scispace - formally typeset
Search or ask a question

Showing papers in "Computer Knowledge and Technology in 2006"


Journal Article
TL;DR: Not only the basic concepts and extended models of rough set theory but also the future challenges are discussed and the relational concepts and the future developments of granular computing are presented.
Abstract: In recent years, rough set theory have got excellent successes in so many scientific fields because of its unique advantages Distributions of probability of data are needed in the statistics and the membership function should be made sure beforehand in fuzzy set theory in the processing of information, however, rough set theory does not depend on the transcendental knowledge but utilize the upper and lower approximations to describe the imprecise and inconsistent information In nature, rough set theory is a kind of models of granular computing, in this paper, not only the basic concepts and extended models of rough set theory but also the future challenges are discussed Besides, the relational concepts and the future developments of granular computing are also presented

13 citations


Journal Article
TL;DR: This work has calculated and expressed each type of the trust values into explicit numerical numbers of the recommendation-based trust model, organized as a Trust Delegation Tree (TDT), and the authorization delegation realized by delegation certificate chains.
Abstract: There is a general purpose, application-independent Dynamic Distributed Trust Model (DDTM).In DDTM, access rights are directly associated with a trust value. The trust values are further classified into direct trust values, indirect trust values and trust authorization levels. We have calculated and expressed each type of the trust values into explicit numerical numbers. The core of this model is the recommendation-based trust model, organized as a Trust Delegation Tree (TDT), and the authorization delegation realized by delegation certificate chains.

6 citations


Journal Article
LI Hong-mei1
TL;DR: This paper select the transceiver CC2420 as key chip set and designed the hardware interface betweenCC2420 and MCU Atmega128 and descript software flow for communication, presenting a scheme of wireless sensor network node based on CC 2420 chip set.
Abstract: Sensor node is the basic unit of wireless sensor network After the research work on the requirement of wireless sensor network node, we select the transceiver CC2420 as key chip set and designed the hardware interface between CC2420 and MCU Atmega128 and descript software flow for communication, presenting a scheme of wireless sensor network node based on CC2420 chip setThis paper presents a scheme of wireless sensor network node based on CC2420 chip set

5 citations


Journal Article
TL;DR: Discuss applicability of gray correlation degree in image edge detection and put forward and fulfils an algorithm of image edge Detection based on gray weighted absolute correlation degree that is effective.
Abstract: Discuss applicability of gray correlation degree in image edge detection and puts forward and fulfils an algorithm of image edge detection based on gray weighted absolute correlation degree.Experimental results indicate that the algorithm is effective.

4 citations


Journal Article
Yuan Fei-yong1
TL;DR: By integrating the actual state of teaching with the practical experiences of teaching and researching on software engineering, issues on the course have been discussed, namely, the update of teaching contents, the improvement on teaching methods, how to integrate theory with practice etc.
Abstract: Software engineering is a quite theoretical and pragmatic course. In this paper, by integrating the actual state of teaching with the practical experiences of teaching and researching on software engineering,severa1 issues on the course have been discussed, namely, the update of teaching contents,the improvement on teaching methods,how to integrate theory with practice etc. Suggestions of reinforcing the teaching reform are also offered.

4 citations


Journal Article
TL;DR: This paper discusses its important points of research and analyzes its possible network standard and investigates the characteristics of the wireless sensor network.
Abstract: With the rapid development of the research of wireless sensor network,This paper focuses on investigating the characteristics of the wireless sensor network and discusses its important points of research and analyzes its possible network standard

3 citations


Journal Article
TL;DR: This paper discusses how to apply Multimedia Technology in teaching and how to exert its advantage.
Abstract: With the development of Multimedia Technology, the application of Multimedia in teaching is becoming more and more universal. Paper discusses how to apply Multimedia Technology in teaching and how to exert its advantage.

3 citations


Journal Article
TL;DR: The technology of digital image processing basing on Matlab is introduced, such as operators of edge detection and thresholding segmentation and canny edge recognition arithmetic operators.
Abstract: This paper briefly introduces the technology of digital image processing basing on Matlab,such as operators of edge detection and thresholding segmentation.Introduce Roberts、sobel、prewitt and canny edge recognition arithmetic operators.Some example and methods of digi- tal image processing are presents.

3 citations


Journal Article
TL;DR: The implement process of the "remote desktop" function in Windows XP is introduced, which permits you to control a Windows XP Professional-based computer by a pre-edition Windows-based one remotely.
Abstract: Introduce the implement process of the "remote desktop" function in Windows XP.This function permits you to control a Windows XP Professional-based computer by another Windows XP Professional or pre-edition Windows-based one remotely.

3 citations


Journal Article
Li Hong1
TL;DR: Another algorithm to mining frequent itemsets with including frequent 1-itemsets is presented and an example illustrating the efficiency of the algorithm is given and it is compared with Apriori.
Abstract: How to improve the efficiency of mining algorithm of frequent itemsets is important to mine association rules This paper present another algorithm to mining frequent itemsets with including frequent 1-itemsets and gives an example illustrating the efficiency of the algorithm Futhermore, the paper compares the algorithm with Apriori

3 citations


Journal Article
Sun Hui1
TL;DR: The phylogeny of data encryption algorithm and the mainstream algorithm of symmetric-key algorithm and asymmetric-keys is introduced and the characteristics of the two algorithms are discussed and how to mix use them.
Abstract: Data encryption is a based measure of information network security.In this paper we introduced the phylogeny of data encryption algorithm and the mainstream algorithm of symmetric-key algorithm and asymmetric-key algorithm?We discussed the characteristics of the two algorithms and how to mix use them.

Journal Article
TL;DR: Based on the study of how to integrate the idea and method of Educational Knowledge Management with teacher specialization, some countermeasure and advices for the development of teacher specialization has been put forward, especially, the build of learning organization could be function in improving the intelligence and ability for teacher.
Abstract: A school is the headwaters of knowledge, thus the education is an area of Knowledge Management as itself being. A teacher is the soul of a school, it is necessary to inject the idea and method of Educational Knowledge Management into the development of teacher specialization, as this is very important for the teacher specialization in reality meaning. Based on the study of how to integrate the idea and method of Educational Knowledge Management with teacher specialization, some countermeasure and advices for the development of teacher specialization has been put forward,especially, the build of learning organization could be function in improving the intelligence and ability for teacher.

Journal Article
Fang Li1
TL;DR: The author mainly introduces a famous arithmetic operators-Moravec operator, which will introduce the principle of the operator and how to realize it at the pick-up of point character.
Abstract: Point character is an important image character It has the virture of little mount of account and no lose of dimensional intensity information Aimed at the pick-up of point character, the author mainly introduce a famous arithmetic operators-Moravec operatorThe article will introduce the principle of the operator and how to realize it

Journal Article
TL;DR: Segment methods of color image in color space conversion are discussed and it is summarized that skin-color points after transformed have satisfying cluster property in the skin- Color space formed by the eigenvectors of covariance matrix which is trained by a set of points of skin- color.
Abstract: In this article,segment methods of color image in color space conversion are discussedIn RGB color space,because of highly correlated among R?G and B components,directly use these components to segment is not effect,but after a orthonormal transform,the experiment result is betterHSI space and YCbCr space both have the advantages of intensity independent of the other two components,experiment result show in HSI space the segmentation is perfect and in YCbCr is not good, this can be summarized that skin-color points after transformed have satisfying cluster property in the skin-color space formed by the eigenvectors of covariance matrix which is trained by a set of points of skin-colorIf images have large areas which are similar to skin-color, the result is bad,this can be changed by combining with other face features

Journal Article
TL;DR: This paper discussed the process and methods and application of Web mining techniques in E-Commerce, which helps to improve electronic commerce to improve its marketing, sales and customer support operations.
Abstract: Electronic commerce not only provides an additional channel for marketing and sales,but also provides a rich source of information about the customersWeb mining techniques can be applied to understanding and analyzing such data,and turn the data into useful information that enables electronic commerce to improve its marketing,sales and customer support operationsAs Web mining is applied in E-Commerce,E-Commerce will be more intelligentThis paper discussed the process and methods and application of Web mining techniques in E-Commerce

Journal Article
TL;DR: These are the key technologies to construct e-commerce application and system that have deep effects on the development of economy in 21st century.
Abstract: E-commerce has been made rapid development, together with Internet technology since 1990s, and had deep effects on the development of economy in 21st century. Nowdays, various type of e-commerce application and service provider is implemented and spread global wide.This article introduces the key technologies to construct e-commerce application and system.

