Loading...
  • Table of Content
      10 April 2009, Volume 1 Issue 4 Previous Issue    Next Issue
    For Selected: View Abstracts Toggle Thumbnails
    基金项目
    . 2009, 1 (4): 28-29.  
    Abstract     PDF(0KB)
    Related Articles | Metrics
    网络与通信
    The Operation of Telecommunications Based on WI-FI Technology
    Liu ZhuHui
    . 2009, 1 (4): 30-31.  
    Abstract     PDF(0KB)
    This text explores the application of the WI-FI technology in the telecommunications network , and introduces the application of the optical transport network equipment components and systems. It also discusses the WI-FI from the aspects of Agreement types, equipment operation, the actual application of note.
    Related Articles | Metrics
    Protection Mechanisms of WDM Ring Networks
    Zhang Yiyi
    . 2009, 1 (4): 32-33.  
    Abstract     PDF(0KB)
    WDM is one of the rapidly developed technologies in optical transmission.This paper analyses three protection mechanisms of WDM ring network,including the unidirectional wavelength channel protection, bidirectional wavelength channel protection,and the two-fiber optical multiplexing section bidirectional protection.This paper also presents a comprehensive comparison about the three protection mechanisms of WDM ring network.The conclusions may provides some theoretical guide on choosing the correct and effective protection mechanisms with different network environment.
    Related Articles | Metrics
    Reliability Research on the GPRS Data Transmission under the High Speed Condition
    Yu Jian
    . 2009, 1 (4): 34-35.  
    Abstract     PDF(0KB)
    GSM-R is a new railway dedicated wireless communication network.As a communication platform for transmission of dispatching command,wireless train number calibration,train control monitoring and other information,the transmission reliability is becoming a research subject concerned by many people.The writer analyzes the characteristics of wireless channel under high speed condition and presents detailed method to improve GPRS transmission reliability under high speed condition combined environmental features.
    Related Articles | Metrics
    The Security Scheme Research of Soft Switching in Moving Network
    Zhang Zhengang
    . 2009, 1 (4): 36-38.  
    Abstract     PDF(0KB)
    Firstly,we introduce the architecture of soft switching and the moving soft-switching network, then analyze the security hidden troubles of moving soft-switching network,lastly propose the security scheme of IPSec(tunnel working modes)+certificate server/Policy Server +Iu-Flex.IPSec provides encryption and authentication services in the network layer,which makes this security strategy can protect all IP flow,and makes the control of security scheme more flexible.
    Related Articles | Metrics
    A Preliminary Analysis on Mobile Core Network Coping with Full-service Operation Solution
    Zhang Yan
    . 2009, 1 (4): 39-40.  
    Abstract     PDF(0KB)
    This paper firstly analyzed that data service under full-service conditions is the mainstream of future business development.Then the author proposed two solutions on adopting mobile core network to cope with full-service operation – NGN and IMS.At last,based on comparing and analyzing the two solutions,it is recommended to adopt IMS preferentially.
    Related Articles | Metrics
    数据分析与管理
    The Discussion of Extending OGSA-DAI to Access the Database with a JDBC Driver
    Qi Peng Ding Zhaoyu Chen Ting
    . 2009, 1 (4): 41-43.  
    Abstract     PDF(0KB)
    Grid computing is becoming more and more popular nowadays, but it does not mean that it is becoming easy to use,deploy and program.OGSA-DAI is a middleware capable of exposing and managing databases on the grid. In this work we present an extension to the OGSA-DAI grid middleware,this extension is an implementation of the Sun JDBC interface,used to access databases within the java language.This implementation uses the OGSA-DAI client API.With this work we aim to provide an easy and well known way to enable new and existing developers,and applications to use databases exposed in the grid using the OGSA-DAI middleware.
    Related Articles | Metrics
    Research on Metadata Management of Data Warehouse and Design of Its Architecture
    Peng Jin
    . 2009, 1 (4): 44-46.  
    Abstract     PDF(0KB)
    Data warehouse is the product of development of information management.It can provide great help for decision making.A lot of software systems need to be integrated and many models would be designed during the building of data warehouse.Metadata takes an important role in the design,integration and implementation of data warehouse.This paper discusses the architecture of metadata management of Data Warehouse,the structure of metadata management system and the storage of metadata based on CWM.
    Related Articles | Metrics
    A System Model of Distributed Data Mining Based on .NET Remoting
    Zheng Hong
    . 2009, 1 (4): 47-48.  
    Abstract     PDF(0KB)
    Based on analyzing the system structure and operational principles of.NET Remoting,the paper presents a system model of distributed data mining based on.NET Remoting,it also describes the functions of all the sections in this system and the ways of realization.
    Related Articles | Metrics
    Properties of Interpolation-based Numerical Differential and Their Application
    Peng Bin
    . 2009, 1 (4): 49-51.  
    Abstract     PDF(0KB)
    From the matrix form of interpolation numerical differentiation,by analyzing the characteristics of w(x) of Lagrange interpolation polynomial,several interpolation numerical differential properties under the condition of equidistant nodes are derived,these properties could be used to get low order interpolation numerical differential formula quickly.
