Home Table of Contents

10 January 2010, Volume 1 Issue 01
    

  • Select all
    |
    基金项目
  • Lin Zijie
    . 2010, 1(01): 0-0.
    Abstract ( )   Knowledge map   Save
    In order to meet the miniaturization trend of radio frequency identification (RFID) tag antenna,a novel antenna structure based on L TCC technology is proposed.The dimension of the RFID tag antenna are 7.8×8.62×0.8mm.Simulated results show that the proposed antenna has the characteristics of omni -direction and wide bandwidth.Its measured return loss is less than - 10dB in the range 2.4 to 2.5GHz.We also studied the influence of dielectric constantεon the characteristic parameters of antenna.
  • Wang Haihui Zhao Tongzhou Lu Tongwei
    . 2010, 1(01): 0-0.
    Abstract ( )   Knowledge map   Save
    This paper is based on an innovative personnel training for the principles of the practice teaching system,and discusses the overall framework of practical teaching system model.The authors propose to strengthen the soft environment construction during the practical teaching processing,and to carry out the practice teaching content,methods and means,so as to better service for training innovative talents.
  • 算法研究
  • Zhao Miao  Qi Lili  Li Jianjing
    . 2010, 1(01): 0-0.
    Abstract ( )   Knowledge map   Save
    For genetic algorithms used in multi-modal optimization problem can not find all global optimal and local optimal values phenomenon,this paper proposed a class of variation based on niche technology which can improve the searching stability and increase the diversity of individuals in populations.The emulation experiment data has not only optimizing convergence reliability,but also higher converging velocity.
  • 网络与通信
  • Liu Fengming Luo huihui
    . 2010, 1(01): 0-0.
    Abstract ( )   Knowledge map   Save
    This paper presents a Peer-to-peer network reputation system based on a super node.This system separately calculates the transaction reputation and feedback reputation,it could well and truly evaluate the process of the transaction of nodes,effectively detect and beat the actions of nodes through malicious transact and spurious feedback.It could continuously upgrade the reputation of canonical nodes,which could be easily chosen as transaction object,So that the whole capacity of the network would be observably improved.
  • Kong Xianghao
    . 2010, 1(01): 0-0.
    Abstract ( )   Knowledge map   Save
    The security of the third generation mobile system is built on the security of the second generation mobile system, by adopting the secure that have been proved essential and strengthened of the GSM generation mobile system, and rectifying the disadvantage of the second generation mobile system. This paper is devoted to the security of 3G mobile communication system. It firstly introduces the security requirements security architecture of 3G and the security menaces faced. Then mainly discusses security strategy of 3G.It is of great significance for Chinese 3G system construction in the near future.
  • Tang Dengping Wu Fengmei
    . 2010, 1(01): 0-0.
    Abstract ( )   Knowledge map   Save
    The IP address’s reasonable plan is very important in the campus network construction,an level reasonable IP address plan can cause a network easier develop,supports more users.This paper studies the reality of large-scale campus network of the hierarchical IP addressing scheme.The program is a practical project is running well
  • 算法研究
  • Wang Xiang shi Liu Pei lin
    . 2010, 1(01): 0-0.
    Abstract ( )   Knowledge map   Save
    The human auditory system not only perceives the amplititude,pitch,tone and spatial locations of auditory source but also distills the focused source mixed with complex environmental sounds.Algorithm of Computer Auditory Scene try to use computer technology to model the auditory processing.The article introduce the physiological auditory law and take a useful exploration of algorithm of auditory scene analysis
  • Xiang Caibing Ren Chunyun Jiang Qingguo
    . 2010, 1(01): 0-0.
    Abstract ( )   Knowledge map   Save
    To overcome the flux control defect of tbf under Linux environment,the Extended Token Barral Filter(etbf) which can distribute fixed bandwith to an IP of a LAN is put forward.By improving the kernel data structure,the enqueue and dequeue process of tbf,the Etbf extended the number of Token barral filter(tbf),each token barral can control an IP,eliminating the defect of tbf’s bandwith sharing.The result of the experiment shows that each IP can get an fixed bandwith,which achieving the expected effect.
  • 应用技术与研究
  • Peipei Huang
    . 2010, 1(01): 0-0.
    Abstract ( )   Knowledge map   Save

    The research background and significance of Campus E-commerce System are researched in the paper.The target of Campus E-commerce System based on Web is raised.The architecture based on level design is also expatiated.And at last,the flow chart and module design of this system are put forward clearly.

  • Feng Chen  Rong Chen
    . 2010, 1(01): 0-0.
    Abstract ( )   Knowledge map   Save

    Firstly,this paper briefly describes the development of E-Market,gives concepts on MVC pattern and JSP, Servlet,JavaBean.Then,it focuses implementation of the E-Market system framework based on the MVC pattern and JavaBean.It’s useful for the development of the similar systems.

  • Rong Chen
    . 2010, 1(01): 0-0.
    Abstract ( )   Knowledge map   Save
    At first, this paper briefly describes the development and characteristics of the site-cluster system.Then,it proposes a new solution in site-cluster system to overcome the shortcomings of current fourth-generation site-cluster system.According to the software engineering analysis and design method,this paper uses structured analysis method to analyze the site-cluster system of national Institute, and uses structured design method and three-tier architecture idea to design and implement the site-cluster system of the national Institute.Finally,it gives some forward-looking views on the analysis and design for site-cluster system.
  • Yang Xiaowei
    . 2010, 1(01): 0-0.
    Abstract ( )   Knowledge map   Save
    With the rapid development of C2C e-commerce,the credit problems of e-commerce transactions have gradually emerged as the major problems impeding their development.This paper analyzes C2C e-commerce application in the credit evaluation system,sums up the current outstanding problems,and puts forward corresponding countermeasures and suggestions.
  • Li Jinzhi
    . 2010, 1(01): 0-0.
    Abstract ( )   Knowledge map   Save
    This paper expound the basic concept of virtual machine and the necessary of using it;Then discuss how to create the system of virtual machine and the application in network curriculum;Finally,propose how to optimize the virtual machine and the matters should be attended to.
  • Li Ting Li Xiaolong
    . 2010, 1(01): 0-0.
    Abstract ( )   Knowledge map   Save
    Cloud computing provides much broad application prospect to us in the future.Resource management is the core issue of cloud computing system. This article describes the function of cloud computing,analyzing some key technologies involved in the cloud computing resource management system.The author explains the views on some problems,such as cloud storage architecture.
  • 经验交流
  • Chen Changsheng
    . 2010, 1(01): 0-0.
    Abstract ( )   Knowledge map   Save
    The paper firstly introduces the basic conception of channel capacity,and then analyzes two methods to figure out the channel capacity,and progresses the functional design and the arithmetic analysis,plots theirs flow charts,figures out the capacity of common channel using the C language finally.
  • 应用技术与研究
  • Zhang Shiheng  Zhao Xiaopan  Qi Peng
    . 2010, 1(01): 0-0.
    Abstract ( )   Knowledge map   Save
    Modern systems are faced with increasingly complex hardware and software environment,because of the constant development of computer technology.Therefore,Web Service technology is used more and more extensive in modern enterprise systems.This brought new challenges to automated testing which base on traditional systems.By studying the characteristics of Web Service technology,and combined with the current test automation technology,this paper puts forward an Automated Test Solution used in Web Service Interface.The auto-test platform supported by this method has been applied in some large financial institutions,and has good results.
  • 经验交流
  • Zu yinbai
    . 2010, 1(01): 0-0.
    Abstract ( )   Knowledge map   Save
    WEB service is an application program of modularization,self-description and self-adaptive.Its call,positioning and release are going trans-net.This article aims at the distribution application system of enterprise,describes that under different demands,how to make database synchronize and make the business treating.
  • Wang Shurong
    . 2010, 1(01): 0-0.
    Abstract ( )   Knowledge map   Save
    The paper discusses the construction of digital library system based on one smart cart.The main functions are designed and developmented. Business process and data sheet are presented.Another issue which is how to make the digital library into the integration of system is discussed.It is of good value as a good reference.
  • Yang Minghua
    . 2010, 1(01): 0-0.
    Abstract ( )   Knowledge map   Save
    This paper uses Simens S7-300 series PLC as the control system, realizes process examinations, the surveillance, the adjustment of craft equipments such as evaporation chiller, electric precipitator and valve. SIEMENS STEP7 communication module is used in data transmission between PLC and the PLC. And SIEMENS WINCC is used for network monitor, which is convenient for operation.