Journal Article
TL;DR: A family of recently developed heuristic-based algorithms used for path planning in the real world, and the motivation behind each class of algorithms is introduced, their use on real robotic systems, and their practical benefits and disadvantages are discussed.
Abstract: We describe a family of recently developed heuristic-based algorithms used for path planning in the real world. We discuss the fundamental similarities between static algorithms (e.g. A*), dynamic algorithms (e.g.D*), anytime algorithms (e.g. ARA*), and anytime algorithms (e.g. AD*). We introduce the motivation behind each class of algorithms, discuss their use on real robotic systems, and highlight their practical benefits and disadvantages.

Journal Article
TL;DR: The article illustrates the definition of E- Commerce in the beginning, consentrates on the three periods, which are traditional E-Commerce, electronic data interchange and E- commerce based on Web, and indicates the extention of E -Commerce technology.
Abstract: The article illustrates the definition of E-Commerce in the beginning,then consentrates on the three periods,which are traditional E-Commerce,electronic data interchange and E-Commerce based on Web,and it is developing in the direction of intelligent E-Commerce;Finally,it indicates the extention of E-Commerce technology.

Journal Article
TL;DR: By researching about the special points of virtual reality technology of settling up the models, the 3DS MAX model in virtual Reality technology will be much more simple and richer.
Abstract: The application of powerful technique in setting up the models can show the pictures and animations conveniently and truly,but the Virtual reality technology is a interfacial technique of man-machine which can simulate people's sense of looking, listening, smelling and sporting more lifelike.By researching about the special points of virtual reality technology of settling up the models, the 3DS MAX model in virtual reality technology and it's application in virtual reality technology, the 3DS MAX model in virtual reality technology will be much more simple and richer.

Journal Article
TL;DR: This work analyzes the problem of traditional electronic business and proposes a solution to dynamic electronic business based on xml and web service, then the frame of web service is analyzed and the model of book selling on-line is combined.
Abstract: Firstly we analyze the problem of traditional electronic business and propose a solution to dynamic electronic business based on xml and web service, then analyze the frame of web service, finally combining with the model of book selling on-line, we research deep the key problem of dynamic electronic business based on xml and web service.

Journal Article
TL;DR: The random transference recorded inside the Access database form under the Visual Basic attaining the purpose that the teacher could ask and answer the student in classroom with the random roll call increased the equity and fairness to ask students and also played the role of arousing teaching atmosphere in classroom.
Abstract: This paper described the random transference recorded inside the Access database form under the Visual Basic, attaining the purpose that the teacher could ask and answer the student in classroom with the random roll call. It increased the equity and fairness to ask students and also played the role of arousing teaching atmosphere in classroom.

Journal Article
LI Zhi-hui1
TL;DR: This paper introduces some important deliberated index of data quality in data warehouse, analyses the problem of dataquality possibly produced in data sources and the process ofETL during the course of ETL implement, and gives the relevant solutions to the partial familiar problem ofData quality.
Abstract: This paper introduces some important deliberated index of data quality in data warehouse, analyses the problem of data quality possibly produced in data sources and the process of ETL during the course of ETL implement, and gives the relevant solutions to the partial familiar problem of data quality.

Journal Article
TL;DR: This paper probes into the general structure based on Socket communication procedure of Java through the instance model, which can be developed based on this one, so there is certain reference value.
Abstract: Socket is one of the two-way communication's end between two procedures that are operated on the network based on TCP/IP. Java.net bag includes Sockets, which is used to develop the network communication procedure fast.This paper probes into the general structure based on Socket communication procedure of Java through the instance model.The general communication software can be developed based on this one,so there is certain reference value.

Journal Article
Wang Jian1
TL;DR: The data mining is one kind of data processing technology and is a vital step of knowledge discovery in database.
Abstract: The high speed development of information technology, the data which the people accumulate grows suddenly, moreover the analysis result of data lacks the reliability ,and the efficiency of data processing becomes lower , it is important that extract the valuable knowledge from an amount of data The data mining is one kind of data processing technology and is a vital step of knowledge discovery in database

Journal Article
TL;DR: The source score can be graded by using improved clustering algorithm which can overcome the shortcoming of traditional method effectually and the new method is valuable and reasonable by contrasting the results.
Abstract: Grading the student score is an important part of education management.Traditional method of grading is short of reflecting the information contained by the source score.Clustering used in data mining affords a salutary,and the source score can be graded by using improved clustering algorithm which can overcome the shortcoming of traditional method effectually. It can be observed that the new method is valuable and reasonable by contrasting the results of this method and the traditional one.

Journal Article
TL;DR: This text introduced a VB development of, making use of the function, total structure and key technique of the network of the Java Web Service technique realization management system.
Abstract: The internal network management system is the important facilities that carries out employee the automation management effectively in the business enterprise.This text introduced a VB development of,making use of the function,total structure and key technique of the network of the Java Web Service technique realization management system.The system that uses VB to combine the technique of Web Service to develop has an operation simple,the interface amity,vivid and practical etc advantage.

Journal Article
TL;DR: The goal of this paper is telling us about the problems of distributed database systems such as query processing, and on the basis of optimization to the inquiry of the distributed database system, three typical algorithms are discussed: IngRES algorithm, System R* algorithm, SDD-1 algorithm, and compare with, optimize, and summarize.
Abstract: Distributed database system has dealt with and increase a lot of new content and complexity because of distribution and redundancy of data distributed to inquire,so inquire distributedly that the optimization that deals with seems particularly important.This text will be brief to introduce the goal and tactics of distributed query optimization,and on the basis of optimization to the inquiry of the distributed database system,discussed three typical algorithms:INGRES algorithm,System R* algorithm,SDD-1 algorithm,and compare with,optimize,summarize.Improve SDD-1 algorithm finally.The goal of this paper is telling us about the problems of distributed database systems such as query processing.

Journal Article
TL;DR: A face detection method that can be applied to real-time video-based working state of motorman system is proposed and it is realized by Visual C++.
Abstract: A face detection method that can be applied to real-time video-based working state of motorman system is proposed. And it is realized by Visual C++. Firstly, the images of day that captured by camera were proceed by light compensation and filter. Secondly, skin color was used to detect the face from the region. Thirdly, two-eye template was used to judge the state of the motorman. While, every two images of night were subtracted to judge the state of the motorman. Experiments with variety of images show that the method proposed here is efficient and useful.

Journal Article
TL;DR: This paper simply introduces and categorizes current search engine principle, makes a summary of particularity and difficulty, at the same time, describes two kinds of chinese parting-words arithmetic.
Abstract: This paper simply introduces and categorizes current search engine principle , make a summary of particularity and difficulty, at the same time,and describe two kinds of chinese parting-words arithmetic

Journal Article
Song Ling1
TL;DR: The mode and the design method of building SMS platform management system and the key technique of carrying out this system based on the design thought and the Realization method of ASP.NET are described.
Abstract: Along with the maturing of China Mobile correspondence and Internet technique gradually ,the basic call and message function have already can't satisfy the customer's demand of daily life and work,SMS service business from message platform to mobile phone has already become a kind of means of customer obtains messages in time and conveniently.The SMS platform management system based on the technique of ASP.NET and ADO.NET has the function that the SMS receiving and sending automatically,the fee statistics, the cluster sending and the classification managing.This article elaborates the characteristics of ASP.NET,and describes the mode and the design method of building SMS platform management system and the key technique of carrying out this system based on the design thought and the Realization method of ASP.NET.