Cangzhou Normal University

Cangzhou, China

Cangzhou Normal University

Cangzhou, China

Time filter

Source Type

Liu G.-X.,Cangzhou Normal University
Lecture Notes in Electrical Engineering | Year: 2014

With the in-depth development of network technology and computer technology, it is inevitable to use data mining technology to manage the electronic files of the archives department effectively, and improve service quality and work efficiency. As the most important part of the archives department, we must ensure electronic file's safety and reliability from the collection, arrangement to filing these series of processes. The first part of this article is detailed description of electronic documents, followed by the necessity and availability of data mining technology in the process of electronic document management, and finally describes application of data mining technology in electronic documents by specific examples. For the combination of data mining technology and electronic files, in the development phase of China, we have to keep in-depth study in its data construction, management standard, users' actual needs, and staff training. © Springer-Verlag Berlin Heidelberg 2014.


Liu G.-X.,Cangzhou Normal University
Lecture Notes in Electrical Engineering | Year: 2014

In recent years, with the rapid development of network technology, internet data increases quickly. Hence, how to get useful information efficiently is a key issue. Data mining technology has become the focus of the research of current industry, which is more and more concerned. Clustering method is one of the methods of data mining, and this paper explores the clustering method of data mining techniques, followed by how to use clustering method to analyze and solve the problems in mobile communication. © Springer-Verlag Berlin Heidelberg 2014.


Yang F.,Cangzhou Normal University
Lecture Notes in Electrical Engineering | Year: 2014

The author of this article puts forward a kind of high efficient Chinese short-message clustering algorithm based on the semantic concept. By comparing the non-weak primitive of two words, the similarity shall be calculated, so that the efficiency of calculating the words' distance shall be greatly increased. We can in specific analyze of the similarity among texts based on semantic; therefore we can get the results in line with people's intuition. © Springer-Verlag Berlin Heidelberg 2014.


Wang X.,Cangzhou Normal University
Lecture Notes in Electrical Engineering | Year: 2014

Digital museum is a mass multimedia database. Data mining can improve its level of knowledge management for digital collections. In addition, the technique of data mining would be improved also. In this paper, a multimedia data mining architecture for digital museum is proposed. The procedure and key method of this architecture is introduced. Thus, it has a certain reference value for digital museum. © Springer-Verlag Berlin Heidelberg 2014.


Yang F.,Cangzhou Normal University
Lecture Notes in Electrical Engineering | Year: 2014

The building of education information resource base is the basis of realizing education information and the individual service of education resource is the key issue to improve the educating and teaching qualities. From the concept of education information resource base and the data mining and technology referred, the author of this article discusses the application of data mining. Meanwhile, the author of this article presents the process of building the Individual Service of Education Information Resource Base System with data mining technology. © Springer-Verlag Berlin Heidelberg 2014.


Feng M.,Cangzhou Normal University
Lecture Notes in Electrical Engineering | Year: 2013

If we want to relieve rhymnastics gymnastics education from the pure physical training, the key is rhymnastics spread of culture. The realistic meaning and historical significance is the main purpose of the important change in gymnastics teaching rhymnastics gymnastics education, pay attention to the building rhymnastics gymnastics education theory system contains the humanities and science and training talents, has both the rhymnastics gymnastics humanity quality and scientific spirit. © 2013 Springer-Verlag.


Wang X.-G.,Cangzhou Normal University
Proceedings - 2013 4th International Conference on Intelligent Systems Design and Engineering Applications, ISDEA 2013 | Year: 2013

With the increasing popularity of the Internet, how to analysis the net-work data, and get useful information or find clues to attack, has become a new topic in the field of computer network. Based on the analysis of the streaming media technology, this paper put forward the proposal of streaming media in network transmission, and raise that the streaming media service system will also have a significant effect on the design of the computer's hardware and software. © 2013 IEEE.


Yang F.,Cangzhou Normal University
Proceedings - 2013 International Conference on Computational and Information Sciences, ICCIS 2013 | Year: 2013

The author of this article makes studies and discussion on the image encryption of transforming domains. In the image encryption algorithm, the sine chaotic mapping scrambling is applied to the original image, and the scrambling matrix is generated by Logistic chaotic system. Fractional Fourier transform, respectively, is along the x-axis and y-axis that generates a function which is transformed random in the phase mask. The function of the phase mask uses the Logistic chaotic system. The simulation experiments verifies that this algorithm can effectively resist plaintext attack, differential attack and statistical analysis, and the large key space can be achieved to 1087, and has a higher security. © 2013 IEEE.


Yang F.X.,Cangzhou Normal University
Advanced Materials Research | Year: 2013

Existing data clustering method lacks considering of latent similar information existing among words,and it leads to unsatisfactory clustering result.Aiming at Chinese short message text clustering,this paper proposes a clustering algorithm based on semantic.It offers Chinese concept,and the measuring methods to calculate the similarity degree about words and Chinese short message text.It completes the clustering of Chinese short messages text through fission downwards and mergence of twos upwards.Experimental results show that this algorithm has better clustering quality than traditional algorithm. © (2013) Trans Tech Publications, Switzerland.


Huang L.N.,Cangzhou Normal University
Applied Mechanics and Materials | Year: 2013

With the wide application of Web technology, Web database system is playing an increasingly important role in network application. The storage amount of Web database information is growing, at the same time, the security of Web database has been facing extremely daunting challenges. How to strengthen the security of Web database system has become an important issue of network researches. This paper has introduced implementation techniques of database security, described the sub-key encryption algorithm of database in details, and applied it to the management system of information student. © (2013) Trans Tech Publications, Switzerland.

Loading Cangzhou Normal University collaborators
Loading Cangzhou Normal University collaborators