scispace - formally typeset
Search or ask a question

Showing papers in "Computer Programming Skills & Maintenance in 2009"


Journal Article
TL;DR: The entropy method and fuzzy mathematics based on chromatography analysis are introduced, and a more positive outcome was got after having a comparison between the results.
Abstract: The problem of determining the weight coefficients is often encountered in the actual production solving the specific problems. This paper introduced the entropy method and fuzzy mathematics based on chromatography analysis. The solution of these problems were given in detail.At last, the specific examples were carried out to solve applying the above two methods, and a more positive outcome was got after having a comparison between the results.

15 citations


Journal Article
TL;DR: The existing training management information system gathered lots of data, used data mining technology bases on these data, and applied Microsoft SQL Server 2005 IDE and Microsoft Time Series as an example in order to provide useful informatns for Managers when they made decision of reasonable allocation training resources.
Abstract: It discusses application of data mining technology in Xinjiang Training Center of CNPC. The existing training management information system gathered lots of data, used data mining technology bases on these data, applied Microsoft SQL Server 2005 IDE and Microsoft Time Series as an example, created data mining model to mining data, predicted the abiliy of training Departments ,in order to provide useful informatns for Managers when they made decision of reasonable allocation training resources, finally summed up problems and solutions in the development process.

12 citations


Journal Article
TL;DR: Particle swarm optimization algorithm is a heuristic global optimization technology and also a kind of evolutionary computation technology, which based on group intelligence, which comes from the research on the bird flock movement behavior.
Abstract: Particle swarm optimization algorithm is a heuristic global optimization technology and also a kind of evolutionary computation technology, which based on group intelligence. It comes from the research on the bird flock movement behavior. Each particle of the swarm represents one candidate solution of the problem being optimized.

8 citations


Journal Article
TL;DR: Enterprise Personnel Information Management System can do normative information management, science statistics and Express query, thereby reducing the management workload.
Abstract: Enterprise Personnel Information Management System can do normative information management,science statistics and Express query,thereby reducing the management workload.This article describes the background and research topics and elaborated on wages and personnel management system for the systematic analysis and implementation process.

4 citations


Journal Article
TL;DR: This paper analyzes and Research of the principle and the implement of DES Algorithm, and analyzes it's program script of C, and presents the security ofDES Algorithm.
Abstract: DES is the most popular encryption Algorithm,it is used mostly in popular encryption.This paper analyzes and Research of the principle and the implement of DES Algorithm,and analyzes it's program script of C.At last,it presents the security of DES Algorithm.

3 citations


Journal Article
TL;DR: The purpose of the paper is just to developing the teaching quality and teaching result of computer foundation courses with the new teaching mode with the basic theory of the level teaching and feasibility.
Abstract: The paper discusses the basic theory of the level teaching and feasibility,presents the level-division rules,teach-ing contents setup and testing mode in detail.So the purpose of the paper is just to developing the teaching quality and teaching result of computer foundation courses with the new teaching mode.

2 citations


Journal Article
TL;DR: This paper research a simple and effective data encrypting method applicable to digit, letters and Chinese words that skillfully uses base64 encoding andGUID to Compute and transform, and add interface information with GUID to encrypted data.
Abstract: This paper research a simple and effective data encrypting method applicable to digit,Letters and Chinese words The method skillfully uses base64 encoding and GUID to Compute and transform,and add interface information with GUID to encrypted data The method of data encryption is realized on VB60,and finally key codes are presented in the paper

2 citations


Journal Article
TL;DR: The system is based on the campus planning maps and combined with information on the characteristics of the campus, and constructs the map date using the MapInfo, and integrates the different layers through the Geoset Manager.
Abstract: The system is based on the campus planning maps and combined with information on the characteristics of the campus. It constructs the map date using the MapInfo, and integrates the different layers through the Geoset Manager. The campus electronic map is developed in the .NET programming environment by the C# language on the MapX control of the second time. In addition to the basic functions such as zoom and roaming, the system also provides other functions such as the Eagle Eye, the distance measuring, the function of searching and locating between elements and attributes. The development process and the core code of the main function are provided in this paper.

2 citations


Journal Article
TL;DR: The basic concept and background of Web Services are introduced, and on this analysis of the current use of the Web Services synthesis of the meaning, the synthetic way to eliminate the semantic Web services is set out.
Abstract: This article firstly introduces the basic concept and background of Web Services,based on this analysis of the current use of the Web Services synthesis of the meaning,and then set out the basic Web Services and its synthetic way to eliminate the semantic Web services to eliminate the practice of research dynamic service composition process and semantic analysis,the final integration of Web Services for application prospects.

2 citations


Journal Article
TL;DR: In this paper, a region image segmentation method based on improved adaptive threshold is presented and experiments show that this methods that impact segmentation.
Abstract: Thresholding is a popular technique for image segmentation, in this paper, a region image segmentation method based on improved adaptive threshold is presented, Experiments show that this methods that impact segmentation. With other threshold segmentation arithmetic comparing, new arithmetic has better currency and validity.

1 citations


Journal Article
TL;DR: The basic failure types of Oracle database and several backup strategies are described, using RMAN backup technology on the features of the production database to deploy a perfect backup program in practice.
Abstract: Following the full application of Daqing logging production database, the database backup technology was still in the stage of the logical export manually and has not yet had an effective data backup technology to ensure data security. This article describes the basic failure types of Oracle database and several backup strategies, using RMAN backup technology on the features of the production database to deploy a perfect backup program in practice. It can implement to back up the database automatically from time to time, reducing manual operations and saving backup time.Through the automatic transmission the backup content to a remote backup storage, it can avoid the risk of single point of storage to make data more secure, and provide a complete backup data.to restore database effectively.

Journal Article
Xue Chunyan1
TL;DR: The text utilize analysis and study the three kinds of algorithms to solve the minimum cost spanning tree and uses the question of urban highway as the example in the article.
Abstract: The text use the application of minimum cost spanning tree to solve the question of urban highway as the example in the article. The text utilize analysis and study the three kinds of algorithms to solve the minimum cost spanning tree.

Journal Article
TL;DR: Several first parallel common species automations have formed the main body of a book rolling up method, and it is introduced that the inheritance algorithm group rolls up an algorithm and then, the at last has given out the realization method.
Abstract: That the automation group rolls up system is on already some problem warehouse bases,generates a test paper management system satisfying certain call for according to checking purpose according to certain algorithm.How the auto-matic selected topic of computer forms a set of rational science examination paper algorithm be most the key problem,sever-al first parallel common species automations have formed the main body of a book rolling up method,have introduced that the inheritance algorithm group rolls up an algorithm and then,the at last has given out the realization method.

Journal Article
TL;DR: This paper firstly analyzes the concept of data mining modeling, then elaborates the concept, incorporates the concept from data mining tools and modeling, and finally introduces the general steps of datamining modeling.
Abstract: Data mining and modeling are general-purpose techniques that can be applied to a wide range of problems, and data mining modeling is the bridge of the practical problems and data mining processors However, there are a lot of vague awareness to the concept of data mining modeling,this paper firstly analyzes the concept of data mining modeling, then elaborates the concept of data mining modeling and grasps data mining modeling from data mining tools and modeling, and it finally introduces the general steps of data mining modeling

Journal Article
TL;DR: The analytical study on the software engineering and the software quality management is discussed, which shows that the management and the project are in the quite low level in this country's software development profession.
Abstract: There are the numerous outstanding software developers in our country's software development profession,but the management and the project are in the quite low level.Raising along with the domestic numerous Industrial enterprise and the international standard trail connection,the international standardization quality system authentication (the ISO9000 series) surges.Many people in software development enterprise pay attention to the software quality and the management,even started to prepare or already to carry on the software quality system international standardization authentication the work.This article discusses the analytical study on the software engineering and the software quality management.

Journal Article
TL;DR: The design process of electronic design automation (EDA) and Characteristics of design software QuartusII are described and examples that the application of the design software quartusII in the EDA are given.
Abstract: This text describe the design process of electronic design automation (EDA) and Characteristics of design software QuartusII. In this paper, give examples that the application of the design software QuartusII in the EDA.

Journal Article
TL;DR: This thesis made thorough research to the related implementation method, which could solve the problems of graph display and history playback for real-time monitoring data and improved the system development efficiency, maintainability and running efficiency.
Abstract: The system of pipeline corrosion detection was beneficial for engineer to monitor the corrosion status of buried pipeline and save the maintenance cost. This thesis made thorough research to the related implementation method,which could solve the problems of graph display and history playback for real-time monitoring data.The method adopted the object oriented technology,special linked list data structure and algorithm.Practical running showed that the method could solve existing problems of system design and also improved the system development efficiency, maintainability and running efficiency.

Journal Article
TL;DR: The paper gives programming models and realization keys of developing communication programs and proposes the methods and features of network Socket programming using Delphi.
Abstract: As a queuing point of data exchange in network,data structure Socket based on transport layer protocol is the commonest APIThis paper introduces the process communication procedure and its specific realization between the client and server based on TCP/IP protocolBased on the introduction,the paper gives programming models and realization keys of developing communication programs and proposes the methods and features of network Socket programming using Delphi

Journal Article
TL;DR: The theme of this essay is to discuss how to use B/S structure,XML language and ASP technology together to display the management information on the web and users can scan and search on the clients.
Abstract: The theme of this essay is to discuss how to use B/S structure,XML language and ASP technology together,meanwhile to display the management information on the webTherefore users can scan and search their inform on the clients


Journal Article
TL;DR: The paper discussed the status ofvirtual reality technology, summarized the key technologies of virtual reality in virtual battlefield development, and discussed the role of smartphones in virtual reality development.
Abstract: Virtual Reality, as a new technology of computer synthesized multi-science, relates to many research and application fields The paper discussed the status of virtual reality technology, summarized the key technologies of virtual reality in virtual battlefield development

Journal Article
TL;DR: Some problems in the information security protected by firewall are introduced, and some solving methods are given.
Abstract: The safety of information is more and more seriously because the system of information is widely used via network, and this has led to a heightened awareness of the need to protect data and resources from network-based attacks. This article introduces some problems in the information security protected by firewall, and giving some solving methods.

Journal Article
TL;DR: Self-developed network management system, which has its own characteristics, not only cost-saving, and easy maintenance, based on the MVC framework, which is proposed on the construction of the school network office platform.
Abstract: In order to ensure the multi-campus cases,the timeliness of data transmission as well as centralized data management,the information management systems based on B/S structure becomes increasingly important.self-developed network management system,which has its own characteristics,not only cost-saving,and easy maintenance.Based on the MVC framework,designed a network management system of teaching,proposed an implementation plan on the construction of the school network office platform.

Journal Article
TL;DR: The system realizes collection and transmission of building inside temperature that provides the feasible measure of the heat effection for corporations and the technique method for rational science heat.
Abstract: The paper mostly applys the C8051F920 microprocessor、7512B moderm and HT9032 identification CPU of display incoming telegram The system realizes collection and transmission of building inside temperature that provides the feasible measure of the heat effection for corporations and the technique method for rational science heat The paper simply introduces the trait of circuit about C8051F920 MCU、7512B和HD9032 and then describes the system structure and the frame of software implement

Journal Article
TL;DR: This paper introduces the basic methods of moving image and gives some examples to illuminate and explains how to realize the moving effect of image in the operational interface.
Abstract: During the process of designing visual program, we often need to realize the moving effect of image in the operational interface. This paper introduces the basic methods of moving image and gives some examples to illuminate.

Journal Article
TL;DR: This paper includes the princip-ium,harm and anti-step of the Botnet, a kind of net controlled by hacker who spread bot program and control fall victim computers by any way.
Abstract: The Botnet is a kind of net controlled by hacker who spread bot program and control fall victim computers by any way.The Botnet is different from other kind of net,just because it is much more dangerous.This paper includes the princip-ium,harm and anti-step of the Botnet.

Journal Article
TL;DR: This paper mainly describes Spring Struts and hibernate technologies that building web application framework of a reusable, generic and loosely coupled framework.
Abstract: With the development of the software on the scale and complexity.Building an application architecture of reusable and loosely coupled has become the first and foremost of consider problem of the Web application system.On the background of developing a shot message management system.this paper mainly describes Spring Struts and hibernate technologies that building web application framework of a reusable,generic and loosely coupled.Discussing of issues how to set up the system architecture.

Journal Article
TL;DR: A scheme of the intelligent tutoring system based on knowledge-point as the center, adopts the knowledge point as the composition unit of the educational resources and establishes knowledge system through the relationship between the knowledge points.
Abstract: On the basis of deeply research into the knowledge representation methods of the intelligent tutoring system,the paper puts forward a scheme of the intelligent tutoring system based on knowledge-point as the center,adopts the knowledge point as the composition unit of the educational resources and establishes knowledge system through the relationship between the knowledge points The paper implement the intelligent tutoring tactics combining Web datamining, artificial intelligence, and fuzzy theory

Journal Article
TL;DR: UML standard is for supporting the majority extant facing target's course of developing and designing and is suitable for changing the development course of the taking the place of type.
Abstract: UML is a visual modeling language in common used to unify the modeling language , it is used to describe software, visual processing , construct and set up software system UML is suitable for various kinds of software development approaches , software life cycles and each stages , various kinds of applications and various kinds of developing instruments UML standard has not defined the development course of a kind of standard , but it is suitable for changing the development course of the taking the place of type It is for supporting the majority extant facing target's course of developing and designing

Journal Article
TL;DR: The analysis of algorithm of search engine rank is shown, and some factor which affect the rank of page search engine is said to be some factor.
Abstract: This paper show the analysis of algorithm of search engine rank, and say some factor which affect the rank of page search engine. After that, this paper discuss the three theme of SEO in web development. The details of these theme is rewrite URL, get rid of overlap content, optimize HTML code.