Loading...

Table of Content

    24 June 2009, Volume 1 Issue 6
    数据库与算法
    Optimal Coverage Mechanism Based on PSO Algorithm in Wireless Sensor Networks
    GUO Yiting;WANG Junnian;
    2009, 1(6):  1-4.  doi:
    Asbtract ( 1723 )  
    Related Articles | Metrics
    An optimal model for coverage in wireless sensor network is established. Then a Stochastic Multiobjective PSO (SMOPSO) based on binary coding is proposed, to compute the maxcoverage area of working sensors and the minnumber of working sensors. And the network redundancy are reduced to extend network lifetime. The simulated results show that the optimal coverage scheme proposed in this paper can satisfy the requirement of low nodes utilization rate and high coverage rate.
    Research on Query for Very Large Compressed Data Warehouse
    ZHANG Yinglong;SHENG Likun
    2009, 1(6):  5-8.  doi:
    Asbtract ( 142 )  
    Related Articles | Metrics
    The query is one of key performance index in OLAP processing, by generating all possible aggregations, the speed of query is improved, but the full materialization can consume large numbers of storage space. According to the distribution of data cube and using compressed technology, the paper first introduces how to materialize the cube to saving storage space, then studies the query on the cube for the targets which have the least storage space and well query speed.
    An Algorithm of Network Loss Ratio Based on Multicast
    LIN Wen;LIN Junwu
    2009, 1(6):  9-12.  doi:
    Asbtract ( 1883 )  
    Related Articles | Metrics
    Network tomography is an emerging network research area in recent years. They use endtoend performance measurement result to derive network internal performance distribution or topology, thus it overcomes traditional network measurement’s shortcomings. The arithmetic described in this paper is based on multicast network tomography endtoend measurement, computing the loss rate. Through comparison and simulation, it is obtained that the loss inferences correctly show the network loss trend.
    Algorithm Analysis of Linux Process Scheduling
    FENG Yu;ZUO Zhihong
    2009, 1(6):  13-15,2.  doi:
    Asbtract ( 148 )  
    Related Articles | Metrics
    In Linux system, process runs all the way as entity. The process uses system resources, and the process scheduling affect the performance of the system: process response time should be as fast as possible, background process throughput should be as large as possible, the phenomenon of process “Starve to death” should be avoid as far as possible, low prior level needs to reconcile with high prior level as quick as possible. This paper analyses many factor which influenced by process scheduling from Linux 2.4.0 kernel, as well as the process scheduling in SMP (Symmetric Multi Processing).
    A Method of Schema Decompositions of HRDB Based on TempSQL Model with Temporal Restriction
    ZENG Huangxing;WEN Xiaojun
    2009, 1(6):  16-20.  doi:
    Asbtract ( 1648 )  
    Related Articles | Metrics
    According to the normalization theory on temporal relationship, a method of schema decompositions of relationship mode to HRDB based on TempSQL model is created. With the temporal restriction about simultaneity in a record and temporal coupling, HRDB is decomposed in terms of projection by properties set or time period in order to eliminate the redundancy and expansion of data.
    Mining Algorithm for Data File of Gepasi
    ZHOU Zhiyuan;DAI Rongyang;LI Hong
    2009, 1(6):  21-23.  doi:
    Asbtract ( 986 )  
    Related Articles | Metrics
    This paper achieves algorithm of the file merge for the Gepasi, and improves the efficiency of simulated research of the cellular signaling transduction. 
    Analysis of 0/1 Knapsack Problem and Its Algorithm
    YING Li
    2009, 1(6):  24-26.  doi:
    Asbtract ( 1445 )  
    Related Articles | Metrics
    Knapsack problem is a typical question in the design and analysis of algorithms, this article primarily introduces back tracking, dynamic programming, greedy method and genetic algorithm, and analyzes the advantages and disadvantages of these four methods for solving 0-1 knapsack problem separately and makes a conclusion. 
    软件工程
    Design of Fresnel’s Biprism Interference Simulation Model
    CHEN Lin
    2009, 1(6):  27-29.  doi:
    Asbtract ( 1144 )  
    Related Articles | Metrics
    The digital model of Fresnel’s biprism interference is built by using software technology. The mathematical model is introduced and the system architecture based on the concept of modularized programming is built up and the core program is designed. The model can provide virtual results for Fresnel’s biprism interference. 
