Loading...

Table of Content

    30 November 2009, Volume 1 Issue 11
    网络与通信
    Research and Implementation of Instant Communicating System Based on P2P Network
    SHEN Xiao-jin
    2009, 1(11):  0-0.  doi:
    Asbtract ( 812 )  
    Related Articles | Metrics
    With the development of network technique, the software built under P2P technology has been accepted and appreciated by more and more people. This paper researches JXTA technology and P2P network model, and constructs the instant communicating system based on hybrid P2P network structure, and elaborates on various parts of the system implementation.
    数据库
    Realizing Remote Transmission of Multilist Associated Data Using DTS
    LIU Ya-xin
    2009, 1(11):  1-2,5.  doi:
    Asbtract ( 807 )  
    Related Articles | Metrics
    This paper introduces how to realize remote transmission of multilist associated data among internet using DTS. It cites C#.NET and SQL Server for example, describes its realizing principle, means and process. It has great practical value to system developer through the guide of examples and the progress of realization.
    Research on Database Mirroring Application of XML Schema Mode
    WU Ze-zhi;HUANG Hong-mei
    2009, 1(11):  3-5.  doi:
    Asbtract ( 856 )  
    Related Articles | Metrics
    The article puts forward a kind of method that XML schema mode and related technique mirror to the database, making use of C# language of Microsoft.NET platform carry out the application study of reflection. It has widespread practical value and applied foreground to develop database related software.
    Design and Realization of Database Encryption Server Based on Table Fields
    SUN Ping-ping
    2009, 1(11):  6-11,1.  doi:
    Asbtract ( 1680 )  
    Related Articles | Metrics
    It is an effective security measure to encrypt the key data in the database. An effective realization program is put forward on the basis of in-dept research. In this program, the encrypted database can be a variety of common database compliant with SQL standard and the encryption size is a table field, moreover, the key management has a high degree of flexibility. In order to verify the correctness and feasibility of this program, a simulation system of database encryption system is realized. The data from the testing simulation system reveals that the database encryption system design program is feasible.
    算法
    Study on Identification of Figures 0-9 Based on Linear System Theory
    BAI Lu
    2009, 1(11):  12-15.  doi:
    Asbtract ( 612 )  
    Related Articles | Metrics
    A valid algorithm is designed which can recognize figures 0-9 effectively. The algorithm constructs mathematical models of figures with linear system theory, analyses mathematical characteristics with observability and stability of the system, calculates designated values and characteristics vectors. The mathematical models of figures 0-9 are identifiable through counting. It is realized that a computer recognizes figures 0-9.
    New Research Development on Rough Sets and Its Applications
    ZHANG Zheng-chao;;GUAN Xin;;HE You;GUO Wei-feng
    2009, 1(11):  16-21,2.  doi:
    Asbtract ( 673 )  
    Related Articles | Metrics
    Rough sets concepts and theories are introduced based on excellence and character of Rough sets, the development course is overviewed from when it is found up. Then the theory research and application research directions are expatiated. At last, the shortcomings of Rough sets are analyzed and the development trend of Rough sets research is pointed out.
    数据库
    Non-numerical Modeling of Elementary Transformations of Matrix and Model’s Application Research
    YI Fa-ling;ZHANG Hao-ming;XIONG Wei
    2009, 1(11):  22-25.  doi:
    Asbtract ( 818 )  
    Related Articles | Metrics
    This paper builds the record-model that records the process of the elementary transformations of the matrix by analyzing their popular application. The record-model can record all the parameters of the transformation process, and reduces the calculation complex of the matrix transformation. The test results show that the record-model has the better performance than the tradition method in calculating inverse matrix.
    算法
    Research on Rule Match Algorithm in Production System
    GENG Qing-huan;LV Liang-shuang
    2009, 1(11):  26-29.  doi:
    Asbtract ( 603 )  
    Related Articles | Metrics
    The efficiency of the production system is due to the speed of the rule match algorithm in the production system. The most popular rule macth algorithms: the Rete and its improving algorithms are studied, meanwhile, the other rule match algorithms are analyzed.
    Model of Spare Parts Demand Identification Based on Fuzzy Clustering Algorithm
    HAO Fang-ping;WANG Jia-chang
    2009, 1(11):  30-32.  doi:
    Asbtract ( 639 )  
    Related Articles | Metrics

    The species of spare parts in material system of Iron and steel enterprise are very complex, also there are many influent factors on demand, so it’s very difficult to ensure the requirement planning of spare parts. According to the problem of spare parts requirement planning in iron and steel enterprise’s internal, using fuzzy ISODATA algorithm to fuzzy clustering in the influent factors of spare parts purchasing, then, ensuring the membership degree in every kind of influent factor of every spare parts, and using simulation results to verify the feasibility of algorithm, thus, it can accurately determine the most important influent factors’ kind in order to provide evidence for building the model of requirement planning of spare parts.

    Algorithm for Difficulty Distribution Based on IRT
    ZHOU Ming-yuan
    2009, 1(11):  33-35.  doi:
    Asbtract ( 651 )  
    Related Articles | Metrics
    Some algorithms for difficulty distribution may have some suspicions, the paper points out the key that it is the correct expression on interval scaling for difficulty. A novel method is put forward to calculate the difficulty distribution according to the difficulty definition in IRT. Simulation shows the effectualness in application.
    An Improved Algorithm for Polygon Clipping in Complex Polygon Window
    LIU Xue-na;HOU Bao-ming
    2009, 1(11):  36-38,4.  doi:
    Asbtract ( 686 )  
    Related Articles | Metrics
    Polygon clipping is a very hot research issue in computer graphics. An efficient and reliable algorithm for complex polygon clipping in a complex polygon window is proposed. Virtual edges are added to eliminate holes,and traversal method is improved to restore the original appearance of the clipping results. In the new traversal algorithm, after the two polygons are traversed only one time, it is very clever to get all the clipping results and restore the topology between the outside border and the holes of the every clipping result with holes. Neither untie and unite ring, nor recombination of clipping borders is used.
    Shuffled Frog Leaping Algorithm Based on Particle Swarm Optimization
    LUAN Yao-chen;SHENG Jian-lun
    2009, 1(11):  39-42.  doi:
    Asbtract ( 623 )  
    Related Articles | Metrics
    Evolutionary algorithm is a stochastic search method that mimics natural biological evolution and the social behavior of species. This paper introduces a new intelligence search algorithm based on shuffled frog leaping algorithm. First, this paper introduces the basic principle of SFLA and PSO. Second, because of the worse local search of SFLA, and the slow convergence speed, the new algorithm improves the ability of the local search and the steady. It is proved that this proposed algorithm outperforms the two algorithms previously referenced and has better results for function optimization in particular.
    2B-spline Surface Coding in Image Communication
    XUE Xiao-yan;ZHAO Sheng-guang;MA Xin;ZHAO Jian-fei
    2009, 1(11):  43-46,4.  doi:
    Asbtract ( 651 )  
    Related Articles | Metrics
    With the development of multimedia technologies and the widely use of Internet, people require higher performances on the quality, size and applications of digital images, expect to store and transmit large pictures using the limited space and bandwidth resources and receive reconstructed images with different resolutions or quality according to practical needs. These require the picture coding technologies not only supplying high compression efficiency, but also dealing with compressed code streams flexibly. 
    Fuzzy Support Vector Machine Based on Type-2 Fuzzy Set’s Level-sets
    WEN Sheng-yang;ZHOU Qi-yun
    2009, 1(11):  47-49.  doi:
    Asbtract ( 590 )  
    Related Articles | Metrics
    This paper generalizes classics fuzzy set’s level-sets and defines type-2 fuzzy set’s level-sets, makes use of support vector machine and type-2 fuzzy set’s level-sets to classify type-2 fuzzy sets. Experimental results show fuzzy support vector machine based on type-2 fuzzy set’s level-sets can effectively handle fuzzy information of type-2 fuzzy sets and is more robust than traditional fuzzy support vector machine.
    网络与通信
    Design and Implementation of IPSec System Based on HCR
    ZHANG Zhi-yuan;KONG Qing-yue
    2009, 1(11):  50-52.  doi:
    Asbtract ( 865 )  
    Related Articles | Metrics
    IPSec VPN and distributional router technology make great contributions to the safety of network. The IPSec function modules can be implemented on routers. By doing this, we can protect not only the router packets, but also the network service packets. Additionally, the IPSec also can be combined with other VPN techniques to provide security for the IP transport network. So it is of more important significance. This paper puts forward a kind of IPSec System scheme based on HCR, and provides the IPSec process flow on Network Processor(NPC). The design scheme of SADB/SPDB and encryption/decryption modules is also provided.
    Research on VPN Technology Based on IPSec
    LIANG Jun;NIE Rui-hua
    2009, 1(11):  57-59.  doi:
    Asbtract ( 887 )  
    Related Articles | Metrics
    IPSec is a set of protocols to protect data transport on TCP/IP networks. This paper analyses the IPSec protocol architecture, work patterns and achieve mode, sums up the IPSec VPN advantages and disadvantages. Although the IPSec VPN is not yet ripe, it will be the main direction to achieve VPN for its powerful security.
    Personalized Search for Meta Search Engines Based on Clustering and User Interest Analysis
    XU De-xing;LI Jian-min;LIN Zhen-rong
    2009, 1(11):  60-62,6.  doi:
    Asbtract ( 1502 )  
    Related Articles | Metrics
    As the amount of information on the Web increases rapidly, search engines become the major tools for information retrieval. Meta search engines are proposed to increase search coverage by combining several search engines. However, the problem of the information overload becomes more severe and returned results are irrelevant to user’s interests. So the paper presents a personalized meta-search engine model based on clustering and interests. This system constructs a personalized model for every user in order to form different custom crowd, and together with the clustering analysis of the searching results. The model can make search engine return more personalized searching results for users.
    Analysis and Design of 3G Charging Based on J2EE Framework
    XU Wan-zhi;XU Yi
    2009, 1(11):  63-66.  doi:
    Asbtract ( 97 )  
    Related Articles | Metrics
    Comparing with the 2.5 generation communication system, the 3rd network system provides the consumers with more multi-background service. The characteristic of the 3rd generation network system can efficiently charge for many complicated digital services based on its platform. Meanwhile, the usage of component in J2EE construction makes the business logic independent from the Customer part and the Service-provider part, which greatly improves the needs of increasingly sophisticated business logic as well as provides more convenience to develop, maintain. This article first introduces the 3rd network system then analyzes the needs of 3G charging as well as gives the principle of the charging part. At last, it expatiates on how use J2EE to accomplish 3G charging.
    Research on P2P Traffic Identification Method Based on Bayes
    HE Ming-bo;TAN Zheng;SONG Di;LIU Zhen-xiang
    2009, 1(11):  67-69,7.  doi:
    Asbtract ( 877 )  
    Related Articles | Metrics
    The application of P2P technology offers a highly efficient network transmission, and at the same time, these applications also consumes a large number of network bandwidth. In order to effectively manage and control the traffic of different types of P2P, the establishment of an accurate classification model has a great important theoretical and practical value. A method, based on the Naive Bayesian, to realize the P2P network traffic classification, is proposed, which employs the network traffic statistical characteristics and Naive Bayesian method based on the statistical theory to classify the different P2P traffic application. The experimental results show that the method has greater classification accuracy.
    Application of Dynamic Visualization of Apriori Algorithm Under Network Environment
    ZHU Xiao-ying;LUO Fu-qiang
    2009, 1(11):  70-73.  doi:
    Asbtract ( 1580 )  
    Related Articles | Metrics
    To actualize the networking of data mining system, all kinds of algorithm need to encapsulate and deploy. Internet-based data visualization of data mining system poses a higher requirement on the quality of the client’s display. This paper introduces the realization process of the typical algorithm of Association Rules (Apriori Algorithm) on the part of the server, as well as the three ways of the presentation of mining results of client based on Flex technology, and points out the novelty of the visualization of data mining results.
    Research and Application of Communication Network Protocol Transverter Based on CORBA
    ZHOU Yi-qun;TAO Jun-cai
    2009, 1(11):  74-76,8.  doi:
    Asbtract ( 876 )  
    Related Articles | Metrics
    With the development of telecommunication network, the network’s scale becomes more and more large and complex, it is necessary to set up the concentrated network supervisory system for all the communication network. As a soft line, CORBA solves the problem about the different network structure and makes the different network use the object in network. This paper researches the standard of CORBA and introduces the achievement and application by an expmple based on the need for collecting the different object’s data of the comprehensive net supervisory system.
    Analysis and Design of Data Gateway Oriented-IAS
    WU Zhuan-ke;ZHOU Xing-bin
    2009, 1(11):  77-80.  doi:
    Asbtract ( 864 )  
    Related Articles | Metrics
    For the difficulty in building IAS (Integrated Alarm System) caused by the difference of the communication protocol of data and the management information protocol among the different SNMS (Special Network Management System), this paper presents a data gateway model oriented-IAS. The data gateway adopts the model of distributed data collection and plug-in management of the SNMS Protocol Converters. The data gateway has successfully achieved data collection from different SNMS, and provides a unified data model for the integrated alarm system.
    Design and Realization of Web Page Protection Program
    ZHANG Wan-bin
    2009, 1(11):  81-82,9.  doi:
    Asbtract ( 840 )  
    Related Articles | Metrics
    At present Websites are often attacted, and the pages are always tampered. The paper designs and realizes an Web page protection program to protect the page. The program uses Mac, can monitor the Web pages and replace the tampered page by the backup page.
    Application and Research of SPI Packet Interception Technology
    XI Ai-min;HUANG Lei-ming;ZHAN Hui-hua
    2009, 1(11):  83-84,9.  doi:
    Asbtract ( 886 )  
    Related Articles | Metrics
    SPI is the main technology of user-level packet interception under the Windows platform. This paper introduces the packet intercepted-based SPI technology and its working principle, and gives a Windows personal firewall main implementation process message intercepted by the use of SPI technology.
    An Approach to Implement AOP Framework Under .NET Platform
    HU Bing;CHENG Jia-xing;GUO Jian-ye
    2009, 1(11):  85-88,9.  doi:
    Asbtract ( 800 )  
    Related Articles | Metrics
    Aspect-Oriented Programming is a methodology to separate cross cut code across different modules in a software system. It can assist OOP to remove its shortcomings. Some basic concepts in AOP are introduced firstly. Then the implementation mechanisms of AOP are analyzed. Finally an approach to implement AOP Framework under .NET platform and a corresponding example to demonstrate it are given.
    软件工程
    Design and Implementation of Cadre’s Evaluation MIS Based on Struts and Hibernate
    LIU Min;LI Zhi-biao;LIAO Chun-hua
    2009, 1(11):  89-91.  doi:
    Asbtract ( 850 )  
    Related Articles | Metrics
    The problems and shortages in the existing cadre’s evaluation management information system (CEMIS) are analyzed. Integrating both the framework of Struts and Hibernate is proposed. The paper introduces platform architecture, the module features and key technologies of CEMIS. The implementation of CEMIS improves the efficiency of the cadre’s evaluation.
    Research on Generator for Safety Management Information System
    ZHANG Jun-xian
    2009, 1(11):  92-95.  doi:
    Asbtract ( 804 )  
    Related Articles | Metrics
    Modeling for safety management information systems based on the theory of generative programming and domain engineering, this paper introduces a simple domain modeling language GML, and designs a generator parsing GML documents and creating the destination system.
    Design and Implementation of Djomeg Visual Development Environment of Mobile Games
    WANG Hao;DENG Da-ping
    2009, 1(11):  96-99.  doi:
    Asbtract ( 866 )  
    Related Articles | Metrics
    Djomeg system is a visual development environment to develop J2ME games, it makes use of thinking of OOP. There are many Java base classes developed by author in it. These classes can be directly used or be inherited to get new classes by the developer of games, with corresponding J2ME code for developer. The key base classes includes Things class, DoImages class (Image Processing class), ThingsPool class (Object Pool Implementation class).
    Localization Studying of Windows Software Applications
    SU Hui
    2009, 1(11):  100-102.  doi:
    Asbtract ( 824 )  
    Related Articles | Metrics
    With the developing of information technology and more and more economy contacting between different country, software’s localization attaches importance to every aspect. Localization is necessary during software developing; the key problem is to accord with the different country’s culture and language. According to the Windows software’s point, it describes the method by selecting the local resource, compares and introduces the other localization methods.
    A Compact Novel Web Look-up Program
    YANG Hui;;YU La-sheng;OUYANG He-ping
    2009, 1(11):  103-107,.  doi:
    Asbtract ( 1520 )  
    Related Articles | Metrics
    This article describes the design process and realization method for the common Web look-up table application program to develop based on a successful look-up mathematical statistics table Web application program development practice in Visual Studio 2005 environment. The content includes system design, database design, ASP.NET Website establishment, XML Web services establishment and design, Web form design, class code design as well as system testing and publishing,etc. This system calls XML Web services built-in Excel functions or calls directly Access data table to provide mathematical statistics table data sources. This system is based on innovative, compact and convenient, practical, can be also serving as the other applied mathematical statistics software reuse or sharing software.
    Design for Parallele Computation Components Based on Multi-core and Multi-threading
    ZHAO Xiu-lan
    2009, 1(11):  108-111.  doi:
    Asbtract ( 818 )  
    Related Articles | Metrics
    Along with the four-core PC entering market and the success of eighty-core processor in laboratory, multi-core technology is leading software to have baisic changed. Developers need to add threads to use multi-core supplied by system, and thus to promote the performance of applicaton software. This paper discusses how to implement parallel computation in multi-core computers, and introduces the design of multi-threads class based on threads class, including the design of attributes, methods and events, and pay more attention to the resolution of synchronization and mutex problems. Based on multi-threads class, the development of VCL and ActiveX is introduced simply. At last, this paper also simply discusses the foreground for the development for the components of parallel computation in the futrue.
    Research on Execution Patterns of SPIN Semantics Engine
    LI Sheng-hong;FENG Yan-qing
    2009, 1(11):  112-115.  doi:
    Asbtract ( 829 )  
    Related Articles | Metrics
    The PROMELA language, whose commitment manners decide system executions, plays crucial role in model checking tool SPIN. This paper studies semantic engines of PROMELA. Firstly, a formal model of PROMELA is given. Secondly, the denotational semantics of PROMELA are described by the mapping between syntax of PROMELA and the model, and discusses the specific issues such as atomic sequence, rendezvous channel, and their solutions. Finally a case study demonstrates PROMELA working principle.
    计算机辅助教学
    Research on Teaching Evaluation System Based on Data Mining
    YUAN Yan;LI Hui
    2009, 1(11):  116-119,.  doi:
    Asbtract ( 894 )  
    Related Articles | Metrics
    The teaching evaluation system is an essential tool and approach for monitoring and controlling the teaching quality. From the perspective of data analysis, this paper conducts a research on factors that influence the teaching quality such as the subjects and the procedures, and their relationship by applying association rules and decision tree data mining algorithms into the teaching evaluation system. It is aimed at putting forward a rule-discovery approach suitable for the teaching evaluation and applying it into practice so as to improve teaching evaluation skills and finally better serve teaching practice.
    Design and Development of Learning Forum Based on Web
    ZHOU Li-li
    2009, 1(11):  120-123.  doi:
    Asbtract ( 832 )  
    Related Articles | Metrics
    The paper introduces the structure of Web application system and the technology essentials on ASP. By ADO and database mechanisms being applied to the pages, it updates dynamic page. And the basic functions of learning forum are designed and developed with ASP technology.
    Building of Teaching Resources Knowledge Base Based on Ontology
    YANG Ling-xian
    2009, 1(11):  124-126.  doi:
    Asbtract ( 833 )  
    Related Articles | Metrics
    This is becoming an important research subject that to manage teaching-resources effectively and to realize sharing and using adequately on the semantic level along with teaching-resources enriched continuously. Knowledge base of teaching-resources building model based on ontology combines domain knowledge with OWL to construct domain knowledge base, in order to form semantic space then to realize knowledge sharing and to resolve the problems of semantic inter-operation based on concepts sharing.
    Development of Streaming Media Network Experiment Based onMulti-scenes Planning and Dynamic Interaction
    YU Guo-fang;LI Jian
    2009, 1(11):  127-129,.  doi:
    Asbtract ( 779 )  
    Related Articles | Metrics
    Taking the shift register of digit electronic technology as an example, this paper designs and develops a streaming media experiment courseware by use of Flash multi-scenes planning, ActionScript control as well as flexible animation technology, so that students can carry out experiments operation or simulation exercises on the internet anytime and anywhere, which both to alleviate the workload of the laboratory, but also enriche the demonstration of ability of the experimental results.
    Design and Implementation of Teaching System Based on JSP
    ZHANG Shu-juan;WANG Qing-min
    2009, 1(11):  130-132.  doi:
    Asbtract ( 155 )  
    Related Articles | Metrics
    To design and develop the network teaching system with JSP technology, which lets more learners to share the excellent teaching resources. The system uses the B/S structure and JSP/Servlet technology as development tools, the system analysis and the main function are given, then the system structure is builded, and the essential technologies are given.
    图像处理
    An Applied Research on NET Video Compression with DirectShow 
    XUE Yong
    2009, 1(11):  133-135.  doi:
    Asbtract ( 794 )  
    Related Articles | Metrics
    Within many video compression criteria, MEPG-4 is especially floured for its high compression ratio and good quality, becoming the mainstream of video compression technology in NET video. In the practical usage, the complexity for the arithmetic of MEPG-4 considered, the video application of MPEG-4’s compression function is fulfilled supported by developing platform with Visual C++ and Microsoft’s DirectShow and by embedding DivX or Xvid Codec. In this way, the complex arithmetic of MPEG-4 could be avoided and better compression effect could be achieved, thus improving the developing efficiency.
    Study on Color Image Sharing Algorithm Based on Chaos System
    MA Qiao-mei;ZHU Lin-quan
    2009, 1(11):  136-138,.  doi:
    Asbtract ( 131 )  
    Related Articles | Metrics
    In order to realize secret transmission of color image, the color image sharing algorithm is given. Firstly, the monochrome images are obtained from the color image, and then, every monochrome image is divided into four images, lastly, these divided images are encrypted using the key-stream created by logistic chaotic system and are hidden in carrier images. Decryption process adopts opposite steps and the original image is obtained. An encryption and decryption system is realized. This algorithm is efficient and safe.
    Image Retrieval of Sub-image Color Histogram Based on Binary Tree Quantification
    WU Yuan-ren;
    2009, 1(11):  139-142.  doi:
    Asbtract ( 850 )  
    Related Articles | Metrics
    In order to solve that the existing color histogram retrieval technology exists less robust, feature dimension is too high and so on, a binary tree at all levels based on image pixel sub-image color histogram of image retrieval methods is proposed. First of all, the method combines the characteristics of noise attack, extracts important image pixels of the binary tree at all levels to quantify sub-image color histogram and the right to determine their visual value; then constructs an important tree image pixel color sub-image histogram; finally, important sub-binary tree image pixel color histogram for the characteristics of images to calculate the similarity between images and content retrieval. Simulation results show that this method is not only able to accurately retrieve the user desired image, but also for light, sharpening, fuzzy and other attacks has a better noise robustness.
    Design of Image Acquisition and Storage System Based on ARM and FPGA
    ZHAO Jie-sheng;WANG Qi
    2009, 1(11):  143-146.  doi:
    Asbtract ( 812 )  
    Related Articles | Metrics
    This paper designs a high-speed image acquisition and storage systems based on ARM and FPGA. The system uses SAA7113 video encoder chips and FPGA to achieve high-speed video capture, the data is read and put into high-capacity hard disk storage memory by the ARM processor. It is possible for digital images to be dealt with follow-up.
    Research on System Integration of GIS and RS
    XU Bin
    2009, 1(11):  147-150.  doi:
    Asbtract ( 777 )  
    Related Articles | Metrics
    RS information has the advantages of periodic and dynamic character, abundant information, high efficiency of acquirement and so forth. GIS has the ability of efficient management of spatial data and agile compositive analysis of spatial data. But both of them have some limitation. As development of GIS technique and RS technique, the people urgently hope combine RS’powerful function of image processing with GIS’powerful function of spatial analysis to solve increasingly complicated environment problems. Therefore, the system integration of GIS and RS has become hot problems. This paper synthetically analyzes the system integration actuality of GIS and RS, discusses technical methods of the system integration of GIS and RS, the key problems and quomodo. As the progress of observation technique on land, to RS as the core, combining with the system integration of GIS has become mostly trend of current development.
    应用与开发
    Research on Enterprise Information Integration Instructor
    LIU Shun-chao
    2009, 1(11):  151-153,.  doi:
    Asbtract ( 929 )  
    Related Articles | Metrics
    Development of information system always is a complex and long-term work. This situation restricts information sharing between many application systems, and reduces the efficiency of information system. The establishment of Enterprise Information Integration Instructor(EIII) is the appropriate choice for solving this problem. This paper discusses how to establish the EIII by the implementation of unified directory, data center, data exchange system in the case of company.
    AD Conversion and Microchip Simulation by Using Proteus Software
    GAO Rong-jie;ZHANG Hai-liang;GONG Liang-ming;LIU Yan-de
    2009, 1(11):  154-156.  doi:
    Asbtract ( 1729 )  
    Related Articles | Metrics
    The function of AD conversion by using ADC0808 chip has been widely used in many fields and has greatly facilitated people’s work and life. Analog data of tunable resistor is converted into the digital data by using ADC0808 chip, microchip AT89C52 is used as main controller, the conversion result is output through P1 port of the microchip and is displayed by using the LED device. In this design, KEIL C is used as the programming software, AD conversion simulation is through using the Proteus software, the effect of the simulation result is nice and can meet the requirement of practical application.
    Enhance of Device Identification of Bluetooth in Intelligent Housing System
    YANG Zhi-bin;ZHOU Xing-bin
    2009, 1(11):  157-159,.  doi:
    Asbtract ( 799 )  
    Related Articles | Metrics
    For its low-cost and low-power, Bluetooth, the wireless access becomes first choice of the intelligent housing system. But because of the interference among the houses and among the different networks, the speed of device identification and construct network of the Bluetooth controller is been effect. This paper uses the CoD field of FHS group package to carry the message of housing marker and network marker, effectively reduces the interference between Bluetooh devices, accelerates the process of device identification and the speed of construct network. Finally, the paper makes a key analysis at the case of Bluetooth device enter and exit the intelligent housing system, the feasibility of whole system is ensured.
    Application of Multi-thread in Distributed Flight Ensuring Train Simulation System
    BAI Hua;LIU Dong-sheng;SONG Fa-xing;GUO Jian
    2009, 1(11):  160-162.  doi:
    Asbtract ( 800 )  
    Related Articles | Metrics
    The article discusses the application of multi-thread in Windows, introduces the programming method of multi-thread by Visual C++ 6.0, and presents an example of multi-thread in distributed flight ensuring train simulation system. The system works steadily and software frame is concise. It fulfills the requests of network transmission, malfunction analysis, flow and plane vision simulation in microcomputer system.
    Embedded Anti-theft System Based on Voiceprint Recognition
    MAO Jian;LIN Qi
    2009, 1(11):  163-165.  doi:
    Asbtract ( 865 )  
    Related Articles | Metrics
    The anti-theft system is based on voice print identification algorithm. This paper uses a chip design MINI2440 to make voiceprint lock hardware system, combines with the development ARM9 embedded operating system, Linux hardware driver programming design method, and peripheral drive circuit and electronic lock module. After system testing, it can be verified to be useful in certain area.
    Development of Embedded Linux Digital Mixer Based on Blackfin
    TANG Cun-dong;LI Tian-feng;WANG Zhi-ping
    2009, 1(11):  166-168,.  doi:
    Asbtract ( 1569 )  
    Related Articles | Metrics
    This paper introduces a Blackfin-based embedded Linux digital mixer motherboard development. The entire system includes hardware design, embedded uClinux transplantation on the Blackfin, embedded Linux drivers and application programming. The paper describes the key parts of hardware circuit design. The paper embedded Linux drivers mixer design and communication with the PC program.
    Design of Online Bookstore System Based on SSH Lightweight Frame
    LI Ze-ming
    2009, 1(11):  172-174.  doi:
    Asbtract ( 871 )  
    Related Articles | Metrics
    This paper introduces the online bookstore system based on SSH, and elaborates its development process using J2EE technology. The whole system reflects the principle of multi-layer structure model and programming aimed at interface in object-oriented development. In the development of the system, the three-tier of Java EE structure which contains view layer, business logic layer and data services layer is used.
    Computer Integrated Information and Metallogenic Prediction
    MA Si-gen;;HE Ming-qin
    2009, 1(11):  175-178.  doi:
    Asbtract ( 759 )  
    Related Articles | Metrics
    Metallogenic prediction takes the metallogenic theories as instruction. It analyses metallogenic geological condition and metallogenic indexes in a certain region, and infers ore deposit which possibly exists in that region and its essential feature. With deep-going of geological exploration continuously and developing of exploratory technique quickly, an abundant multiple information of geology has been obtained. Thus, this causes the possibility of integrated information metallogenic prediction. Computer integrated information metallogenic prediction applies the computer integrated multiple geological information to enhance the scientific nature and the accuracy of metallogenic prediction. Computer integrated information metallogenic prediction system is usually developed based on the basal geographic information system. It uses variety of analytical methods of geographic information system to outline perspective areas and provides a basis for further exploration prospecting.
    Research on Data Mining Techniques in Real Estate CRM Application
    HUANG Xiao-bin;WANG San-min;QIU Yu-hui;WU Wei-sheng
    2009, 1(11):  179-182.  doi:
    Asbtract ( 808 )  
    Related Articles | Metrics
    With the increasing competition in real estate, data mining techniques as a tool of analysis and assistant decision-making are more widely applied. This article introduces the basic concept on data mining techniques and its common techniques from the application point of view, and elaborates on the data mining techniques applied in real estate based on the analysis of real estate market analysis and real estate client.
    Design and Implementation of Quality Management System for Vehicle Parts
    CHEN Yi-jun
    2009, 1(11):  183-185,.  doi:
    Asbtract ( 1563 )  
    Related Articles | Metrics
    Vehicle quality has gradually become the focus of attention. Vehicles parts quality management is the most important in vehicle quality control. A quality management system for vehicle parts, which can effectively manage the provider, vehicle parts, vehicle style and quality risk level, is proposed. To correctly evaluate the comprehensive capability of providers, a suite of indicator systems suit for vehicle parts are built. Finally, the system is implemented and applied.
    Study and Design of Vehicle Navigation System Based on Real-time Update Technique
    HOU Dan-gui
    2009, 1(11):  186-189.  doi:
    Asbtract ( 850 )  
    Related Articles | Metrics
    This paper introduces a vehicle navigation software system based on dynamic update technique of electronic map and navigation technique with real-time traffic information. First the development of vehicle navigation technique and involved techniques are analyzed. Then the system architecture and functions of each model are introduced. Finally relative algorithms of dynamic update technique are also proposed.
    Research and Application of C8051F SMBus Based on Inquiry Mode
    ZHU Ping;SONG Jie
    2009, 1(11):  190-191,.  doi:
    Asbtract ( 925 )  
    Related Articles | Metrics
    Because of less pin layout, SMBus is widely used in instrument design. Now with C8051F MCU, most of applications are based on INT mode. This paper gives the code of SMBus in inquiry mode, and also gives the solution of special problem while using this mode.
    Implementation of Community-based Digital Video Network Security Monitoring System
    WANG Shu-fang;YANG Zhi-yong;LI Yi-nan
    2009, 1(11):  192-194.  doi:
    Asbtract ( 826 )  
    Related Articles | Metrics
    Community safety is the foundation of social stability and unity. Taken the real community as the background, network-based digital video security monitoring system for community is designed and realized. Ordinary cameras and video cameras to servers or network cameras are taken as the collection point. The signals are transmitted to Ethernet through switch and then are stored as background database through switch. At the same time, the signals are monitored and communicated with the higher level. The results show that the system can effectively complete the community video surveillance.
    Construction and Application of Hospital PACS
    WU Bin;HUANG Hui-meng;ZHENG Kai
    2009, 1(11):  195-197.  doi:
    Asbtract ( 859 )  
    Related Articles | Metrics
    On the base of construction and application of hospital PACS, this paper discusses briefly the general ideas of the system, basic components, the progress of system running, the functions, the realization of system and the development orientation. PACS is propitious to the management of the radio materials and transmission as well as soup up the efficiency of the entire hospital.
    Architecture Design of Vehicle Security Management Integrated Information System Based on SOA
    JIN Hai-feng;ZHOU Qi-yun;XIAO Xiao-fang;WANG Le
    2009, 1(11):  198-200.  doi:
    Asbtract ( 880 )  
    Related Articles | Metrics
    According to the actual requirement of vehicle security management, this paper establishes a software structure of integrated services system based on SOA mode. A discussion is made on the system architecture, each software level and way of design. The practical application results show that the system architecture based on SOA mode can satisfy the changing procedure of management business and the integration of heterogeneous system well.
    Research on Application of SCA in University Enroll System
    ZHAO Xia-li;HUANG Chuan-hua
    2009, 1(11):  201-203,.  doi:
    Asbtract ( 884 )  
    Related Articles | Metrics
    This paper introduces the basic concepts of SOA and SCA. For the difficulties of the university enroll system, a general frame of SCA-based university enroll system is proposed, and the main module is designed and implemented.
    Design Scheme of College Teachers Information Management System
    HU Ya-ping;DU Juan
    2009, 1(11):  204-206.  doi:
    Asbtract ( 850 )  
    Related Articles | Metrics
    This article expounds an available scheme which is aimed at the college teachers information management system, and focuses on analyzing the database structure and the formation of the functional modules about the system, and also proposes the key mind and technology in the program.