2009.08.041
    Asbtract ( 311 )  
    Related Articles | Metrics
    Defects edge is the most important characteristic in an electrode image. The Canny operator is used to extract the defect edge, and its principles and implementation are discussed. To overcome the problems of detecting the false edge as well as losing the local edge with slow variation of value while detecting the electrode edge with traditional Canny operator, a new method is proposed to calculate image gradient by 8-neighbor pixels, also to adaptively determine the high and low thresholds of Canny operator using 2D maximum entropy by the edge gradient feature. Experimental results show that the Canny operator is a very effective way to detect the defect edge, and suitable for the electrode defect-detecting process based on computer vision.
    Digital Watermarking Algorithm Based on DWT Domain for Secrete Information Hiding in Remote Sensing Image
    YUE Qin
    2009, 8(8):  150-151,.  doi:10.3969/j.issn.1006-2475.2009.08.042
    Asbtract ( 1212 )  
    Related Articles | Metrics
    This paper proposes a method of digital watermarking algorithm based on DWT domain for secrete information hiding in remote sensing image. Experimental results show that this algorithm is not only quite transparent and has a good effect for large amount of secrete information hiding, but also has little effect for the statistical property and use value of remote sensing image.
    应用与开发
    Application of J2EE Lightweight Framework in College Curriculum Management System
    SHI Di-yang;JIA Zhuo-sheng
    2009, 8(8):  152-156.  doi:10.3969/j.issn.1006-2475.2009.08.043
    Asbtract ( 1072 )  
    Related Articles | Metrics
    This paper expatiates on the design and implementation of a college curriculum management system based on lightweight framework of J2EE, analyzes the advantages in practice of Struts, Spring and Hibernate. The college curriculum management system is a part of the college management information system, and provides the fundamental data to the curriculum selection system. The paper summarizes the main functions of the curriculum management system, and provides the solutions which using Struts as presentation layer, Spring as business layer and Hibernate as persistence layer of the system. At last, the future direction of the system is outlined.
    Design and Implementation of Smoothly Updating of Software Production
    SHEN Zhi-chao
    2009, 8(8):  157-160.  doi:10.3969/j.issn.1006-2475.2009.08.044
    Asbtract ( 1171 )  
    Related Articles | Metrics
    Software productions always occupy some share of markets, but there will be some new requirements during use. With accumulation of requirements, to some extent, software production must be updated. This article introduces some facts of smoothly updating of software production. And taking smoothly updating of a specific foreign trade business system for example, gives some major factors for smoothly updating software productions.
    A New Formation Mechanism of Dynamic Agent Coalition
    QIN Hai-ou
    2009, 8(8):  161-163,.  doi:10.3969/j.issn.1006-2475.2009.08.045
    Asbtract ( 1054 )  
    Related Articles | Metrics
    The formation mechanism of dynamic Agent coalition is an important direction of current research on MAS. In order to overcome the shortcomings of the present formation mechanism of dynamic Agent coalition, such as low utilization ratio of Agents, a new formation mechanism of dynamic Agent coalition based on “twoBidding /Tender” and NOAH planning is proposed. The mechanism uses “twoBidding /Tender” to form dynamic coalition and uses NOAH planning to decompose tasks. It can fully exercise parallel implementation capacity of Agents while meeting the time constrains of subtask. It also enables agent to join in or withdraw from the coalition dynamically. Thus the utilization ratio of Agents is improved, and the interests maximization of selfinterest Agents is guaranteed. Its validity is proved by a classical example.
    Implementation, Installation and Configuration of MPJ Parallel Programming Framework
    LIU Jun-li;LIN Xiao-rui;WANG Chu-bin;TAN Zi-yi;SITU Zhu-kun
    2009, 8(8):  164-168.  doi:10.3969/j.issn.1006-2475.2009.08.046
    Asbtract ( 2171 )  
    Related Articles | Metrics
    The MPJ programming interface provides MPIlike message passing for Java applications. In this article, an overview and introduction on the design and implementation of the MPJ parallel programming framework, including architectures, implementation mechanisms and correlated technologies, are presented. Besides, the installation and configuration process of MPJ Express are also introduced. At last, a practical MPJ program demo is given. 
    Reaearch on Knowledge Acquisition Method of Universal Ground Meteorological Instrument Malfunction Diagnosis
    LIU Jing;GU Da-quan;WANG Jin;LU Jian
    2009, 8(8):  169-173.  doi:10.3969/j.issn.1006-2475.2009.08.047
    Asbtract ( 229 )  
    Related Articles | Metrics
    The key problem expert system facing is still the “bottle neck” problem of acquiring knowledge. Regarding the characteristics of ground meteorological instrument malfunction diagnosis, this paper introduces a method of automatic formula extraction which is based on diagnosis examples, analyses the examples mentioned above, and extracts the useful diagnosis knowledge. The introduction of this kind of knowledge acquisition method, it will effectively solve the problem on expanding available diagnosis facility of the expert system of universal ground meteorological instrument malfunction diagnosis, and greatly accelerate the expert system’s speed of acquiring knowledge.
    Research on Dynamic Workflow
    HUANG Xian-ming;HU Zhi-gang;LIANG Ai-nan
    2009, 8(8):  174-177.  doi:10.3969/j.issn.1006-2475.2009.08.048
    Asbtract ( 1139 )  
    Related Articles | Metrics
    Current workflow management systems still lack support for dynamic workflow, which is a major requirement for nextgeneration workflow systems. In fact, workflow system can’t confirm all the processes, and the relationship among processes is not invariable. To confirm the dynamic characteristic, the system must have the ability of dynamic change. In order to solve this problem, based on others’ studies about dynamic workflow, this paper introduces the characteristics and kinds of the dynamic workflow, discusses the theory and implement of dynamic change in dynamic workflow. Furthermore, it designs a case to introduce the dynamic revision of the workflow process model.
    Weeds from Between-row Crop Elimination Method Based on Scale-free Networks
    NIE Xiao-yi;YANG Chang-xing
    2009, 8(8):  183-186.  doi:10.3969/j.issn.1006-2475.2009.08.050
    Asbtract ( 1023 )  
    Related Articles | Metrics
    In order to reduce the herbicide on crops and stress on the environment, this paper proposes to use machine vision to identify weed networks, and destroyes network of weeds from betweenrow crop by scalefree networks method. The paper identifies the crop, soil and weeds by machine vision, builts and mappes scalefree networks of weed according to the role of allelochemics, researches weed networks of preferential attachment, growth and clustering, founds that error tolerance and attack vulnerability are generic properties of weed networks, and proposes a method to attack and destroy weed networks. Compared with existing methods, new methods accord with the principle of ecoeconomic management.
    Research on Voice-driven CAD Modeling Technology
    LIU Zheng-chun;ZHANG Xiao-long;FENG Shuo;LI Liang
    2009, 8(8):  187-190.  doi:10.3969/j.issn.1006-2475.2009.08.051
    Asbtract ( 1026 )  
    Related Articles | Metrics
    First introduces the way to the secondary development of the CATIA and the speech recognition method based on Microsoft Speech SDK, then a simple example is given to explain how to achieve voicedriven CAD modeling.