Loading...
  • Table of Content
      10 August 2011, Volume 1 Issue 08 Previous Issue    Next Issue
    For Selected: View Abstracts Toggle Thumbnails
    应用技术与研究
    A Web Application Development Based on JSF And Hibernate Technology
    BaiYunshan
    . 2011, 1 (08): 0-0.  
    Abstract     PDF(0KB)
    Development based on Java technology, a Web user interface development has the problem of low efficiency and difficult. A new standard framework Java Server Faces (JSF) can solve the above problem. This article introduces the JSF framework and Hibernate technical content, from the application point of view, the two discussed the feasibility of integration, and a web in the development of the JSF framework and Hibernate integration technology model, and analysis of advantages and disadvantages.
    Related Articles | Metrics
    Using Ipsec-tools to Build the Enterprise VPN
    Wang Yulin
    . 2011, 1 (08): 0-0.  
    Abstract     PDF(0KB)
    This paper mainly explains how to use Ipsec-tools tools to configure VPN between in Beijing headquarter and the Guangzhou branch, to ensure the information transfer securely on the Internet .The Ipsec-tools tool is open source code and easy to be managed. It is an ideal tool to realize the enterprise web site to site VPN.
    Related Articles | Metrics
    基金项目
    The design and implementation of e-commerce platform based on the electronic
    ZHOU Bao-zhong XU Yan SHEN Zhang-guo
    . 2011, 1 (08): 0-0.  
    Abstract     PDF(0KB)
    Based on the studies and surveys of the existing e-commerce platform and electronic contract development, it is put forward an e-commerce platform based on the electronic contract which is in the establishment of an asp.net platform. In the system we use valid credentials — electronic contract, to guarantee the credit of the both sides of transactions and clear rights and obligations of the both sides, to reduce conflict. Thus enhances the e-commerce platform of trading volume and promotes the development of electronic commerce.
    Related Articles | Metrics
    Plant information system design and application
    SHEN Xiao-Lin LIU Yan Zheping Xu
    . 2011, 1 (08): 0-0.  
    Abstract     PDF(0KB)
    This paper will be distributed database technology and network technology, and the introduction of plant specimens distributed database technology for network systems, using Web Service technology and asynchronous method called distributed data retrieval, the network will not only facilitate internet users for plant specimens data , And specimens can improve the utilization of data, be conducive to realizing the sharing of resources; The use of Internet technology, ASP and database technology to digital technology will Herbarium, specimens and its various attributes to be a permanent preservation; order to make up a centralized database system in the coverage, renewal rate, access control, professionalism and network load In areas such as the shortcomings, This paper designed and implemented a scalable, distributed information system of plant specimens
    Related Articles | Metrics
    Theoretical Research and Analysis in Artificial Immune Systems
    Deng xiao-wu Li sen-lin Hu Ping
    . 2011, 1 (08): 0-0.  
    Abstract     PDF(0KB)
    Artificial immune systems (AIS) constitute a relatively new area of bio-inspired computing. Biological models of the natural immune system, in particular the theories of clonal selection, immune networks and negative selection, have provided the inspiration for AIS algorithms. Moreover, such algorithms have been successfully employed in a wide variety of different application areas. However, despite these practical successes, until recently there has been a dearth of theory to justify their use. In this paper, the existing theoretical work on AIS is reviewed. After the presentation of a simple example of each of the three main types of AIS algorithm, details of thetheoretical analysis for each of these types are given.
    Related Articles | Metrics
    算法研究
    The analysis of DHP algorithm for association rules
    panyanyan
    . 2011, 1 (08): 0-0.  
    Abstract     PDF(0KB)
    Association rule mining can found useful information from the data. This paper introduces the basic idea of the DHP algorithm. DHP algorithm uses the hash pruning techniques to reduce the amount of data. Illustrate the execution of DHP algorithm and analyze the performance of DHP algorithm. It generates frequent itemsets efficiently, it solves the bottleneck when generates frequent 2 - itemsets performance, and reducing transaction database size and reducing the number of database scans.
    Related Articles | Metrics
    SSH agreement and its safety is discussed
    . 2011, 1 (08): 0-0.  
    Abstract     PDF(0KB)
    SSH (Secure shells) is an application layer security communication protocol, it provides the communication between the identity authentication, communication data encryption processing, data integrity verification for DuoZhong security service. This paper introduces the main contents of the agreement SSH, analyzes the SSH agreement of the most vulnerable to typical of the two kinds of attacks, and the two security hidden danger brings forward the corresponding preventive measures, so as to improve the safety of SSH help.
    Related Articles | Metrics
    网络与通信
    Discussion on Technology and Implementation of Automatic Monitoring System in Optical Cable Transmisson Network
    Deng Senqiang
    . 2011, 1 (08): 0-0.  
    Abstract     PDF(0KB)
    With the rapid development of science and technology,optical cable transmission technology has been widely used in PSTN. The traditional optical cable network maintenances mainly rely on artificial means. With the development of computer technology,the computer network technology and the optical cable test technology are obtained. At present, the optical cable transmission network mainly has monitored by the computer system. This article mainly researches on the optical cable monitor network design and computer network construction design.
    Related Articles | Metrics
    算法研究
    SSH Security Authentication Based on the Key
    Wang Jinheng
    . 2011, 1 (08): 0-0.  
    Abstract     PDF(0KB)
    This paper explains in detail how to use asymmetric key encryption algorithm authentication to remotely manage the Linux operating system on the Windows client environment and Liunx client environment .
    Related Articles | Metrics
    网络与通信
    WLAN positioning in the wireless city
    . 2011, 1 (08): 0-0.  
    Abstract     PDF(0KB)
    With the developing of Wireless City, a lot of new technologies are emerging. WLAN (Wireless Local Area Networks), referred to WLAN, is the production of traditional Internet and wireless communications. It is not affected by the influence of cable, you can achieve mobile communication as a mobile phones, and the networking is very flexible, the expanding capacity is convenient, and it can compatible with a variety of network standards. WLAN can achieve remote access in a local area network. Image, fax, e-mail and many other functions can be provided. The data rates of WLAN are relatively high (more than 11Mbit / s), but the range of service is relatively small. As the traditional wireless broadband access technology, they have their respective advantages and disadvantages. This article will explain the position of WLAN in the wireless city by comparing.
    Related Articles | Metrics
    基金项目
    Informatization construction explore of Food and drug Administration
    QIAN ZHAO
    . 2011, 1 (08): 0-0.  
    Abstract     PDF(0KB)
    The tasks of informatization construction in Food and Drug Administration industry are outlined, and expounds the current situation of informatization construction, put forward the existing problem of informatization construction. Finally , the Countermeasures research for informatization construction are outlined .
    Related Articles | Metrics
    网络与通信
    Research of Mobile Remote Control System Based Bluetooth Technology
    Jiyun Yao
    . 2011, 1 (08): 0-0.  
    Abstract     PDF(0KB)
    In this paper, I proposed a remote control system over Bluetooth, in which a cellular phone can remote control other electronic machines. All cellular phone, computer and electronic machine (such as television) with internal or external Bluetooth can be used in this system. A cellular phone encodes the key event into control code, which is sent to the controlled terminal. The control code is decoded to control action by the controlled terminal according to the decoding scheme. Computer control function is achieved in the experiment.
    Related Articles | Metrics
    Research on RRU Processing Method of Base Station
    . 2011, 1 (08): 0-0.  
    Abstract     PDF(0KB)
    The methods of base-band remote includes radio frequency cable, intermediate frequency, base-band optical pulls , wireless repeater, optic-fiber repeater and so on. This paper introduces the mechanism of various RRU and compares their advantages and disadvantages; then puts forward four kinds of network construction and network optimization schemes.
    Related Articles | Metrics
    应用技术与研究
    DSP and FM25CL64 interface driver software implementation
    Liu Ting-ting
    . 2011, 1 (08): 0-0.  
    Abstract     PDF(0KB)
    This paper is to provide a method for driver software design on TMS320F2812, used FRAM implement the data access interface. It mainly introduced the functional characteristics of DSP chip TMS320F2812 SPI module and FM25CL64 chip, as well as the driver software design of SPI module, memory and application interface. By sufficient test and initial application, driver software design advisability, flexible interface, be able to meet the needs of the system.
    Related Articles | Metrics
    RTP protocol-based real-time voice communication
    Yang hailong
    . 2011, 1 (08): 0-0.  
    Abstract     PDF(0KB)
    With the progress of theoretical and applied research, multimedia network communications at an unprecedented pace, the traditional protocol can not meet the requirements of real-time multimedia network communication. Audio data transmission on the network demanding real-time, high reliability, if you use the TCP protocol can not meet the real-time requirements. This paper describes a real-time transport protocol RTP, and gives the protocol used for real-time transmission of audio data and methods of the implementation process. Avoid the use of traditional TCP protocol for voice communications shortcomings of poor real-time, reduced network latency, and improve voice transmission quality.
    Related Articles | Metrics
    ANALYSIS OF VOD SYSTEM’S PERFORMANCE
    Zhang Jing
    . 2011, 1 (08): 0-0.  
    Abstract     PDF(0KB)
    With the development of multimedia technologies, communication as well as hardware storage technology , the people are not only satisfied with the passive information, but also hope to participate in the program on one’s own , the video on demand (Video On Demand, VOD) is the video distribution service which user might control.The paper analyzies operating efficiency and hit probability question of VOD system.
    Related Articles | Metrics
    Establishment of entrance guard system for electronic information System room
    Zhang Ziliang
    . 2011, 1 (08): 0-0.  
    Abstract     PDF(0KB)
    Entrance guard system for electronic information System room is an important part of establishment for Electronic information system, it applies to access control and record access information. This paper has discussed the main parts of entrance guard system, including access controller, electric lock and identification device, etc.
    Related Articles | Metrics
    Design of Online Video Teaching System Based on HTTP and FLV
    Xie Yunjia Zhong Ruiqiong Zhengwefeng
    . 2011, 1 (08): 0-0.  
    Abstract     PDF(0KB)
    This paper compares the new streaming media technology FLV and traditional streaming media technology, and describes the relative advantages of FLV. Than we design an online video teaching system based on HTTP protocol and FLV, which includes FLV streaming video upload, auto-format conversion, content management, and media playback functions. We focus on the analysis of the technical difficulties, and propose corresponding solutions.
    Related Articles | Metrics
    Research of Network-based Virtual Storage Methods
    Zhang Jun
    . 2011, 1 (08): 0-0.  
    Abstract     PDF(0KB)
    As the network continues to develop, virtual technology has made great the development, become the most development potential of the Virtual research directions. After virtual machine generated, access to welcome through the unique advantages within the industry. Network for the distribution of the resources in each of the physical server and Virtual Machine application of their limitations, and requires a physical location on a server hosting in the same LAN, for network expansion and upgrade has had serious effects on the restrictions, and its development. On the basis of this reason, we focused on virtual storage methods of conducting research to achieve storage equipment, expanding its scope of movement.
    Related Articles | Metrics
    Hotel management information system of research and design
    . 2011, 1 (08): 0-0.  
    Abstract     PDF(0KB)
    along with the computer technology and network development, all walks of informatization office increasingly high degree. Hotel management system is the typical information management system, using the database technology and computer technology, in full in-depth analysis of the hotel management function demand and business based on the needs of the whole process of the hotel management, will stay away from the shop (from) to realize the computer and network office, to ensure the quality of the hotel management efficiency and specifications.
    Related Articles | Metrics
    Discussion on the Design and Practice of Computer Online Courseware Management System
    Cui Jian
    . 2011, 1 (08): 0-0.  
    Abstract     PDF(0KB)
    In the age that information becomes increasingly important, the Internet becomes an important channel that people quickly get, distribute and transfer information. Network releases information mainly through the website. Getting information is also by this way, according to some retrieval methods. This paper mainly discusses the design of computer online courseware management system, hoping to provide students a more convenient platform to share and update the courseware.

    Related Articles | Metrics
    The Internet of things technology in food safety traceability applications
    XiKe; MaXinChun
    . 2011, 1 (08): 0-0.  
    Abstract     PDF(0KB)
    Through the system construction, not only can be traced back breeding and processing of disease and pollution problems, can be traced back in the process of cultivation, processing range of drug abuse in super limited the use of additives, change the past on food quality and safety management focusing on production control, and neglect the production control and prevention, improve the food processing technical specification of health norms, and the production of certification standards, promote the industry’s overall progress, enhance the levels of the food industry.
    Related Articles | Metrics
    News website content management system safety protection strategy system
    Wang Junfei
    . 2011, 1 (08): 0-0.  
    Abstract     PDF(0KB)
    the content management system is the core business news site, is the foundation of the web site application platform, their safety is news site of the importance of safety component. This article through to the system security protection strategy system needs analysis, proposed in the system security protection strategy system design, system and management system from technology for two aspects of content management system safety protection strategy system key problem.
    Related Articles | Metrics
    The constructing train of thought for desktop cloud
    Xinmin chen
    . 2011, 1 (08): 0-0.  
    Abstract     PDF(0KB)
    With the widespread promotion of the PC, individual PC terminals procurement costs, maintenance and management work as a business not a small expenditure, the other, is difficult to guarantee the security of data, therefore, the using of desktop cloud architecture, desktop management and all configuration in the data center, data center administrators can all be unified desktop and application configuration, greatly simplifying maintenance workload and ensure data security. This goes for the construction of the desktop cloud architecture, the key elements of research and analysis
    Related Articles | Metrics
    Explore more Communication Technology and its Development of Frequency
    Xiao Taiwen
    . 2011, 1 (08): 0-0.  
    Abstract     PDF(0KB)
    Spread spectrum communication in the economical use frequency band, and solve the band in crowded plays an important role. It is a kind of can coexist with existing various communication way of communications in the future, has the very broad development prospects.
    Related Articles | Metrics
    LTC1605 and Its Application in HDY-402 Tri-frequency Airborne Electromagnetic Device
    Yang Zhiqiang Li Junfeng;Li Wenjie GuoYong
    . 2011, 1 (08): 0-0.  
    Abstract     PDF(0KB)
    HDY-402 tri-frequency airborne electromagnetic instrument which is independently reasearched and developed by institute of geophysical and geochemical exploration,CAGS,is the airborne electromagnetic measurement system with China-only intellectual property rights,is mainly used for mineral exploration,water resources survey,seawater intrusion investigation and other fields. In this article I will detail the features and functionality of LTC1605 which is a 16-bit A/D converter made by Linear Technology corporation,and its application in HDY-402 System.
    Related Articles | Metrics
  News More  


  Links More  


Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd