Home Table of Contents

10 May 2011, Volume 1 Issue 05
    

  • Select all
    |
    基金项目
  • Chen Yanlong
    . 2011, 1(05): 0-0.
    Abstract ( )   Knowledge map   Save
    To make some improve to the canny algorithm,we bring forward an improved edge detection algorithm based on an improved particle swarm optimization algorithm.The improved algorithm can enhance the capability of suppressing noise,delete false edges and obtain exact edges.Experimental results indicate the feasibility and validity of the improved algorithm.
  • 网络与通信
  • Zhao Xiaodian Zheng Xiangdi Zhang Jianli
    . 2011, 1(05): 0-0.
    Abstract ( )   Knowledge map   Save
    TCP/IP protocol itself has many security flaws,so that network traffic is attacked by IP address spoofing,ARP spoofing,ICMP attacks,TCP SYN Flood,DNS attacks.This article studies security risks and vulnerabilities of TCP/IP protocol,and then presents corresponding measures for the prevention of attacks.
  • Zhang Chao
    . 2011, 1(05): 0-0.
    Abstract ( )   Knowledge map   Save
    TCP protocol has an important part in the wireless network communication,to research the performance is very important study theoretical significance.Aiming at the cellular network and wireless network of satellite networks TCP performance related research,the authors put forward some improvement method,and has obtained the certain achievement,and has certain theoretical meaning and reference value.
  • Qing Jinwei Wang Jun
    . 2011, 1(05): 0-0.
    Abstract ( )   Knowledge map   Save
    The new generation of high-performance router which is marked for network processor (NP) processor has begun to be widely applied.Combining with the NP - 3 processor of Ezchip company,this article discusses the method of realizing data switching in Metro Ethernet Network (MEN).
  • 应用技术与研究
  • He Jiaying
    . 2011, 1(05): 0-0.
    Abstract ( )   Knowledge map   Save
    This paper researches the existing situation and problem of data integration in Telecom Industry,and proposes a EDB model based on EAI platform.This EDB model fulfills the definition and refining of industry elements and data by applying functions of EAI platform,and also develops a set of interface for data-consuming systems by using ETL、data integration and data bus deployment technology.Application shows that this EDB model reaches a good result in Telecom Industry IT support.
  • 网络与通信
  • Liu Yi
    . 2011, 1(05): 0-0.
    Abstract ( )   Knowledge map   Save
    In this article,the structure and characteristic of P2P is introduced.The problems of information security which brings by P2P’s own technical defect are analyzed.In response to these security problems,how to build the security defense system on P2P network is given.A recommend trust mechanism based on P2P network is explained strictly.
  • 应用技术与研究
  • Deng Laisheng
    . 2011, 1(05): 0-0.
    Abstract ( )   Knowledge map   Save
    The experimental teaching is an important part of higher education,directly affecting the quality of university education training,and the open-up of laboratory is the source of labs vitality.Combined with the characteristics of "triple Play" (Integration of Telecom,Radio and TV,and Internet Network) and its application in the future,and from the status of university experimental teaching,this article explores the laboratory’s management,virtual laboratory building and its opening up.
  • 网络与通信
  • Zu Xingjie Jin Yongjiang
    . 2011, 1(05): 0-0.
    Abstract ( )   Knowledge map   Save
    In the fierce market competition,to win the trust of users occupying the limited market,reduce operational costs and improve economic efficiency,TiefaCoal Industry(Group) uses advanced GPON technology for optical broadband FTTB access construction.This article mainly introduced the TiefaCoal Industry(Group) optical broadband networking scheme,construction plan.TiefaCoal Industry(Group) through developing optical broadband construction expand the market,and thereby ensure enterprise,healthy,stable and sustainable development.
  • Tang Guoliang Li Haojie
    . 2011, 1(05): 0-0.
    Abstract ( )   Knowledge map   Save
    As one of the widely used interior gateway protocols,OSPF routing protocol is used to judge the decision-making routings in a single autonomous system.This article discusses OSPF area networking for a common point-to-point link by using the Packet Tracer V5.3 simulation software to understand the various area networking models and configurations.
  • 应用技术与研究
  • DENG Jia-rong WU Yan
    . 2011, 1(05): 0-0.
    Abstract ( )   Knowledge map   Save
    JavaScript is a scripting language in computer network which mainly used to add dynamic effect and interaction to webpage.Bingo is a card game popular in Britain and America.This paper analyzes the algorithm of Bingo game,promotes a universal solution for building Bingo games using JavaScript on the website,and offers the core code of program for easy transplantation and expansion.
  • Tian Dongju
    . 2011, 1(05): 0-0.
    Abstract ( )   Knowledge map   Save
    in running water supply system,constant voltage is a critical link for consideration in system design.The paper builds and fulfills constant voltage automatic regulation water supply system,gives system operating principle and constructional drawing,elaborates main functions of each functional module based on utilization of MSP430 series of singlechips as main controller.The success of the system is its utilization and spreading value in water supply and control system of running-water company.
  • Huang Huipeng
    . 2011, 1(05): 0-0.
    Abstract ( )   Knowledge map   Save
    Automatically grading line made up by mitsubishi remote control system FX2N series PLC and TC35i SMS module,through personal cell phone or installed in the computer software,the fly above letter can real-time monitoring automatically grading line,when sorting lines malfunction or attain the certain production requirements,timely message alarm to charge.Introduces the overall framework of sorting line,sorting line work work process,the TC35I units = pdus mode AT instructions and data analysis .
  • Gu Jianwei
    . 2011, 1(05): 0-0.
    Abstract ( )   Knowledge map   Save
    A novel method for image segmentation with fuzzy C-means clustering based on image patch is presented.We introduce the image patch into clustering segmentation,and propose an IPFCM method.We utilize the image patch to replace the single pixel in fuzzy clustering that can increase the difference between different classes,and improve the membership functions to make it unimodal.The experimental results show that our method has strong anti-noise and high segmentation precision,the image of the membership function and the ideal membership functions are very close.At the same time our method need not too much control parameters,and has greater reliability and adaptability.On the other hand,each cluster center is the expansion of a vector and the update formula is given.This will provide the full rationale for image segmentation with FCM by using a variety of image features.
  • Ma Yan
    . 2011, 1(05): 0-0.
    Abstract ( )   Knowledge map   Save
    Safety is the key factor of the online payment based on the internet E-commerce which is established on open platform.This essay emphasizes on two protocols safeguarding the security of online payment:SSL and SET,raising their limitations in practice respectively and proposing a model to merge the two protocols in E-commerce.
  • 经验交流
  • Hou Yintao Hou Shen
    . 2011, 1(05): 0-0.
    Abstract ( )   Knowledge map   Save
    In the paper the basic principle of mobile telephone customers forecast trend extrapolation is studied.And mobile telephone customers forecast models is also studied.Several mobile telephone customers forecast models is compared based on the basic principle of forecast error.Finally,the right forecast model is got.
  • 应用技术与研究
  • Tang Yanan
    . 2011, 1(05): 0-0.
    Abstract ( )   Knowledge map   Save
    This article discribes the architecture and key features of Vertica in detail, and tells us how it is that Vertica can provide such remarkable performance compared to other row-oriented relational systems.
  • 经验交流
  • Chen Huangwei
    . 2011, 1(05): 0-0.
    Abstract ( )   Knowledge map   Save
    In recent years, along with the electronic government affairs gradually arisen and widely used,how to construct the e-government safety system into the whole process of e-government system construction,this paper study focus is e-government systems of several common explores the information security technology.
  • Yang Yingxian Yin Fangping
    . 2011, 1(05): 0-0.
    Abstract ( )   Knowledge map   Save
    This paper consider the mouth states recognition.In this algorithm,combines gabor wavelet, support vector machine(SVM).First,the gabor wavelet is used to extract the feature;Then,the support vector machine is used for classification.Experimental results demonstrate the proposed the method has good classification performance.
  • Pan Li
    . 2011, 1(05): 0-0.
    Abstract ( )   Knowledge map   Save
    In recent years, along with the intelligent handset’s popularity and the 3G technology’s maturity,handset’s function expands from the sole communication to more domains,such as visiting Internet,game entertainment,electronic payment and so on. Handset’s security problem also receives more and more people’s attention.This article introduces simply the handset virus’s characteristic,and talks about some basic handset virus prevention knowledge.
  • Chen Haibo Chen Hu
    . 2011, 1(05): 0-0.
    Abstract ( )   Knowledge map   Save
    Paper generation and testing with computer is an important aspect of modern teaching.According to the needs of teachers and students,this paper describes the function design of the system,and realizes using VISUAL C++ 6.0.
  • 应用技术与研究
  • Zhang Huiling
    . 2011, 1(05): 0-0.
    Abstract ( )   Knowledge map   Save

    Along with the development of the Internet,comparing with the traditional library,digital library with greater data quantity has become the main way for people to obtain knowledge.How to effectively descript and retrieve information resources becomes research hot spot.This paper mainly studies the application of the semantic grid technology in the digital library resources semantic description,proposes the meaning of the metadata and the advantages of Dublin core metadata element set,builds a digital library resources semantic description framework.The framework is discussed in detail.