    Related Articles | Metrics
    应用技术与研究
    Research and Design of Mobile Phone Games Based on J2ME
    Chen Xing Cui Jianming
    . 2009, 1 (4): 52-54.  
    Abstract     PDF(0KB)
    J2ME is a Java language for small equipment such as cell phones and PDAs. It has greatly increased cell-phone’s capability of supporting games. Based on the brief introduction to J2ME technology, this thesis puts forward a design scheme of my own. As an application, a mobile phone game is designed, and some key techniques are discussed which are used to realize the system. At the end, it also looks forward the development of mobile phone games.
    Related Articles | Metrics
    Application of ARMA Time Series Model in Sale Forecasting
    Dang Jinan
    . 2009, 1 (4): 55-57.  
    Abstract     PDF(0KB)
    Time series analysis is one of the most widely used tools in the economic application research field.It describes the rule of the history data with the appropriate model,and analyses the value of the forecasted variables.ARMA model is the most common and important time series model and it is widely used in the forecast of economic field.This paper gives out three models and implementations of the ARMA model,shows out the rules of saling by the sales data of supermarket,and then uses the model to forecast the supermarket sales.
    Related Articles | Metrics
    Bispectrum Applied in the Leakage Detection of Urban Underground Gas Pipeline
    Zhang Bin Wang Jianming
    . 2009, 1 (4): 58-60.  
    Abstract     PDF(0KB)
    Due to low pressure,complex circumstance noise and weak leakage signal of the urban underground gas pipelinre,it was difficult to detect the signal by general signal processing method which is based on the second-order cumulants.According to higher-order cumulants and bispectrum theory,bispectrum was applied to non-Gaussian signal detection in Gaussian noise,the frequency resolution was improved in bispectrum through the direct method of bispectrum estimates and the use of two-dimensional window,setting up the corresponding hypothesis testing model in actual situation.Experimental results show that the method can be validated to detect leakage signal of low-pressure gas network,the detection distance is not less than 20m.
    Related Articles | Metrics
    A Case Study:Use Firewall,IDS and IPS to build a Enterprise-class Security System
    Huang Weili
    . 2009, 1 (4): 61-63.  
    Abstract     PDF(0KB)
    In this paper,we introduced 3 types of security technologies here,firewall,IDS and IPS,and discuss their advantages and drawbacks.In our case study,to overcome their drawbacks,we adapt the layered security framework to combine the 3 technologies to build a strong enough security system.For the business application,the cost effectiveness is vey import,so in our case, we show how to use free resources to build that cost effective system,and also we introduce a method on testing an IPS product,the result shows that our method is valuable and cost effective.
    Related Articles | Metrics
    The Applied Research of Artificial Nerve Network in the Selection and Placement of Volunteers at Sports Meetings
    Liao Zhiqiang
    . 2009, 1 (4): 64-66.  
    Abstract     PDF(0KB)
    The problem of how to arrange volunteers of different professional knowledge and skills to suitable workplaces arises in the organization and management of almost every large sports meet.The application of constraints satisfaction model of artificial nerve network to selecting and arranging volunteers can solve this problem better.The results of simulated tests show that: the application of the model to large-scale sports meetings can help to find right posts for volunteers to the greatest degree,and can help to develop further arrangement program.
    Related Articles | Metrics
    A TOF Measurement Method Based on Equivalent Sampling and Data Average
    Guo Junzhao
    . 2009, 1 (4): 67-68.  
    Abstract     PDF(0KB)
    The principle of distance measurement in pulse laser rangefinder is described and analysis.A distance measurement based on sequential equivalent sampling and data averaging technology is introduced.This technology is suitable to potable laser rangefinder for its high SNR,high precision and high cost effective.
    Related Articles | Metrics
    Design of Video Capture Card Based on MPEG-4 Algorithm
    Cheng Hao
    . 2009, 1 (4): 69-71.  
    Abstract     PDF(0KB)
    Digital Video Surveillance System with its characteristics of intuitive, convenient, content-rich information , has become an important component of the security system. The subsystems of Video capture video images achieve the collection and compression of digital video surveillance, which are the most core part of a direct. For a new generation of video surveillance system for video image quality and real-time requirements, the paper design a video capture card of based on DSP and PCI interface.
    Related Articles | Metrics
    技术交流
    A Particle Swarm Optimization Algorithm with Nonlinear Function
    Zhu Jiayu
    . 2009, 1 (4): 72-73.  
    Abstract     PDF(0KB)
    To overcome the problems of the particle swarm optimization (PSO),such as relapsing into local extremum in the beginning stage of evolution,slow convergence and low convergence precision in the late stage, we propose a particle swarm optimization algorithm with nonlinear function (nfPSO).In the nfPSO,use a nonlinear function of evolution iteration to control the inertia weight and accelerate coefficient.The experiment results demonstrate that the proposed algorithm is better in the convergence velocity and precision.
    Related Articles | Metrics
    Switch VLAN Configuration by Packet Tracer Simulation Software
    Song Yanhong
    . 2009, 1 (4): 74-76.  
    Abstract     PDF(0KB)
    This article briefly introduces the concepts and technologies of Virtual LAN (VLAN) and the Packet Tracer simulation software provided by Cisco Network Academy.And a more detailed method and step of using Packet Tracer to configure VLAN and VTP are presented,which can greatly enrich the experimental teaching methods.
    Related Articles | Metrics
    A Summary of Node Coding Scheme of XML Data
    Yongcai_Zhang;Huabei_Nie
    . 2009, 1 (4): 77-79.  
    Abstract     PDF(0KB)
    On the base of explaining the XML encoding scheme of the basic concepts and technologies, this paper introduces several major coding schemes of XML node from the main idea, principle, features, advantages and disadvantages, combined with the actual use of the current industry situation. It allows readers have a full understanding of XML data coding schemes so as to help for XML query research.
    Related Articles | Metrics
    The Analysis of the Development Tools Based on Embedded System
    Xu Lei
    . 2009, 1 (4): 80-81.  
    Abstract     PDF(0KB)
    Embedded technology is very popular in family and factory.The user-friendly development tools are necessary because embedded system is very complicated high technology.The paper discusses characteristic and application area about several kinds of the development tools based on embedded system.Because of the choice of the development tools due to actual need,it will be achieved that kinds of kernels in same embedded system cooperate with each other;the task of development will be finished smoothly.
    Related Articles | Metrics
    The Control Of Background Music In Multimedia Courseware Besed On Authorware7.0
    Zhang Caitian
    . 2009, 1 (4): 82-83.  
    Abstract     PDF(0KB)
    This article discuss about the control methods of background music in making multimedia courseware by using authorware 7.0,which use voice icon、variability、DirectMediaXtra Plug-ins and external functions;emphasize how to play background music randomly by using external function.So that it is very convenient and fast to control the background music in multimedia courseware,then the multimedia courseware become flexible and vivid.
    Related Articles | Metrics
    Image Processing Mathod and Anysis Based on MATLAB
    Liu Cuiyan
    . 2009, 1 (4): 84-86.  
    Abstract     PDF(0KB)
    The paper presents a digital image processing environment which is based on MATLAB, and introduce its structure, characteristics and application. Focuses on the comprehensive using of a variety of algorithms to solve specific application environment of image processing problems, such as histogram equalization for image enhancement, through the morphological approach to image feature extraction and analysis,Fourier transform to analysis image and so on.
    Related Articles | Metrics
    DTH Satellite Television y in China
    Lin Zeng
    . 2009, 1 (4): 87-88.  
    Abstract     PDF(0KB)
    With the growing of direct satellite television, direct-to-home satellite television is facing huge opportunity and challenge in china. Therefore, we need the rational analysis of our country course of the development of satellite television and make a comparison with advanced countries to find out the direction of further development of implementation. In this paper, from this point of view, the writer reviews the development of DTH satellite television and proposes the relevant recommendations of the need and suggestions.
    Related Articles | Metrics
    Construction of Computer Multilayer Network Manage & Control System
    Shen Dean
    . 2009, 1 (4): 89-90.  
    Abstract     PDF(0KB)
    Multi-layer network structure is used to build and integrate systems at all levels,such as the field control,the central monitoring and the management and control dadabase system.Through introducing the solutions of Public facilities large multi-city network control system,an implementation strategy of the multi-layered network structure is proposed in this paper.The purpose of the paper is to provide the overall objective of large-scale construction as well as the step-by-step implementation of the technology route.
    Related Articles | Metrics
    Speech Endpoint Detection Method
    Duan Jinfeng
    . 2009, 1 (4): 91-92.  
    Abstract     PDF(0KB)
    This article first studies the basis wavelet transformation the principle,comes using the wavelet transformation and the signal frequency range statistical property to carry on the vertex examination precisely; Then,in has studied in the cepstrum correlation theories foundation,realized has carried on the pronunciation data the cepstrum transformation,through the computation cepstrum distance,in had under certain background noise environment to carry on the vertex examination the experiment.
    Related Articles | Metrics
    LCD Defect Inspection
    Ma Yueping
    . 2009, 1 (4): 93-95.  
    Abstract     PDF(0KB)
    Detect defects in liquid crystal displays in recent years,liquid crystal display technology,has been a qualitative leap Liquid crystal displays are larger desktop computer monitors and high-resolution,high brightness,large screen color LCD projection television sets,the direction of rapid development.However,the difficulty of its production has exceeded VLSI。Its maximum yield only 60% ~ 70%.TFT-AMLCD screen for defects in repair and use of laser redundancy technology to improve their yields are an important means,and to repair defects,first of all to identify deficiencies in the type and precise location,which requires the corresponding defect detection technology.
    Related Articles | Metrics
  News More  


  Links More  


Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd