Top Read Articles
Published in last 1 year |  In last 2 years |  In last 3 years |  All
Please wait a minute...
For Selected: Toggle Thumbnails
E-mail Archiving Technology of MS-Exchange Server and Its Application
Liu Yong
   2012, 1 (3): 0-0.  
Abstract3264)            Save
E-mail is the main way of communication for enterprises to exchange information.Therefore e-mail archiving system appears and becomes a new standard for the qualification construction of a corporate due to the control of enterprise internal management and legal requirements of preservation of the message data.The paper analyzes the key technologies of the e-mail archiving technology of MS-exchange server and points out the advantages and disadvantages of all kinds of the archiving technologies.The methods is applied in some fund companies and approved to be effective.
Related Articles | Metrics
   2008, 1 (8): 24-26.  
Abstract3121)            Save
Related Articles | Metrics
Protection Mechanisms of WDM Ring Networks
Zhang Yiyi
   2009, 1 (4): 32-33.  
Abstract2989)            Save
WDM is one of the rapidly developed technologies in optical transmission.This paper analyses three protection mechanisms of WDM ring network,including the unidirectional wavelength channel protection, bidirectional wavelength channel protection,and the two-fiber optical multiplexing section bidirectional protection.This paper also presents a comprehensive comparison about the three protection mechanisms of WDM ring network.The conclusions may provides some theoretical guide on choosing the correct and effective protection mechanisms with different network environment.
Related Articles | Metrics
Switch VLAN Configuration by Packet Tracer Simulation Software
Song Yanhong
   2009, 1 (4): 74-76.  
Abstract2955)            Save
This article briefly introduces the concepts and technologies of Virtual LAN (VLAN) and the Packet Tracer simulation software provided by Cisco Network Academy.And a more detailed method and step of using Packet Tracer to configure VLAN and VTP are presented,which can greatly enrich the experimental teaching methods.
Related Articles | Metrics
The Implementation of Crystal Reports Data Source Dynamic Binding Based on C#
Shi Junping
   2009, 1 (5): 21-2.  
Abstract2892)            Save
This paper summarizes implementation of VS(Visual Studio) crystal reports. It adopts Object-oriented thought, and gives a new method of dynamic binding of data source for crystal reports based on C#.
Related Articles | Metrics
The Control Of Background Music In Multimedia Courseware Besed On Authorware7.0
Zhang Caitian
   2009, 1 (4): 82-83.  
Abstract2890)            Save
This article discuss about the control methods of background music in making multimedia courseware by using authorware 7.0,which use voice icon、variability、DirectMediaXtra Plug-ins and external functions;emphasize how to play background music randomly by using external function.So that it is very convenient and fast to control the background music in multimedia courseware,then the multimedia courseware become flexible and vivid.
Related Articles | Metrics
Reliability Research on the GPRS Data Transmission under the High Speed Condition
Yu Jian
   2009, 1 (4): 34-35.  
Abstract2857)            Save
GSM-R is a new railway dedicated wireless communication network.As a communication platform for transmission of dispatching command,wireless train number calibration,train control monitoring and other information,the transmission reliability is becoming a research subject concerned by many people.The writer analyzes the characteristics of wireless channel under high speed condition and presents detailed method to improve GPRS transmission reliability under high speed condition combined environmental features.
Related Articles | Metrics
Construction of Computer Multilayer Network Manage & Control System
Shen Dean
   2009, 1 (4): 89-90.  
Abstract2848)            Save
Multi-layer network structure is used to build and integrate systems at all levels,such as the field control,the central monitoring and the management and control dadabase system.Through introducing the solutions of Public facilities large multi-city network control system,an implementation strategy of the multi-layered network structure is proposed in this paper.The purpose of the paper is to provide the overall objective of large-scale construction as well as the step-by-step implementation of the technology route.
Related Articles | Metrics
Design and Implement of 4ASK Based on VHDL
Wang Hongyan Li Zhu
   2009, 1 (5): 23-2.  
Abstract2801)            Save
This paper presented the design and realization ways of 4ASK based on VHDL,which applied hierarchical and modular design and introduced the realization ways of carrier wave generation,amplitude modulation,amplitude discrimination.Finally,the simulation results given by MAX+PUSSⅡ and the test results given by EPF10K10LC84 indicated that the designed system was flexible and reliable.
Related Articles | Metrics
Construction of Web-based Learning Community to Promote School and Enterprise Cooperation Training
Bie Wenqun
   2012, 1 (3): 0-0.  
Abstract2770)            Save
Construction of web-based learning community promotes the staff communication and cooperation between enterprises and school.It not only solves the problem of employees to continue learning,and it can make the higher vocational teachers know the needs of enterprises and the business experience.It realizes resources sharing,experts leading,mutual interaction of students,harmonious development.It gets to the goals of the development and enhancement of enterprises and school.
Related Articles | Metrics
Preliminary Study on the Remove Vehicle Behavior Analysis Based on G/S Model
Zheng Xinjian Yang Wenhui Cao Lihai
   2012, 1 (3): 0-0.  
Abstract2769)            Save
It is possible that spatial information integrates into social life applications as the rapid development of spatial information technology.G/S model is a new network service model of spatial information.This paper expounds a preliminary theory for analyzing behaviors of remote vehicle,which is based on G/S model and third-generation mobile communication technology (3G) and realizes the application in the system of intelligent vehicle scheduling.It gives a test case of the system at last and validates its feasibility.
Related Articles | Metrics
Discussion on GPON Technology and Application
Liu Haicheng
   2012, 1 (3): 0-0.  
Abstract2741)            Save
This paper introduces the GPON system structure briefly, and analyzes the technical characteristics of GPON, and discusses the principle of GPON network construction.
Related Articles | Metrics
The Skill of Circuit Design Based on Multisim 10.0 and the Answer of Faults
Jin Zhenzhen Zhang Liping
   2012, 1 (3): 0-0.  
Abstract2710)            Save
As a practical soft of electronic design,grasping and using Multisim skillfully will facilitate electronic designers.This article describes its application in the directions of design skills and common faults,which is helpful for the designers when designing.
Related Articles | Metrics
Communication of Distributed System: RPC and RMI
Zhou Xiaoyu Lei Xiaojun Chen Fang
   2012, 1 (3): 0-0.  
Abstract2709)            Save
Distributed system is formed by a large number of independent computers through the network.A good communication mechanism is very important when cooperation processes access distributed resources through the network.The article discusses the working mechanisms of remote procedure call (RPC) and remote method invocation (RMI),and displays the working mechanisms through a simple example based on the.Net platform and Socket communication protocols.
Related Articles | Metrics
An Artificial Immune Model Based on Danger Theory
Yin Mengjia
   2012, 1 (3): 0-0.  
Abstract2675)            Save
Self—nonself recognition model has the inherent weakness.In danger theory,sanger is the aim for recognition,so the problems in self—nonself recognition can be successfully avoided.Cloud model is an effective tool in transforming between qualitative concepts and their quantitative expressions.This paper uses the concept or cloud model to estimate systematic parameters and consequently presents the definition of danger signa1.Stimulate model including both self-nonself recognition method and danger recognition method is presented.
Related Articles | Metrics
The Application and Design of Collage Tool book Online System
Qin Qin
   2010, 1 (4): 0-0.  
Abstract2624)            Save
The development of network information and management information system technology provides the basis of book online system.Combing with rich tool book resources and strong requirement of tool book,the paper designs tool book online system from system function design,process design and key tool design.
Related Articles | Metrics
Image Processing Mathod and Anysis Based on MATLAB
Liu Cuiyan
   2009, 1 (4): 84-86.  
Abstract2592)            Save
The paper presents a digital image processing environment which is based on MATLAB, and introduce its structure, characteristics and application. Focuses on the comprehensive using of a variety of algorithms to solve specific application environment of image processing problems, such as histogram equalization for image enhancement, through the morphological approach to image feature extraction and analysis,Fourier transform to analysis image and so on.
Related Articles | Metrics
Design and Simulation of a Novel RFID Antenna
Lin Zijie
   2010, 1 (01): 0-0.  
Abstract2575)            Save
In order to meet the miniaturization trend of radio frequency identification (RFID) tag antenna,a novel antenna structure based on L TCC technology is proposed.The dimension of the RFID tag antenna are 7.8×8.62×0.8mm.Simulated results show that the proposed antenna has the characteristics of omni -direction and wide bandwidth.Its measured return loss is less than - 10dB in the range 2.4 to 2.5GHz.We also studied the influence of dielectric constantεon the characteristic parameters of antenna.
Related Articles | Metrics
Design of Video Capture Card Based on MPEG-4 Algorithm
Cheng Hao
   2009, 1 (4): 69-71.  
Abstract2570)            Save
Digital Video Surveillance System with its characteristics of intuitive, convenient, content-rich information , has become an important component of the security system. The subsystems of Video capture video images achieve the collection and compression of digital video surveillance, which are the most core part of a direct. For a new generation of video surveillance system for video image quality and real-time requirements, the paper design a video capture card of based on DSP and PCI interface.
Related Articles | Metrics
   2008, 1 (8): 20-21.  
Abstract2536)            Save
Related Articles | Metrics
   2008, 1 (8): 22-23.  
Abstract2519)            Save
Related Articles | Metrics
A Summary of Node Coding Scheme of XML Data
Yongcai_Zhang;Huabei_Nie
   2009, 1 (4): 77-79.  
Abstract2500)            Save
On the base of explaining the XML encoding scheme of the basic concepts and technologies, this paper introduces several major coding schemes of XML node from the main idea, principle, features, advantages and disadvantages, combined with the actual use of the current industry situation. It allows readers have a full understanding of XML data coding schemes so as to help for XML query research.
Related Articles | Metrics
Analysis on the Business Application Component Technology EJB of JAVA
Hua Long
   2012, 1 (3): 0-0.  
Abstract2493)            Save
With the rapid development of the software industry,JAVA is applied more and more widely in business software.This paper discusses the connotation of the EJB、EJB roles and the EJB architecture and the difference between JavaBeans and EJB.
Related Articles | Metrics
A Kind Of Deep Web Focused Crawler
Huang Haojing
   2011, 1 (03): 0-0.  
Abstract2491)            Save

Focused crawler is programme of the search engine to automatically download websites, and is a key which the search engines find and index the deep web data.This paper describes a kind of web crawler which using PageRank algorithm to analysis the importance of website,by website structure pruning technic and determine pages algorithms to filter URL is not page-topic needed,effectively improve the quality and efficiency of deep web data integration.

Related Articles | Metrics
Properties of Interpolation-based Numerical Differential and Their Application
Peng Bin
   2009, 1 (4): 49-51.  
Abstract2483)            Save
From the matrix form of interpolation numerical differentiation,by analyzing the characteristics of w(x) of Lagrange interpolation polynomial,several interpolation numerical differential properties under the condition of equidistant nodes are derived,these properties could be used to get low order interpolation numerical differential formula quickly.
Related Articles | Metrics
The Applied Research of Artificial Nerve Network in the Selection and Placement of Volunteers at Sports Meetings
Liao Zhiqiang
   2009, 1 (4): 64-66.  
Abstract2482)            Save
The problem of how to arrange volunteers of different professional knowledge and skills to suitable workplaces arises in the organization and management of almost every large sports meet.The application of constraints satisfaction model of artificial nerve network to selecting and arranging volunteers can solve this problem better.The results of simulated tests show that: the application of the model to large-scale sports meetings can help to find right posts for volunteers to the greatest degree,and can help to develop further arrangement program.
Related Articles | Metrics
Fast Handover of Mobile IPv6
Chen Lijun
   2011, 1 (06): 0-0.  
Abstract2480)            Save
Mobile IP handover is the key technology in mobile IP.So, how to improve the switching performance of mobile IP technology is the hot problem for mobile IP research. The current switching research work includes the researches on the handoff delay, the user behavior, and switching decisions.This paper focuses on two types of typical switching mechanism of Mobile IPv6: fast switching mobile FMIPv6 and hierarchical mobile IPv6 technology.
Related Articles | Metrics
The Selection of Basis Functions of Wavelet Transform in Signal Analysis
Yan Qiang Zhou Dongmei
   2012, 1 (3): 0-0.  
Abstract2478)            Save
Different wavelet basis has different frequency characteristics.The result of a question will be different with different wavelet basis.Therefore,the application of wavelet analysis on the selection of wavelet basis is critical.This paper details the principle of wavelet transform and chooses the wavelet basis function, depending on the application needs to use the corresponding wavelet basis function.
Related Articles | Metrics
Application of ARMA Time Series Model in Sale Forecasting
Dang Jinan
   2009, 1 (4): 55-57.  
Abstract2474)            Save
Time series analysis is one of the most widely used tools in the economic application research field.It describes the rule of the history data with the appropriate model,and analyses the value of the forecasted variables.ARMA model is the most common and important time series model and it is widely used in the forecast of economic field.This paper gives out three models and implementations of the ARMA model,shows out the rules of saling by the sales data of supermarket,and then uses the model to forecast the supermarket sales.
Related Articles | Metrics
The Study of Current Controlled Conveyor Based on Mixed Translinear Loop
Li Heng Wang Liping Wang Minglei Cao Yuanwei
   2010, 1 (11): 0-0.  
Abstract2468)            Save
In the paper the characters of current controlled conveyor and ideal modle are introduced. The design principles and methods of current controlled conveyor and current controlled conveyor with negetive intrinsic resistance are elaborated based on analyzing the translinear loop and the mixed translinear loop.
Related Articles | Metrics
Discussion on the Opportunities and Challenges of the Cloud Computing to the Future of E-commerce
Zhao Liang Jiang Liping Yu Chunjiang
   2012, 1 (3): 0-0.  
Abstract2467)            Save
Cloud computing is the revolution of information industry operation pattern,which has profound influence on the electronic commerce operation mode.This article describes the cloud computing and electronic commerce security requirement and analyzes how to deal with the opportunities and challenges of the Cloud computing to the future of e-commerce.
Related Articles | Metrics
Some Experience on Teaching Professorship Multimedia
Liu Bingjie Huang Kan
   2011, 1 (01): 0-0.  
Abstract2465)            Save
As a modern teaching technique,multimedia technology have been widely used in all spheres of society.This article discusses a series of changes which are brought by multimedia technology to higher vocational education,and the influences to teaching ideas,teaching mode,teaching content and teaching methods.
Related Articles | Metrics
A Case Study:Use Firewall,IDS and IPS to build a Enterprise-class Security System
Huang Weili
   2009, 1 (4): 61-63.  
Abstract2444)            Save
In this paper,we introduced 3 types of security technologies here,firewall,IDS and IPS,and discuss their advantages and drawbacks.In our case study,to overcome their drawbacks,we adapt the layered security framework to combine the 3 technologies to build a strong enough security system.For the business application,the cost effectiveness is vey import,so in our case, we show how to use free resources to build that cost effective system,and also we introduce a method on testing an IPS product,the result shows that our method is valuable and cost effective.
Related Articles | Metrics
Research on the Security of E-Commerce Based on Mobile Agent
Ye Donghai
   2010, 1 (12): 0-0.  
Abstract2442)            Save
With the development of mobile agent technology,the security of mobile agent system becomes one of the important reasons that restrict mobile agent going further.It includes mobile agent security and host security.This paper introduces the security threats of mobile agent technology. Then it presents the security architecture for e-commerce environment, which can effectively protect host security and business data security and confidentiality of user agent.
Related Articles | Metrics
Application and Maintenance of Satellite Video Conferencing System
Meng Qingjing
   2012, 1 (3): 0-0.  
Abstract2433)            Save
This article mainly introduces the basic composition and function of the satellite video conference system,as well as some of the major equipment operation and the handling of common faults.
Related Articles | Metrics
The Virtual Studio System
Zhang Ziliang
   2010, 1 (08): 0-0.  
Abstract2408)            Save
The Virtual Studio System (VSS) was an special technology for TV program producing in recent years,VSS was an integrated product with color key technology,computer software,3D modeling,digital audio and video synthesis processing,the camera tracking technology.This paper has discussed the key technology and the main parts of VSS,and gives some good advice for the establishment of VSS.
Related Articles | Metrics
   2008, 1 (8): 46-48.  
Abstract2401)            Save
Related Articles | Metrics
Using VB String to do a Similar Database Image Processing
Zhang Yuanyuan
   2010, 1 (06): 0-0.  
Abstract2380)            Save
Another way of the access database image processing is explored to design program and teaching process .The trick is to access the database by the name of image files stored in this string data ,but is not the image itself . And the VB function is used to intercept the image file name choosen in the dialog box, in order to store, read and display the image information,.
Related Articles | Metrics
Analysis of Application of Mobile Vedio’s Technology
Bai Chunyu
   2010, 1 (08): 0-0.  
Abstract2374)            Save
Mobile TV and monitor is the main development aspects of the present and the future.The way to achieve mobile TV function and operating mode are analyzed.The advantages and disadvantages of the CMMB are introduced.On the other hand,the features of mobile monitoring and how the realization of“Machine to Machine”are shown.
Related Articles | Metrics
Method of Edge Detection Teaching Using Mathematical Morphology
Zhao Tongzhou Wang Haihui Wang Yanli
   2010, 1 (12): 0-0.  
Abstract2374)            Save
Mathematical morphology has a complete theoretical system,providing an image information extraction method based on image geometric features.In the digital image processing teaching,several teaching methods are discussed to the edge detection using mathematical morphology theory.Better teaching results is achieved.
Related Articles | Metrics
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd