Loading...
Acta Metallurgica Sinica
Home
IMR Journals
Subscription
Advertisement
Contact us
中文
Search
Citation
Fig/Tab
adv Search
Just Accepted
|
Current Issue
|
Archive
|
Featured Articles
|
Special Collection
|
Most Read
|
Most Downloaded
|
Most Cited
Table of Content
10 August 2011, Volume 1 Issue 08
Previous Issue
Next Issue
For Selected:
View Abstracts
Download Citations
EndNote
Reference Manager
ProCite
BibTeX
RefWorks
Toggle Thumbnails
应用技术与研究
Select
A Web Application Development Based on JSF And Hibernate Technology
BaiYunshan
. 2011,
1
(08): 0-0.
Abstract
PDF
(0KB)
Development based on Java technology, a Web user interface development has the problem of low efficiency and difficult. A new standard framework Java Server Faces (JSF) can solve the above problem. This article introduces the JSF framework and Hibernate technical content, from the application point of view, the two discussed the feasibility of integration, and a web in the development of the JSF framework and Hibernate integration technology model, and analysis of advantages and disadvantages.
Related Articles
|
Metrics
Select
Using Ipsec-tools to Build the Enterprise VPN
Wang Yulin
. 2011,
1
(08): 0-0.
Abstract
PDF
(0KB)
This paper mainly explains how to use Ipsec-tools tools to configure VPN between in Beijing headquarter and the Guangzhou branch, to ensure the information transfer securely on the Internet .The Ipsec-tools tool is open source code and easy to be managed. It is an ideal tool to realize the enterprise web site to site VPN.
Related Articles
|
Metrics
基金项目
Select
The design and implementation of e-commerce platform based on the electronic
ZHOU Bao-zhong XU Yan SHEN Zhang-guo
. 2011,
1
(08): 0-0.
Abstract
PDF
(0KB)
Based on the studies and surveys of the existing e-commerce platform and electronic contract development, it is put forward an e-commerce platform based on the electronic contract which is in the establishment of an asp.net platform. In the system we use valid credentials — electronic contract, to guarantee the credit of the both sides of transactions and clear rights and obligations of the both sides, to reduce conflict. Thus enhances the e-commerce platform of trading volume and promotes the development of electronic commerce.
Related Articles
|
Metrics
Select
Plant information system design and application
SHEN Xiao-Lin LIU Yan Zheping Xu
. 2011,
1
(08): 0-0.
Abstract
PDF
(0KB)
This paper will be distributed database technology and network technology, and the introduction of plant specimens distributed database technology for network systems, using Web Service technology and asynchronous method called distributed data retrieval, the network will not only facilitate internet users for plant specimens data , And specimens can improve the utilization of data, be conducive to realizing the sharing of resources; The use of Internet technology, ASP and database technology to digital technology will Herbarium, specimens and its various attributes to be a permanent preservation; order to make up a centralized database system in the coverage, renewal rate, access control, professionalism and network load In areas such as the shortcomings, This paper designed and implemented a scalable, distributed information system of plant specimens
Related Articles
|
Metrics
Select
Theoretical Research and Analysis in Artificial Immune Systems
Deng xiao-wu Li sen-lin Hu Ping
. 2011,
1
(08): 0-0.
Abstract
PDF
(0KB)
Artificial immune systems (AIS) constitute a relatively new area of bio-inspired computing. Biological models of the natural immune system, in particular the theories of clonal selection, immune networks and negative selection, have provided the inspiration for AIS algorithms. Moreover, such algorithms have been successfully employed in a wide variety of different application areas. However, despite these practical successes, until recently there has been a dearth of theory to justify their use. In this paper, the existing theoretical work on AIS is reviewed. After the presentation of a simple example of each of the three main types of AIS algorithm, details of thetheoretical analysis for each of these types are given.
Related Articles
|
Metrics
算法研究
Select
The analysis of DHP algorithm for association rules
panyanyan
. 2011,
1
(08): 0-0.
Abstract
PDF
(0KB)
Association rule mining can found useful information from the data. This paper introduces the basic idea of the DHP algorithm. DHP algorithm uses the hash pruning techniques to reduce the amount of data. Illustrate the execution of DHP algorithm and analyze the performance of DHP algorithm. It generates frequent itemsets efficiently, it solves the bottleneck when generates frequent 2 - itemsets performance, and reducing transaction database size and reducing the number of database scans.
Related Articles
|
Metrics
Select
SSH agreement and its safety is discussed
. 2011,
1
(08): 0-0.
Abstract
PDF
(0KB)
SSH (Secure shells) is an application layer security communication protocol, it provides the communication between the identity authentication, communication data encryption processing, data integrity verification for DuoZhong security service. This paper introduces the main contents of the agreement SSH, analyzes the SSH agreement of the most vulnerable to typical of the two kinds of attacks, and the two security hidden danger brings forward the corresponding preventive measures, so as to improve the safety of SSH help.
Related Articles
|
Metrics
网络与通信
Select
Discussion on Technology and Implementation of Automatic Monitoring System in Optical Cable Transmisson Network
Deng Senqiang
. 2011,
1
(08): 0-0.
Abstract
PDF
(0KB)
With the rapid development of science and technology,optical cable transmission technology has been widely used in PSTN. The traditional optical cable network maintenances mainly rely on artificial means. With the development of computer technology,the computer network technology and the optical cable test technology are obtained. At present, the optical cable transmission network mainly has monitored by the computer system. This article mainly researches on the optical cable monitor network design and computer network construction design.
Related Articles
|
Metrics
算法研究
Select
SSH Security Authentication Based on the Key
Wang Jinheng
. 2011,
1
(08): 0-0.
Abstract
PDF
(0KB)
This paper explains in detail how to use asymmetric key encryption algorithm authentication to remotely manage the Linux operating system on the Windows client environment and Liunx client environment .
Related Articles
|
Metrics
网络与通信
Select
WLAN positioning in the wireless city
. 2011,
1
(08): 0-0.
Abstract
PDF
(0KB)
With the developing of Wireless City, a lot of new technologies are emerging. WLAN (Wireless Local Area Networks), referred to WLAN, is the production of traditional Internet and wireless communications. It is not affected by the influence of cable, you can achieve mobile communication as a mobile phones, and the networking is very flexible, the expanding capacity is convenient, and it can compatible with a variety of network standards. WLAN can achieve remote access in a local area network. Image, fax, e-mail and many other functions can be provided. The data rates of WLAN are relatively high (more than 11Mbit / s), but the range of service is relatively small. As the traditional wireless broadband access technology, they have their respective advantages and disadvantages. This article will explain the position of WLAN in the wireless city by comparing.
Related Articles
|
Metrics
基金项目
Select
Informatization construction explore of Food and drug Administration
QIAN ZHAO
. 2011,
1
(08): 0-0.
Abstract
PDF
(0KB)
The tasks of informatization construction in Food and Drug Administration industry are outlined, and expounds the current situation of informatization construction, put forward the existing problem of informatization construction. Finally , the Countermeasures research for informatization construction are outlined .
Related Articles
|
Metrics
网络与通信
Select
Research of Mobile Remote Control System Based Bluetooth Technology
Jiyun Yao
. 2011,
1
(08): 0-0.
Abstract
PDF
(0KB)
In this paper, I proposed a remote control system over Bluetooth, in which a cellular phone can remote control other electronic machines. All cellular phone, computer and electronic machine (such as television) with internal or external Bluetooth can be used in this system. A cellular phone encodes the key event into control code, which is sent to the controlled terminal. The control code is decoded to control action by the controlled terminal according to the decoding scheme. Computer control function is achieved in the experiment.
Related Articles
|
Metrics
Select
Research on RRU Processing Method of Base Station
. 2011,
1
(08): 0-0.
Abstract
PDF
(0KB)
The methods of base-band remote includes radio frequency cable, intermediate frequency, base-band optical pulls , wireless repeater, optic-fiber repeater and so on. This paper introduces the mechanism of various RRU and compares their advantages and disadvantages; then puts forward four kinds of network construction and network optimization schemes.
Related Articles
|
Metrics
应用技术与研究
Select
DSP and FM25CL64 interface driver software implementation
Liu Ting-ting
. 2011,
1
(08): 0-0.
Abstract
PDF
(0KB)
This paper is to provide a method for driver software design on TMS320F2812, used FRAM implement the data access interface. It mainly introduced the functional characteristics of DSP chip TMS320F2812 SPI module and FM25CL64 chip, as well as the driver software design of SPI module, memory and application interface. By sufficient test and initial application, driver software design advisability, flexible interface, be able to meet the needs of the system.
Related Articles
|
Metrics
Select
RTP protocol-based real-time voice communication
Yang hailong
. 2011,
1
(08): 0-0.
Abstract
PDF
(0KB)
With the progress of theoretical and applied research, multimedia network communications at an unprecedented pace, the traditional protocol can not meet the requirements of real-time multimedia network communication. Audio data transmission on the network demanding real-time, high reliability, if you use the TCP protocol can not meet the real-time requirements. This paper describes a real-time transport protocol RTP, and gives the protocol used for real-time transmission of audio data and methods of the implementation process. Avoid the use of traditional TCP protocol for voice communications shortcomings of poor real-time, reduced network latency, and improve voice transmission quality.
Related Articles
|
Metrics
Select
ANALYSIS OF VOD SYSTEM’S PERFORMANCE
Zhang Jing
. 2011,
1
(08): 0-0.
Abstract
PDF
(0KB)
With the development of multimedia technologies, communication as well as hardware storage technology , the people are not only satisfied with the passive information, but also hope to participate in the program on one’s own , the video on demand (Video On Demand, VOD) is the video distribution service which user might control.The paper analyzies operating efficiency and hit probability question of VOD system.
Related Articles
|
Metrics
Select
Establishment of entrance guard system for electronic information System room
Zhang Ziliang
. 2011,
1
(08): 0-0.
