Loading...

Table of Content

    21 September 2009, Volume 169 Issue 9
    算法
    Method Research of Network Product Bundling Based on Association Rules and Collaborative Filtering
    QIU Li-bo;JIANG Yuan-chun;LIN Wen-long
    2009, 169(9):  1-4.  doi:
    Asbtract ( 792 )  
    Related Articles | Metrics
    With the development of ecommerce, marketing strategy of bundle sales is gradually applied to sites. In the paper, data mining technology is applied to the bundle sales.After data preprocessing, it notes that how to take advantage of association rules to complete product bundling, and locate the product bundling and recommend to the target users by collaborative filtering. Finally, a binding goods recommended system architecture is established to reflect the entire process method.
    Study of Network Topology Discovery Algorithm in SNMP Environment
    FU Bi;ZHOU Li
    2009, 169(9):  5-7.  doi:
    Asbtract ( 799 )  
    Related Articles | Metrics
    Algorithm and implementation of network topology discovery are important parts to evaluate performance of network management system. Network topology discovery in SNMP environment has the fastest speed and is widely used. This paper describes network topology discovery algorithm in SNMP environment, and puts forward a way of increasing the speed of topology discovery, enhances the efficiency of the algorithm, also makes topology discovery more accurate.
    Fractal Image Compression Based on Range Blocks Classification
    ZHAO Jian-wei
    2009, 169(9):  8-11.  doi:
    Asbtract ( 635 )  
    Related Articles | Metrics
    The method is based on range blocks classification by the presearching of similar range blocks in order to shorten the time of image compression.
    Scheduling Algorithm in Grid Resource Based on Benefit Function of QoS
    LI Hui-min;JIANG Xiu-feng
    2009, 169(9):  12-14.  doi:
    Asbtract ( 783 )  
    Related Articles | Metrics
    Resource scheduling is a complex, important and challenging task in grid environment. Introducing market economy concept to the grid management and design is a good choice, and DBC algorithms are popular algorithms in computational economy framework. In this paper, an improving grid task scheduling algorithm based on benefit function is proposed by studying existing algorithms, and running the algorithm onto the simulator Gridsim and comparing it to the existing DBC algorithms. Simulation results show that our proposed algorithm improves the multiple performances on task completion factor, budget utilization, and time utilization.
    数据处理
    Applying of Oracle 10g Analysis in New Generation Business Support System of Unicom[HS2][WT5BZ][JZ][WT5
    DENG De-gui;BIAN Yi-jing
    2009, 169(9):  15-18.  doi:
    Asbtract ( 922 )  
    Related Articles | Metrics
    To assure continual stabilization and fast response of the new unicom’s gernation business support system (BSS),this artitle detailedly describes the applying of Oracle 10g’s analyzing in the new unicom’s gernation business support system, and it compares the differences of the applying of Oracle analysis between the Oracle 9i and 10g versions. In fact, the effect of analysis descried is good. 
    Research on Distributed Parallel Data Mining in Grid
    CAI Xi-rong;JIANG Xiu-feng
    2009, 169(9):  19-22.  doi:
    Asbtract ( 1029 )  
    Related Articles | Metrics
    As the persistent development and widespread use of information technology, a large number of data is continually collected and saved. It makes the resolve taskes for data mining of the distributed data more and more heavier. And the traditional way for data mining could not resolve such massive distributed data mining, distributed system is very difficult to resolve the heterogeneous OS and protocols problems. The development of grid technology, making use of grid resource sharing heterogeneous virtual organizations to achieve parallel data mining, has become a focus of research. This paper proposes and realizes a program to resolve massive distributed parallel association rule data mining in GT4, based on grid environment, Agent technology, multithreaded and centralized vote technology.
    Construction of Tobacco Company Decisionmaking Analysis System Based on Datacenter
    ZHU Yan
    2009, 169(9):  23-26.  doi:
    Asbtract ( 991 )  
    Related Articles | Metrics
    This paper discusses the objective and requirement, design theory, global design and technology platform, pivotal step, functions and characteristics of tobacco decisionmaking analysis system based on datacenter. The enterprise datacenter which realizes the data integration and data sharing is constructed. Based on datacenter, the decisionmaking analysis system which takes economic analysis management, warning and supervising management, performance management is developed. The system provides general and integrated information for managers at all levels, which helps the company to improve the capability, efficiency and correctness in decisionmaking.
    Synchronization Mechanism Design and Implementation of Heterogeneous Cadastre Based on Web Services
    GU Ji-rong;CHEN Xian-wei;YANG Hai-long
    2009, 169(9):  27-29.  doi:
    Asbtract ( 956 )  
    Related Articles | Metrics
    Collecting the lower distributed heterogeneous cadastre to upper cadastre, realizing the dynamic and real time synchronization, the paper designs and implements the cadastre synchronization based on Web services and XML, to solve the heterogeneous cadastre which store in different database platforms. The design solves the problem of packet classify into flow, network traffic and real time synchronization, and it is extensibility and applicability.
    Data Extraction Using Regular Expression andIntegration of XML Configuration Files
    SU Xiu-zhi;LOU Xin-yuan
    2009, 169(9):  30-31.  doi:
    Asbtract ( 1036 )  
    Related Articles | Metrics
    Aiming at the actual demand for a particular search engine, it is needed to extract data from the Web pages for its data source. This paper establishes an approach of data extraction based on special framework of Web pages and rules. It implements the method by analyzing the inner structure of Web pages, using regular expressions and the integration of XML configuration files. The method is successfully applied to many information extracting systems, achieving efficiently and accurately data content extraction.
    网络与通信
    Key Technologies Research on J2EE Application Development Based on Hibernate
    AO Xiaoling;HUANG Jin
    2009, 169(9):  32-35.  doi:
    Asbtract ( 1017 )  
    Related Articles | Metrics
    J2EE application development is inseparable from the object persistence technology. The theory and the important interfaces of the new persistence technology Hibernate are researched, the key technologies of developing applications which take advantage of this technology are analyzed. Combining with design and realization of a Weblog’s examples, the implementation of using Hibernate as the persistent layer is introduced.
    ILAR:Routing Algorithm LAR Improvements in Mobile Ad Hoc Network
    LIU Zhong-yu;HUANG Fu-jun
    2009, 169(9):  36-39.  doi:
    Asbtract ( 984 )  
    Related Articles | Metrics
    This paper engages in intensive study on a typical routing protocol based on geographical position——Location Aided Routing (LAR) and puts forward an Improved Location Aided Routing (ILAR) in allusion to the inefficiency of LAR. ILAR protocol consides the distance from routing node to the destination node and the link holding time between them when the transmission node is chosen, which guarantees more stable established path, lower loss rate in the transmission of data, and reduces the control consume effectively. Furthermore, when source node can not find any path to destination node, ILAR rebuilds routing path through local flooding instead of global flooding in LAR to further reduce the netwok control overhead. Simulation results show that, compared with LAR, the successful packet arrival rate of the ILAR significantly increases and the control grouping consume dramatically decreases.
    Implementation of Optimized EJB Architecture Collection System
    XIANG Hong;HAN Xuan-zong
    2009, 169(9):  40-44.  doi:
    Asbtract ( 948 )  
    Related Articles | Metrics
    Considering the shortage of the EJB performance, a new Web development strategy based on J2EE is presented, which integrates the Struts and EJB in this strategy. The data persistence tier among the MVC is implemented by Struts and Entity Bean, and the View and Controller among the MVC is realized via Struts. This strategy is applied to the online collection system with good performance. And the system is used by a famous telecom company.
    Hybrid Petri NetBased Performance Analysis for Urban Transportation Networks
    LI Shu;BAI Xing-zhen
    2009, 169(9):  45-47.  doi:
    Asbtract ( 1694 )  
    Related Articles | Metrics
    Hybrid Petri net is used to model the vehicular transportation networks. By simulations on the hybrid Petri net, the properties of traffic congestion in transportation networks are obtained. Relative congestion and absolute congestion are proposed to describe two kinds of congestion state, and the condition that the state transforms from relative congestion to absolute congestion is considered. Then, real traffic information is combined with the hybrid Petri net to form an instance of the hybrid Petri net, through which the vehicle flows distribution of vehicles in different road segments are obtained. This instance accords with the real traffic conditions and is beneficial to the intelligent transportation system which nowadays only depends on the GPS from taxis to predict the vehicle flows distribution.
    Research on Web Servicebased Countryside’s Information Resources Conformity
    XU Yi-cheng;CHEN Li-ting
    2009, 169(9):  48-51.  doi:
    Asbtract ( 932 )  
    Related Articles | Metrics
    In recent years, considerable progress and remarkable achievement on the countryside’s information resources are got. But, because of having not so much experience, there are still many problems need to be solved in the development of information systems. SOA as a new generation of software architecture, is one of most ideal plans to resolved heterogeneous systems integration, application integration. The article proposes a distance education resources conformity system frame based on Web Service, and a feasible plan that how to use this structure to develop distance learning resources conformity is introduced.
    Research on Personal Meta Search Engine
    YANG Zhi-qi;ZHU Da-yong
    2009, 169(9):  52-55.  doi:
    Asbtract ( 908 )  
    Related Articles | Metrics
    With the fast increasement of Web information and people’s high requirement on query, the traditional search engines can’t meet the people’s requirement. This paper forwards a model of personal meta search engine. Personal means the system can construct different user’s interest model based on different user’s interest. And after result filtering,reranking based on the user’s interest model, the results which returned by the search engines are more valuable to the user who initiated the query. This paper introduces the work principles of the main modules and the result reranking algorithm in detail. The result shows that the search engine can promote searching efficiency and precise ratio.
    Design of Traffic Information Monitor Platform Based on Agent
    WANG Hao;YANG Wen-ji
    2009, 169(9):  56-59.  doi:
    Asbtract ( 954 )  
    Related Articles | Metrics
    An architecture of Comprehensive Traffic Information Monitoring Platform based on Agent is brought forward to improve the scalability and reusability of Highway Traffic Comprehensive Management System. Each module in the transport system is packaged into autonomous, intelligent and collaborative Agent, furthermore, the internal structures of various Agent with different functions or at different levels are designed. According to FIPA Agent, the communication mechanism and protocol among Agents are devised, by which various Agents with different functions or at different levels can be organized to an organic multiAgent system.
    Improvement and Realization of CTSI_GW Server in Fixedline Phone Payment System
    ZHOU Run-lin;WANG Zhi-qian
    2009, 169(9):  60-62.  doi:
    Asbtract ( 940 )  
    Related Articles | Metrics
    The paper puts forward two ways to improve the speed and quality of designing program. The text box, label, picture box and so on can be recognized automatically by programs and can be printed by the program for controls to realize automation of printing. It also introduces practical technique of print preview and realizes printing of complicated forms.
    Application Layer Simulation of Onion Router Protocol 
    LI Yan;YE Xiao-dong
    2009, 169(9):  63-65.  doi:
    Asbtract ( 959 )  
    Related Articles | Metrics
    In order to have a preliminary understanding of onion routing, a simple software about onion router is designed and the results are presented. It shows that the method this paper used is feasible and general.
    Implementation of Serviceoriented Development Framework Based on .NET 
    CHEN Gong-wen
    2009, 169(9):  66-69.  doi:
    Asbtract ( 946 )  
    Related Articles | Metrics
    This article discusses the development of a semifinished products which embody the serviceoriented idea and the enterpriseclass application.Secondary use of the semifinished products can be convenient to develop the various modules into a business component and assembly into a complete system.
    Design and Implementation of Threetier Enterprise Network Architecture
    ZHU Jian-jiang;ZHU Zheng-jiang;PENG Long
    2009, 169(9):  70-73.  doi:
    Asbtract ( 1000 )  
    Related Articles | Metrics
    In this paper, the inadequacy of the original network of an enterprise is analyzed, focuses on the enterprise campus network using Cisco switches to build the core layer, convergence layer and access layer, the threetier network architecture design and implementation, and the expansion of fiber optic cable network transformation program implementation.
    Resources Sharing and Intellectual Property Information Issues on Network Environment 
    GUO Rui-xiang
    2009, 169(9):  74-76.  doi:
    Asbtract ( 945 )  
    Related Articles | Metrics
    In this paper, under the network environment of sharing information resources in the process of intellectual property issues, how to correctly handle the sharing of information resources and the relationship between intellectual property rights, not only the intellectual property rights are not violated, but also the range of information resources are share wildly, to solve the contradictions between them needs to establish laws and regulations related to security system, so as to promote the sharing of information resources to build a state of disorder by the current legal track, and promote the building of a national innovation system.
    Employment Information Site Based on ASP.NET
    YANG Yun;ZHANG Xiao-feng
    2009, 169(9):  77-80.  doi:
    Asbtract ( 951 )  
    Related Articles | Metrics
    For the need of employment information management, the paper designs and developes an employment information site using ASP.NET technology, discusses some key technologies, such as simply factory pattern, threetier architecture, data access, authorization control, and introduces this site’s main function and key codes in detail.
    Analysis and Improvement of LEACH Routing Protocol Technology
    SHAN Xiao-na;LI Li
    2009, 169(9):  81-83.  doi:
    Asbtract ( 938 )  
    Related Articles | Metrics
    As a result of combination of microsensor technology, low power computing and wireless networking, wireless sensor network is a novel technology about acquiring and processing information. This paper briefly introduces the architecture of wireless sensor network, analyzs some problems of the LEACH routing protocol and how to solve these problems.
    信息安全
    Distribution IDS Based on Mobile Agent and Snort
    SHENG Zhi-wei;LIU Shi-jun;HUANG Jian
    2009, 169(9):  84-86.  doi:
    Asbtract ( 936 )  
    Related Articles | Metrics
    This paper provides distributed intrusion detection based on network and host. The system uses Snort as a network for information collection producing MLSI. The mobile agent is used to fusion MLSI to detect intrusion behaviors that can’t be detected by traditional intrusion detection system. The functional components of the system are explained. The system uses the mobile, autonomy and other characteristics of mobile agent to overcome the defects of no realtime, limited flexibility and lack of dynamic expansion in existing distributed intrusion detection system. Finally, an example of attack detection doorknob is given.
    Realization and Comparison of Two Kinds of Transformations Territories Digital Watermark Algorithm 
    WANG Zongli
    2009, 169(9):  87-91.  doi:
    Asbtract ( 908 )  
    Related Articles | Metrics
    In this paper the hypothesis test procedures of two different algorithms using DCT and SVD are analysed.These algorithms on embedding and extracting of digital watermarking based on DCT and SVD are implemented on Matlab platform. These tests prove that the methods are robust. The advangtages and disadvantages of these two algorithms are analysed also.
    Model of Intrusion Detection System Based on ODM 
    ZHANG Hong-bo;KUANG Yin-hu
    2009, 169(9):  92-95.  doi:
    Asbtract ( 102 )  
    Related Articles | Metrics
    Intrusion detection system is an important part of network’s security system. Aimed at the problem of false positive, false negative and lower selfadaptive capability in the artifieial Immunity system, the four kinds of important classification algorithms in ODM, i.e., Decision Tree Classification algorithm, Support Vector Machine Classification algorithm, Naive Bayes algorithm and Binary Logistic Regression algorithm, are used to model and test on the experimental datum. By summing up the experiments, the paper establishes a databasecentric intrusion detection model based on the common model, and states the composition and work flow of the model.
    Survey on Digital Watermarking Technology
    CHEN Wei;LIU Shuying
    2009, 169(9):  96-98.  doi:
    Asbtract ( 962 )  
    Related Articles | Metrics
    Digital watermarking inserts imperceptible signals into audio frequency, video frequency and images to achieve different goals. Based on fundamental principles and its main body frame, digital watermarking is divided into different types such as spatial domain algorithm, transformation domain algorithm, compression domain algorithm, NEC algorithm. The paper points out these domains of digital watermarking worthy of study in the future:(1) fundamental principles and algorithm;(2) standards;(3)network application;(4)combination with advanced techniques in other domains.
    Image Watermarking Algorithm Against RST Attacks
    SHEN Yan-bin;SHU Zhi-biao
    2009, 169(9):  99-102.  doi:
    Asbtract ( 985 )  
    Related Articles | Metrics
    RST attacks are simple and effective ways to attack watermark of digital image. In this paper, an algorithm based on the Fouriermellin transform is proposed. In the embedding procedure, single full Fourier transform is applied, while the second Fourier transform is done on the middle band instead of all bands with some improvements in the transform. The algorithm efficiently reduces the complexity and avoids the image distortion induced by the interpolation. The experiment results show the method is robust against RST attacks and JPEG compression.
    Audio Information Hiding Algorithm Based on MH Public Key 
    FU Xi-hui;ZHAO Yan-qin
    2009, 169(9):  103-104.  doi:
    Asbtract ( 1661 )  
    Related Articles | Metrics
    Secret audio message has to experience all kinds of attacks during transporting. The paper presents a steganography algorithm with strong robustness. It embeds a speech as the secret message into original audio signal, and transmits the secret message in the public channel. The algorithm makes use of Human Auditory System (HAS) characteristics and embeds secret message in the wavelet domain. Combing MH public key and hamming coding, the algorithm not only encrypts the hiding information but also corrects the error coding. It also has strong antidisturbance ability against noise, compression and filter.
    软件工程
    Reaserch on Model Transformation Language Based on OCL
    ZHOU Wu-bin;YU Jin-shan
    2009, 169(9):  105-108.  doi:
    Asbtract ( 889 )  
    Related Articles | Metrics
    Model transformation language is the key to the implementation of MDA, it needs a clear and complete transformation language 〖JP2〗in the whole system of MDA. First analyzes characteristics of model transformation language and situation of the today’s〖JP〗 major model transformation languages. Then makes the theory analysis of OCL as model transformation language. On the basis of the analysis, extendes the object constraints language. At last, gives the framework to model transformation by OCL. 
    Research on Modeling of NETteaching System Based on UML
    LI Jianzhong;HUANG Ting
    2009, 169(9):  109-111.  doi:
    Asbtract ( 911 )  
    Related Articles | Metrics
    The analysis and design of the netteaching system based on B/S model are discussed. And the architecture and of the system are presented, the function and composition of each subsystem are introduced. Beginning with the requirement analysis, several kinds of models are built by using UML.
    图像处理
    Study on Imaging of Weld Imperfection of Ships Based on Acoustic Impedance Rate
    ZENG Bei-kai;LI Sheng
    2009, 169(9):  112-115.  doi:
    Asbtract ( 930 )  
    Related Articles | Metrics
    According to the principles and physical characteristics of ultrasound, a new idea is put forward making use of ultrasonic to detect weld imperfection in shipbuilding. On the basis of the rate of acoustic impedance, an iterative reconstruction algorithm is used to rebuild the 2D image of weld defect. Considers ultrasonic echo as the point locus of the point that the distance between the launching point and defect point is equal to the distance between the defect point and the receiving point, and then has the line integral of the change rate of acoustic impedance. The method improves the resolution of ultrasonic imaging effectively.
    MultiLayer of Detail Based on Triangle Collapse
    LIAO Fukui
    2009, 169(9):  116-118.  doi:
    Asbtract ( 934 )  
    Related Articles | Metrics
    Based on LOD algorithm of triangle collapse, a optimal triangle collapse algorithm is proposed, in which threshold is imported according to mesh simplification extent to control collapse error, thus LODs of 3D model is generated. And more, interpolating algorithm between different LODs is brought forward and smooth transition between different levels of detail of model is accomplished.
    应用与开发
    Building of Teachers’ Working Platform Based on Google Service
    ZHOU Yan
    2009, 169(9):  119-121.  doi:
    Asbtract ( 905 )  
    Related Articles | Metrics
    Based on the case of national quality curriculum for example, this paper introduces selfhelp construction of teachers’ working platform which have function in collaborative business, information sharing and group communication by Google’s sites, docs, calendar and group. This process lays a foundation for trinity system of national quality curriculum including curriculum displaying platform, network teaching platform and teachers’ working platform.
    Design and Implementation of Mobile Phone Game Based on J2ME Framework
    桂林电子科技大学计算机与控制学院;广西 桂林 00
    2009, 169(9):  122-124.  doi:
    Asbtract ( 927 )  
    Related Articles | Metrics
    In this paper, a mobile phone game ‘break out’ is developed based on framework J2ME. Through analyzing the plot and requirement of game, the function is designed. Then the paper gives a detail introduction to design and implementation of the main class, main program, backgroud class and sprite class base on J2ME. At last one of the key technology, implementation of intelligence of enemy plane, is described in brief.
    Design and Implementation of Traceable Code for Quality and Safety of Farm Product
    LIU Zhenggang;LING Jie;HE Xiaotao;XIE Rui
    2009, 169(9):  125-128.  doi:
    Asbtract ( 1036 )  
    Related Articles | Metrics
    In order to indentify a product for farm products quality and safety traceability system, the paper applies the standard of EAN/UCC128 code to the system and converts the getable resource into EAN/UCC128 code as bar code. The paper also shows adequately a blue print of how to encode with regard to the traceable code for quality and safety of food, and makes the label of farm product quality and safety traceability who base on the platform of .NET come true.
    Application of Interactive Programming with PowerBuilder 9 and Flash
    WANG Xian-qian;ZHOU Yan-ling
    2009, 169(9):  129-131.  doi:
    Asbtract ( 922 )  
    Related Articles | Metrics
    Flash has appearance flowing freely, all holding the manifestation, animation button simple and handing strong each other. The paper introduces the process of the usgae Flash conducting and actions in PowerBuilder 9, combined the key step on the elaborate using the PowerBuilder 9 realizes to control for adjusting the Flash.
    Research on Handheld Cure and Nurse Information System Based on Data Query Reusable Components
    FENG Jia-jia;Xue Jin-yun
    2009, 169(9):  132-135.  doi:
    Asbtract ( 105 )  
    Related Articles | Metrics
    This paper attemptes to use a new type of reusable data access components in handheld health care information system, and achieves good results. The system can run on Windows CE embedded operating system and uses embedded mobile database SQL Server CE, and uses a new type of reusable data access components to achieve the operations of database. With this system, medical care personnel can easily access and record a variety of clinical symptoms. And the system can reduce the burden on medical personnel and improve their work efficiency.
    Automatic Recognition of Steel Character Symbol Based on Automaton Theory 
    YANG Lu-lin;ZOU Kuan-cheng;LOU Shan-you
    2009, 169(9):  136-138.  doi:
    Asbtract ( 982 )  
    Related Articles | Metrics
    he statistics of the steel is a key fraction of project budget. Classical statistical approaches of steel are ineffective, errorprone and with many other drawbacks, which however can be excellently overcome by the availability of computer’s automatic recognition. Based on the formal language and automaton theory, this paper mainly studies the automatic recognition of steel character symbol. First it gives a recursive definition and structures a corresponding grammar; then designs a DFA, steel character symbol can be identified. It improves the accuracy,the efficiency in the recognition of character symbol, and provides a powerful foundation for automatic statistics of the steel.
    Design and Realization of Supplier Examining and Approving System Based on J2EE
    ZHAO Jian-tao;HU Xun
    2009, 169(9):  139-141.  doi:
    Asbtract ( 1001 )  
    Related Articles | Metrics
    To improve efficiency of examining and approving supplier, the design and realization method of examination and approval system based on J2EE framework are introduced, and the main point of design of the system is discussed.
    Design of Webbased Production Management System for Small Businesses
    FENG Qing-hua
    2009, 169(9):  142-144.  doi:
    Asbtract ( 902 )  
    Related Articles | Metrics
    A Webbased production process and data management scheme with database and Excel files supported is proposed according to the current situation of small businesses. The templateinstance idea is used for building the entire system. A new idea of database cache is used to improve the speed of querying the Excel cell data and the production process status management, and multiuser collaboration solutions are also advanced.
    Develop Database System on Cellphone with Java Me
    YUAN Jia-qi
    2009, 169(9):  145-148.  doi:
    Asbtract ( 944 )  
    Related Articles | Metrics
    J2Me, the technology based on Java platform is using to develop programs on the equipments which have less memory, simpler monitor and slower CPU. Nowadays, it is almost everyone has his cellphone.The capacity of the auxiliary memory in a cellphone is several GigaBytes.The frequency of the cellphone’s central process unit can reach 500MHz or more.All these make us possible to develop a database system on a cellphone. 
    Noise Receiver Sensitivity on Cylindrical Transducer of Insulation Resistance Influence
    ZHANG Chun-qiang;ZHANG Ming-min
    2009, 169(9):  149-151.  doi:
    Asbtract ( 122 )  
    Related Articles | Metrics
    his paper researches the influence of isolation resistance on the cylinder transducer receiving sensitivity of the noise under the condition of boat loading, derives its expression and verifies it through theoretical calculations. The simulation results show that when the isolation resistance is more than 100, there is no influence on the cylinder transducer receiving sensitivity of the noise, and when the isolation resistance is less than 10, as well as the frequency is less than 4, there is an obvious impact on the cylinder transducer receiving sensitivity of the noise and when the the frequency is more than 6, there is no impact on high frequency. 
    Structure of Security and Protection Monitor System for Community
    WANG Shufang;YANG Zhiyong;ZHANG Li
    2009, 169(9):  152-155.  doi:
    Asbtract ( 906 )  
    Related Articles | Metrics
    Based on network communication, security and protection monitors system as well as it’s subsystem is constituted. Three steps are needed to complete system acquirement described in details, that are sensors node disposition, communication establishment and compound database realization. The pattern recognition technology is applied to the entrance guard subsystem to strengthen the security of system. Considered emergency case such as the earthquake, the fire and so on, the emergency survival subsystem is established to safeguard the community safety especially. 
    Research on Campus Network Synchronous Teaching System Communication Model Based on P2P Technology
    XU Tong-de
    2009, 169(9):  156-159.  doi:
    Asbtract ( 932 )  
    Related Articles | Metrics
    On the basis of research of P2P technology,this paper puts forword communication model of campus network class teaching system based on P2P technology. The model uses IP layer multicast and P2P communication to establish pointtopoint video and audio frequency and exchange of text massage between teachers and students, and almong students the model brings network mode resources into play and strengthens the quality of real time of class teaching and reaches the effect of teaching on the spot.
    Access Control Funtion Applying in Improving MySQL Security
    HU Qi-tao;WU Bi-wei;YAO Pei
    2009, 169(9):  160-162.  doi:
    Asbtract ( 941 )  
    Related Articles | Metrics
    his paper builds a new access control function based on preattacked in order to improve database security, through completely analyzing on the source code of MySQL database. 
    esign and Implementation of Software for 8×155M POS Linecard Based on VxWorks
    ZU Dongyun;TAN Mantang
    2009, 169(9):  163-166.  doi:
    Asbtract ( 149 )  
    Related Articles | Metrics
    Boardlevel software is the foundation on the design of router linecards in highspeed routers. Based on the characteristics of the data processing procedure and requirements of the system controlling, this paper analyzes the function of the boardlevel software of 8×155M POS linecard and divides it into several modules. For the complication and inner high concurrence of the modules, this paper chooses real time tasks in VxWorks to implement the modules, and it also provides the design and implementation of the key modules. The achievements of this paper have been used in the core router and the results show that software runs constantly can meet the requirements of the system.
    Research on Speech Recognition System and Its Characteristic Parameters Extraction
    WEI Xing;;ZHOU Ping
    2009, 169(9):  167-168.  doi:
    Asbtract ( 1384 )  
    Related Articles | Metrics
    In speech recognition system, the choice of characteristic parameters of the system has key influce to identify the impact of performance. This paper researches on several important parameters of the voice characteristics, including the linear prediction cepstrum coefficient, MelFrequency Cepstrum Coefficient, the parameters based on wavelet analysis, etc. And these parameters are analyzed and compared. Finally, prospected the speech recognition research in future.
    Research and Design of Call Center System Based on Asterisk
    WANG Dan;ZHAO Wei-dong
    2009, 169(9):  169-172.  doi:
    Asbtract ( 962 )  
    Related Articles | Metrics
    With the development of the technology of VoIP, the ability of building network application of enterprises is constantly upgraded, and then the development of the call center system is being improved too. The first important problem in a enterprise is that how to build a call center system which is more cheap and functional. These problems are resolved by Asterisk. Asterisk is an open source software of VoIPPBX with the advanced software platform and more application interfaces. The advanced software platform makes the cost of building the call center system become lower, and the more application interfaces makes the functions become more and more perfect. This paper introduces the Asterisk platform and its functions and structures, especially building the call center system using the Asterisk, and then designs the call center system based on Asterisk. 
    Research for System of Remote Medical Diagnosis over Mobile Agent
    ZHU Juan;WANG Yu-qin
    2009, 169(9):  173-175.  doi:
    Asbtract ( 942 )  
    Related Articles | Metrics
    With increasing demand of the modern field medicine and development of the network technology, the modern field medicine diagnosis has already become a hot research spot right now. This paper intendes to introduce the technology related to the mobile Agent and, based on the mobile Agent technology and aiming at characteristics & present status of the system, to offer a design of the remote medical diagnosis system by using its advantages in the technology. The paper gives also specific ideas and methods to further improve and solve such problems in the remote field medical diagnosis as related to lacking of intelligence, flexibility and so on.
    U-Boot Porting on Development Board of Embest ATEB9200
    CHEN Xiao-song;WANG Feng;DENG Hui
    2009, 169(9):  176-179.  doi:
    Asbtract ( 925 )  
    Related Articles | Metrics
    There is a special bootloader for every embedded system, it’s function just as the BIOS program for personal computer, takes charge the boot of system kernel. In this paper, the boot flow of UBoot and the porting process of Uboot on the development board of Embest ATEB9200 are introduced in detail.
    Design of Data Acquisition System of Portable Detector Software Based on LabVIEW Embedded 
    TU Qin;CAI Jian-yong
    2009, 169(9):  180-183.  doi:
    Asbtract ( 954 )  
    Related Articles | Metrics
    This paper introduces the design of data acquisition system of portable detector based on LabVIEW embedded development. This detector combined with a powerful ARM microprocessors and graphics technology of virtual instrument, which can reflects advantage and flexibility. This detector according to different application needs, can be used for the actual collection of various photoelectric signal, and also can scale conversion for different signal. The result shows that the new method gives a better effect.
    Research on Gear Parts Design Technology Based on ASP.NET
    WANG Shan-shan;YANG Qing-hong;WANG Wen-bo
    2009, 169(9):  184-186.  doi:
    Asbtract ( 1024 )  
    Related Articles | Metrics
    Taking gear design as research background, related technology of remote design is analyzed in this article. System structure of gear design system based on Asp.Net is constructed by combination of Web technology and CAD technology. Network implementation of gear part drawing function is emphasized.
    Research and Implementstion of Fulltext Retrieval System Based on CLucene and TinyXml 
    CHEN Long-de;TIAN Qing
    2009, 169(9):  187-190.  doi:
    Asbtract ( 1057 )  
    Related Articles | Metrics
    he paper introduces CLucene, a open source project which is a high performance fulltext retrieval engine, analyzes its architectural, modules and its performance, then proposes a design and implementation of an fulltext retrieva system with CLucene and TinyXml.