    Research on Electronic Commerce System Modeling Based on UML
    XIA Kefu;;LI Xinke;ZHANG Xiaoqin;
    2009, 1(6):  30-33.  doi:
    Asbtract ( 1164 )  
    Related Articles | Metrics
    Electronic commerce system is the product of the combination of business and technology. For large electronic commerce systems, it must be paid attention and emphasis for the system modeling. This paper analyzes the UML modeling mechanism and electronic commerce system modeling for electronic commerce system characteristics, gives the electronic commerce system modeling process based on UML. Taking bookstore network system UML modeling as an example, the paper discusses the application of UMLbased electronic commerce system modeling in electronic commerce system development.
    Software Design of LED Electronic Display Monitor Based on VB
    REN Yanwu
    2009, 1(6):  34-36.  doi:
    Asbtract ( 960 )  
    Related Articles | Metrics
    The article relates to design the communication software’s design method with Visual Basic in the asynchronous LED electronic display monitor. This communication software has the Chinese character or the random graph code function, and according to the MCU drive type to send the serial communication way to MCU.
    Application of XML Technology in Software Component Library System
    ZHANG Zhiming;ZHOU Dingkang
    2009, 1(6):  37-39.  doi:
    Asbtract ( 1078 )  
    Related Articles | Metrics
    In component classification and description scheme design of the component library system, this paper analyzes the structural facet classification method using XML technology, the component description scheme, and face carved from technology, the development of the evolution of the scheme, gives a detailed analysis of the specific design and realization describe facets, to build software component data model.
    Introduction of Linux Realtimebackup System
    WANG Sheng;WANG Yi
    2009, 1(6):  40-43,4.  doi:
    Asbtract ( 112 )  
    Related Articles | Metrics
    This paper introduces how to connect between user space and kernel space by using virtual device and replaces systemcall in Linux kernel to monitor some directories in which all modifications of files and subdirectories will be copy to another backup machine. By this way, this paper realizes the synchronization of backup between two machines.
    Design and Implementation of Virtual Instrument in Virtual Cockpit
    LIU Dongxin;OUYANG Zhonghui;WANG Dong
    2009, 1(6):  44-47.  doi:
    Asbtract ( 977 )  
    Related Articles | Metrics
    Along with the rapid development of computer technology, virtual simulation technology is used widely for military training. The implementation method of relevant virtual instrument in the ground maintenance process of some type aircraft is mainly researched. The key techniques about GL Studio modeling are researched. By GL Studio instrument simulation tool, it develops the classic instrument. By the Vega Prime, virtual scene drive comes true. And it settles the problem of the implantation from GL Studio models to Vega Prime. The external drive of referring instrument is realized with database. This method gains favorable effects in the exploitation of many projects, it also possesses good versatility.
    Application of Robustness Analysis in Software Development
    ZHANG Chundi;KANG Chunnong
    2009, 1(6):  48-51,5.  doi:
    Asbtract ( 1060 )  
    Related Articles | Metrics
    This article introduces the application of robustness analysis which is a part of a unified object modeling approachICONIX in software development, by a maze creating system. This paper recommends the concept of robustness analysis, using robustness analysis to develop the system of maze creating, and especially discusses its effect of key link between the analysis model and design model.
    OpenTMbased Parallel Programming
    HUANG Xin
    2009, 1(6):  52-55.  doi:
    Asbtract ( 944 )  
    Related Articles | Metrics
    OpenTM extends OpenMP by introducing syntax and semantic of transaction, and provides application programming interface (API) based on directives for transaction memory. This paper modifies LU using OpenTM API, which is one of benchmarks in NPB, and realizes pipeline parallelism though speculation execution of transactions. Experiment shows transaction memory programming is simpler than OpenMP, and is a promising parallel programming model in scientific computing.
    Design of Geographic and Meteorological Information Inquiring System Based on GIS
    WAN Wenhui;HU Youbin;CHEN Baihua;QIU Xuan
    2009, 1(6):  56-58,7.  doi:
    Asbtract ( 1700 )  
    Related Articles | Metrics
    The design of the geographic and meteorological information inquiring system, which is based on GIS, could provide the geographic and meteorological information quickly. This paper describes the framework and primary function of the system, and puts forward the design methods of the main function of modules.
    A Solution Named PEPatch About Revision of PE Document
    JI Qin;YU Guoping
    2009, 1(6):  63-65.  doi:
    Asbtract ( 1849 )  
    Related Articles | Metrics
    This paper analyses the basic structure of PE document, emphasizes the explanation of PE header and section table structure, then introduces a technology on how to add a section table and amend the entry point to the new table. Though this technology, procedures can execute specified code in advance, so as to achieve the purpose of procedure modification and enhancement. In addition, this paper gives a prototype structure which is based on theory, it is named PEPatch, though this structure, it can strengthen the function of this document without its sound code, or in the need to amend the document bug, as well as other requirements of the case, it can amend this document successfully.
    计算机仿真
    Simulations on Harmonic Analysis of Arc Furnace Electrical System
    Lu Xiaodong;ZOU Dong;GONG Qiong
    2009, 1(6):  71-73,7.  doi:
    Asbtract ( 1026 )  
    Related Articles | Metrics

    The alternating current arc furnace is an unbalanced, nonlinear and timevariant load that produces higherorder harmonics during the steelmaking process. The harmonics affect the quality of electric energy in public supply network. Harmonic analysis on arc furnace electrical system is beneficial to adopt the good measure to restrain the harmonics. This paper builds the simulation model of alternating current arc furnace on the basis of the mathematical model of arc resistance by making use of power system blockset and fundamental blockset of MATLAB 6.5/Simulink. By making simulation the results of harmonics analysis on arc furnace system show that 2nd to 7thorder are the main harmonic components in harmonic current of arc furnace. The results are about

    the same with that measured by a harmonic analyzer.

    Principle of Computer’s Discrete Event Simulation
    DENG Shujing
    2009, 1(6):  74-77.  doi:
    Asbtract ( 1002 )  
    Related Articles | Metrics

    This paper introduces the system, system simulation model and the basic concepts. And discrete computer simulation is described in detail, including the basic elements, discrete event system model and discrete event simulation strategy.

    多媒体与图像处理
    To Realize Integrable Ware by Component Technology of Flash
    HU Qiguang
    2009, 1(6):  78-80,8.  doi:
    Asbtract ( 1053 )  
    Related Articles | Metrics
    The component has reusability, integrability and openness. The paper introduces the component technology of Flash, the component characteristics can realize the main ideas of integrable ware with the Flash for integrable ware development platform. Through examples, the paper introduces how to use the component technology of Flash to make integrable ware.
    Design and Implementation of Qtopiabased Media Player
    HE Zhiqiang
    2009, 1(6):  81-83.  doi:
    Asbtract ( 1025 )  
    Related Articles | Metrics
    With the continuous development of embedded systems, embedded processors continue to enhance the computing power, multimedia components of the system has gradually become an important part. At present, the existing several embedded media players are not sufficient for the needs of different application environments. This paper introduces media player with embedded Linux and Qtopia graphical user interface software platform for the design and implementation, provides a popular MPEG1, MPEG2, MPEG4, H.263 format support, providing of player control, playlist support, gives an open decoder plug in interface, and has the entire Chinese language interface.
    Study of Online Video System Based on Oracle10g and Helix Server
    SUN Bin;YAN Weidong;BIAN Hui;AN Bin;FU Huibin
    2009, 1(6):  84-87,9.  doi:
    Asbtract ( 1105 )  
    Related Articles | Metrics
    This paper discusses how to implement online video system based on Oracle10g and Helix Server. This system implements the seamless connection between Oracle database and Helix Server through Oracle interMedia Plugin 2.1 for RealNetworks streaming servers, it improves the management, security and convenience of video data by using the method of video data stored in ORDVideo object of Oracle interMedia.
    PCA Algorithm and Its Application in Face Recognition
    XIE Yonglin
    2009, 1(6):  88-90,1.  doi:
    Asbtract ( 1085 )  
    Related Articles | Metrics
    Principal Component Analysis (PCA) is a linear feature extracting method using KL transform in face recognition.This paper presents the KL transform in details, designs a simple face recognition system to prove the validity, the experiment results show that the algorithms are accessible, and the systems is also capable to some extent.
    Active Shape Models and Integration Projection in Eye Locating
    SHEN Wenzhong;NIU Haifeng;ZHANG Zhongfen;MA Yue 
    2009, 1(6):  91-93,1.  doi:
    Asbtract ( 1040 )  
    Related Articles | Metrics
    Extracting the feature points of eyes fastly and accurately is an important step of monitoring the drivers’ driving states and proposing warning using vision methods. This paper uses Active Shape Models to obtain interested areas for distilling features of eyes, and then extracts the feature points of eyes based on skin color segmentation to this area. The results of experiments which indicate this method has good reliability and timeliness establish good basis for researching driver fatigue detection.
    网络与安全
    Application Study on Neural Networks Control
    ZHANG Songlan
    2009, 1(6):  94-97.  doi:
    Asbtract ( 1001 )  
    Related Articles | Metrics
    This paper gives a brief introduction to neural network control.Firstly, the development and the structure of neural network is introduced. Secondly, several schemes of neural network control are discussed and their principles are given. Thirdly, applications of neural networks on industry are summarized. Finally, the characteristic of neural network and existing questions are summed up.
    A Type of P2P Model Based on Autonomous Area and Hierarchical Structure
    FU Aiying;DENG Gengsheng;ZHOU Jingjing;LIU Chengqi
    2009, 1(6):  98-101.  doi:
    Asbtract ( 1830 )  
    Related Articles | Metrics
    This paper analyzes the current P2P models, and researches the autonomous system and the hierarchical network protocol, then proposes a type of P2P model based on autonomous area and hierarchical structure. In this model, the P2P network is separated into areas by the ASN, adopts OSPF to optimize the routing table and expedites convergence within area. In this model, the central servers record the name of shared files provided by the areaservers,so as to save a lot of diskspace, the areaserver records the catalog information of shared files provided by those peers within same area, it can provide the fastest query to peers, the peer request for query services toward the areaservers, it can reduce network traffic. The model can realize the goal of query and share quickly.
    Discussion on Static Forensics and Dynamic Forensics Based on Computer
    LIU Ling
    2009, 1(6):  102-105.  doi:
    Asbtract ( 1065 )  
    Related Articles | Metrics
    This paper analyzes the difference between the state of computer forensics, points out the difference of computer forensics in the two states, gives general principle of the forensics, and presents a general process of fusion of two kinds of the forensics. Finally, this paper explores and studies the forensics and antiforensics technologies under the two states.
    Research on Geospatial Metadata Management for Web Service
    LI Zhenhua;;LIU Peng;WANG Zhen;XIA Lei;;GAO Chengdong;
    2009, 1(6):  106-109.  doi:
    Asbtract ( 2083 )  
    Related Articles | Metrics
    Geospatial metadata system is one of main ways to solve the spatial information sharing. This paper summarizes the standard and technology that is involved in the process of geospatial metadata management, proposing the way, that based on the global metadata database and multilayers metadata management,for the distributed Web situation. The description of the spatial metadata is not sufficient for the registration with UDDI, so the paper improves the description with the Web service information, also do some first research on the metadata management in the distributed situation.
    Study on Application of WebGIS in Digital Campus Construction
    HU Xusong;ZHANG Fengli
    2009, 1(6):  110-113.  doi:
    Asbtract ( 131 )  
    Related Articles | Metrics
    Currently the digital campus is built in a lot of universities. It is carried out some realizations of first steps. This paper first analyzes current condition of digital campus and summarizes contents of future digital campus, and analyzes GIS’s future development trend, and puts forward a newer topic of digital campus according to WebGIS, and discusses the key technique of WebGIS on digital campus construction.
    Security Analysis and Improvement on IKE Protocol in IPsec
    ZHOU Xiaoyan
    2009, 1(6):  114-116.  doi:
    Asbtract ( 1053 )  
    Related Articles | Metrics
    Internet key exchange protocol is the most important part of IP security protocol.This paper researches the negotiation process of IKE, analyzes its security properties and presents some suggestions on preshared key authentication method in main mode and signatures authentication in aggressive mode. This makes the protocol resist DOS and protects the two sides of communication more effectively.
    Research and Implementation of Campus Information Resource Integration Based on SOA
    CHEN Shoukuan
    2009, 1(6):  120-123.  doi:
    Asbtract ( 1042 )  
    Related Articles | Metrics
    In order to use campus information resource more available and to integrate campus information resource, an information resource integration solution based on SOA is presented. This paper analyzes the feasibility and the necessity of the information resource integration solution, presents the framework of the solution, and explains the implementation process with an example, and applies the solution in a campus in the end.
    Application of Loadbalancing Technology in Campus Network
    HUANG Shiquan
    2009, 1(6):  124-126,.  doi:
    Asbtract ( 1069 )  
    Related Articles | Metrics
    Loadbalancing is one of policy, using to transfer the burdened computing or I/O assignment, in order to enhance the entirety performance of firewall cluster system, ensure the stability of network. With the development of network and the exponential increase of information, firewall gradually becomes the network choke point, restricts the practicality, affects the capability and expansibility. On the other hand, firewall may become the singularity malfunctionpoint of network, take from the usability. The application with autonegotiation dynamic for loadbalancing technology in firewall cluster, can solve and enhance the firewall’s availability, disposal ability, enhance the throughput.
    Design and Implementation of Online Downloading Disk Material Plug-in
    CHENG Baolei;DIAO Hongjun
    2009, 1(6):  127-129.  doi:
    Asbtract ( 998 )  
    Related Articles | Metrics
    This paper proposes a new downloading method of disk material based on the present access method of Web disk material, describes design and implementation of the online downloading disk material plugin. Firstly, the design theory is discussed, the design scheme of the function of plugin is introduced in brief. Next, some key techniques of plugin are analyzed and an example of plugin is given. At last, the summarization is made and the expectation is put forward. 
    Research on Distributed Search Based on JXTA
    YANG Chen
    2009, 1(6):  130-133.  doi:
    Asbtract ( 1022 )  
    Related Articles | Metrics
    This paper introduces JXTASearch which is a search technology based on JXTA platform, first introduces the principle of JXTA distributed search, and then compares with the method of traditional search, at last, realizes the searching based on JXTA platform and based on Web service.
    Automatically Detect,Locate and Isolate ARP Spoofing
    ZHANG Yungao;JI Jie
    2009, 1(6):  134-136,.  doi:
    Asbtract ( 1036 )  
    Related Articles | Metrics
    ARP spoofing can be classified as pretending to be gateways and pretending to be other computers.This paper implements an infrastructure to deal with ARP spoofing. The first type can be found by analysing gateways’s Syslog messages. The second type can be found by analysing routers’ ARP table. After finding the MAC address of ARP attacker, we can locate its access layer switch port, and then shut down the port so as to isolate ARP spoofing.By means of database and SNMP, all this processes can be done automatically.
    Data Distribution Strategy for VOD Proxy Based on Access Probability Prediction of Media File
    ZHAN Zengrong;JIANG Yajun
    2009, 1(6):  137-140.  doi:
    Asbtract ( 1756 )  
    Related Articles | Metrics
    Aiming at the bottleneck problems of network bandwidth and server I/O in the application of VOD systems based on campus network, this paper presents an access probability prediction algorithm of streaming media file, through to statistical regression analysis on the access times of streaming media file and combines both the Zipf distribution and the characteristics of VOD in campus network. According to the prediction result, the paper puts forward a data distribution strategy for VOD proxy servers. The experiment shows that this strategy can efficiently improve system performance and reduce network congestion.
    应用与开发
    Design of Highavailable Integration Platform for Hospital Information System 
    WEN Zhongqiu;WANG Huan;YANG Xiangrong
    2009, 1(6):  141-143.  doi:
    Asbtract ( 1306 )  
    Related Articles | Metrics
    In order to raise the reliability of the hospital information system, this paper proposes a solution of highavailable integration platform for hospital information system with Veritas Storage Foundation HA. Running during two years, the testing system high reliability is proved.
    Application of Virtual Reality Technology on Computer Equipment Experiment
    SHEN Anbin
    2009, 1(6):  144-146,.  doi:
    Asbtract ( 1236 )  
    Related Articles | Metrics
    The architecture of virtual assembly system is put forward. The prototype for virtual assembly system is built based on virtual reality. Key technologies such as the scene control and rendering of Vega Prime, the collision detection algorithm in assembling, realtime editing of computer’s parts modal, position changing are discussed in detail, and the virtual assembly system is applied to practice which is testified feasibly.
    Analysis and Design of Content Management System Based on .NET Platform
    SHOU Zhiqin;LI Weibin
    2009, 1(6):  147-150.  doi:
    Asbtract ( 1236 )  
    Related Articles | Metrics
    .NET is the new technology platform of the Microsoft, according to this platform, technicians can create the application system, which is based on standard, stable and high efficiency. The article introduces the signification of the content management and how to analyse and design the CMS(Content Management System) by using the .NET platform.
    An Improved Algorithm for Melody Matching Applied in MIDI Performance System
    LAN Fan;HUANG Minghe
    2009, 1(6):  151-154,.  doi:
    Asbtract ( 138 )  
    Related Articles | Metrics
    Point to evaluate users’ performance effect in the MIDI performance system, a better matching algorithm is approached to compute the similarity of two pieces of melody. The approach is composed of two different stages: the first stage is dedicated to extracting feature sequence of melody that is played by users with MIDI instruments and the characteristic one of standard melody in terms of musical basic elementspitch, rhythm and intensity. While in the second stage, the pitch, rhythm, intensity matching coefficients are computed in this two feature sequences, and then get the total matching coefficient by weighted synthesizing this three matching coefficients. This total matching coefficient can objectively reflect how familiar the users are with a melody and performance effect in the background of the accompaniment.
    Study on Motor Protector Based on TMS320F2812
    ZHANG Baoqin;ZHENG Yeming
    2009, 1(6):  155-157.  doi:
    Asbtract ( 1002 )  
    Related Articles | Metrics
    According to the kinds of fault problem in running motor, the study on the motor protector based on the chip TMS320F2812 is presented in hardware and software development. After application in actual running motor of several factory, this protector can monitor various fault and protect the motor from damage timely, therefore, the motor can run reliably with the protector.
    Analysis of Virtual Stock Market Based on Multiagent Simulation
    MAO Yuanzuo
    2009, 1(6):  158-161,.  doi:
    Asbtract ( 155 )  
    Related Articles | Metrics
    Precise prediction of the stock market is one of hard requirements for stock investors and macroregulation. Basing on theory of complex system, multiagent simulation simulates the complex social, economic, ecological system. The paper models the stock market based on multiagent system, and simulates this market using MASON. The result of experiments shows that multiagent simulation system can reflect the feature of stock market well, and provides right decision support for stock investment and macroregulation.
    Design and Implementation of Onlinehomework Administration System for University Public Course
    CHEN Hua
    2009, 1(6):  162-164.  doi:
    Asbtract ( 1144 )  
    Related Articles | Metrics
    From the perspective of software development, the paper introduces the concept of architecture design to develop onlinehomework administration system by using ASP.NET, as well as some key technologies that have been solved.
    Implementation of Unified Production Process in SAP Platform
    CHEN Chengdong
    2009, 1(6):  165-166,.  doi:
    Asbtract ( 959 )  
    Related Articles | Metrics
    This paper introduces how to implement unified production process in SAP platform. Within one group, each subsidiary company has its own SAP system and define their own production process. After they are migrated to one SAP platform, the unified production process is required. This paper provides the solution how to realize it.
    Research on Main Architecture’s Realization for Labor Security Platform Based on Service Request Agent
    ZHANG Xiabing;LIANG Bo
    2009, 1(6):  167-170.  doi:
    Asbtract ( 90 )  
    Related Articles | Metrics
    Server request agent architecture’s application platform adopts the pattern of “client side-middleware serverdatabase server (C-S-S)”architecture, and the data communication level adopts standard protocol of Web ServiceSOAP (Simple Object Access Protocol, simple object visit agreement) to package data, making the shares and interoperability available between different platform, avoiding the data format of communication level limited in a certain application platform. Server request agent architecture’s application platform introduces the current and new version of J2EE using the platform (Java 2 Enterprise Edition) skills, the Web Service technology to realize the need, high usability, high extension and high security and so on, for the enterprise application.
    Application and Research on Business Intelligence in Area of Labour and Social Security
    YUAN Xinchang;CHEN Jianzhong
    2009, 1(6):  171-174.  doi:
    Asbtract ( 1092 )  
    Related Articles | Metrics
    This paper introduces business intelligence and it’s core technologies, focusing on the applications to social insurance. Taking example for medical insurance, the paper describes the concrete implementation of the system in detail, and analyses the results of OLAP and data mining. This contributes to establishment and application of business intelligence system on the total social insurance area and strategic decision of social insurance, and provides the scientific foundations.