Abstract
PDF
(0KB)
Entrance guard system for electronic information System room is an important part of establishment for Electronic information system, it applies to access control and record access information. This paper has discussed the main parts of entrance guard system, including access controller, electric lock and identification device, etc.
Related Articles
|
Metrics
Select
Design of Online Video Teaching System Based on HTTP and FLV
Xie Yunjia Zhong Ruiqiong Zhengwefeng
. 2011,
1
(08): 0-0.
Abstract
PDF
(0KB)
This paper compares the new streaming media technology FLV and traditional streaming media technology, and describes the relative advantages of FLV. Than we design an online video teaching system based on HTTP protocol and FLV, which includes FLV streaming video upload, auto-format conversion, content management, and media playback functions. We focus on the analysis of the technical difficulties, and propose corresponding solutions.
Related Articles
|
Metrics
Select
Research of Network-based Virtual Storage Methods
Zhang Jun
. 2011,
1
(08): 0-0.
Abstract
PDF
(0KB)
As the network continues to develop, virtual technology has made great the development, become the most development potential of the Virtual research directions. After virtual machine generated, access to welcome through the unique advantages within the industry. Network for the distribution of the resources in each of the physical server and Virtual Machine application of their limitations, and requires a physical location on a server hosting in the same LAN, for network expansion and upgrade has had serious effects on the restrictions, and its development. On the basis of this reason, we focused on virtual storage methods of conducting research to achieve storage equipment, expanding its scope of movement.
Related Articles
|
Metrics
Select
Hotel management information system of research and design
. 2011,
1
(08): 0-0.
Abstract
PDF
(0KB)
along with the computer technology and network development, all walks of informatization office increasingly high degree. Hotel management system is the typical information management system, using the database technology and computer technology, in full in-depth analysis of the hotel management function demand and business based on the needs of the whole process of the hotel management, will stay away from the shop (from) to realize the computer and network office, to ensure the quality of the hotel management efficiency and specifications.
Related Articles
|
Metrics
Select
Discussion on the Design and Practice of Computer Online Courseware Management System
Cui Jian
. 2011,
1
(08): 0-0.
Abstract
PDF
(0KB)
In the age that information becomes increasingly important, the Internet becomes an important channel that people quickly get, distribute and transfer information. Network releases information mainly through the website. Getting information is also by this way, according to some retrieval methods. This paper mainly discusses the design of computer online courseware management system, hoping to provide students a more convenient platform to share and update the courseware.
Related Articles
|
Metrics
Select
The Internet of things technology in food safety traceability applications
XiKe; MaXinChun
. 2011,
1
(08): 0-0.
Abstract
PDF
(0KB)
Through the system construction, not only can be traced back breeding and processing of disease and pollution problems, can be traced back in the process of cultivation, processing range of drug abuse in super limited the use of additives, change the past on food quality and safety management focusing on production control, and neglect the production control and prevention, improve the food processing technical specification of health norms, and the production of certification standards, promote the industry’s overall progress, enhance the levels of the food industry.
Related Articles
|
Metrics
Select
News website content management system safety protection strategy system
Wang Junfei
. 2011,
1
(08): 0-0.
Abstract
PDF
(0KB)
the content management system is the core business news site, is the foundation of the web site application platform, their safety is news site of the importance of safety component. This article through to the system security protection strategy system needs analysis, proposed in the system security protection strategy system design, system and management system from technology for two aspects of content management system safety protection strategy system key problem.
Related Articles
|
Metrics
Select
The constructing train of thought for desktop cloud
Xinmin chen
. 2011,
1
(08): 0-0.
Abstract
PDF
(0KB)
With the widespread promotion of the PC, individual PC terminals procurement costs, maintenance and management work as a business not a small expenditure, the other, is difficult to guarantee the security of data, therefore, the using of desktop cloud architecture, desktop management and all configuration in the data center, data center administrators can all be unified desktop and application configuration, greatly simplifying maintenance workload and ensure data security. This goes for the construction of the desktop cloud architecture, the key elements of research and analysis
Related Articles
|
Metrics
Select
Explore more Communication Technology and its Development of Frequency
Xiao Taiwen
. 2011,
1
(08): 0-0.
Abstract
PDF
(0KB)
Spread spectrum communication in the economical use frequency band, and solve the band in crowded plays an important role. It is a kind of can coexist with existing various communication way of communications in the future, has the very broad development prospects.
Related Articles
|
Metrics
Select
LTC1605 and Its Application in HDY-402 Tri-frequency Airborne Electromagnetic Device
Yang Zhiqiang Li Junfeng;Li Wenjie GuoYong
. 2011,
1
(08): 0-0.
Abstract
PDF
(0KB)
HDY-402 tri-frequency airborne electromagnetic instrument which is independently reasearched and developed by institute of geophysical and geochemical exploration,CAGS,is the airborne electromagnetic measurement system with China-only intellectual property rights,is mainly used for mineral exploration,water resources survey,seawater intrusion investigation and other fields. In this article I will detail the features and functionality of LTC1605 which is a 16-bit A/D converter made by Linear Technology corporation,and its application in HDY-402 System.
Related Articles
|
Metrics
News
More
Links
More
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd