Loading...

Table of Content

    01 June 2006, Volume 26 Issue 6
    Articles
    Service computing in global information grid
    ;;
    2006, 26(6):  1241-1244. 
    Asbtract ( )   PDF (851KB) ( )  
    Related Articles | Metrics
    GIG is different from common grid for emphasizing how to implement and join seamlessly information producing, processing and publishing in large-scale military applications. In GIG, theory and technology of Service-Oriented Computing(SOC) hold a important position. SOC is a new computing pattern that varies from Object-Oriented Computing(OOC) and Component-Oriented Computing(COC). SOC emphasizes the dynamic capability, agility and interoperability. Based on the discussion of the concept of GIG and its elements, the notion and principle of SOC were studied. The difference between SOC and OOC was also investigated in this paper. How to apply SOC to GIG and how to combine SOC with traditional technologies were also explored. Finally, some issues about using SOC in GIG were proposed.
    Design and implementation of workflow platform based on BPEL4WS
    ;;
    2006, 26(6):  1245-1247. 
    Asbtract ( )   PDF (571KB) ( )  
    Related Articles | Metrics
    With the increasing globalization of market competition, enterprises must be able to reform to its business processes quickly, so its workflow has received wide attention and study. However, the current workflow technology is far from mature, especially there are many drawbacks about interoperation in the collaborations among heterogeneous enterprises. The emergence and development of Web Services just solves these drawbacks, so the workflow technology of BPEL4WS based on the Web Services can make up the deficiency of the current workflow technology. In this paper, a workflow platform based on BPEL4WS was designed and implemented, and it had been successfully applied into the integrated business process system in Panzhihua Steel Cooperation.
    Research on implementing real-time fault-tolerant performance for middleware based on CORBA
    2006, 26(6):  1251-1253. 
    Asbtract ( )   PDF (630KB) ( )  
    Related Articles | Metrics
    The essential of real-time and fault-tolerance in the distributed system were analyzed, and the necessity of their fusion and its difficulty erre pointed out. The solution used for merging real-time and fault-tolerance in dynamic distributed system was found out, the architecture for the RT-FT middleware based on CORBA was proposed, and related key problems required to solve are mentioned.
    Network and communications
    Research and realization of the DirectX techniques for the network communications in embedded systems
    ;
    2006, 26(6):  1254-1256. 
    Asbtract ( )   PDF (604KB) ( )  
    Related Articles | Metrics
    The balance of CPU-cost with networks-traffic, which is in the communications of point to multipoint dynamic with regard to embedded networks system was introduced. To begin with, the models of networks communications were analyzed and compared. Then, an effective solution with its description, DirectX technique, was followed, which can benefit specifically from the merit of both unicasting networks and broadcasting networks. Last, it was achieved to analyze and prove the validity of the solution by an application instance.
    Enhanced Channel-Estimation Technique for MIMO-OFDM Systems
    ;;
    2006, 26(6):  1257-1259. 
    Asbtract ( )   PDF (833KB) ( )  
    Related Articles | Metrics
    In multi-input multi-output orthogonal frequency-division multiplexing systems,conventional channel estimation techniques using comb-type training symbols give relatively large mean squared errors (MSEs) at the edge subcarriers. To reduce the MSEs at these subcarriers, a cyclic comb-type training structure is proposed. In the proposed cyclic training structure, all types of training symbols are transmitted cyclically at each antenna. At the receiver, the channel frequency responses that are estimated using each training symbol are averaged with weights obtained from the corresponding MSEs. Computer simulations showed that the proposed cyclic training structure gives more signal-to-noise ratio gain than the conventional training structure.
    Research on integrated service level agreements system architecture and application
    2006, 26(6):  1260-1262. 
    Asbtract ( )   PDF (587KB) ( )  
    Related Articles | Metrics
    Research on OSS-oriented service level agreements was made in this paper. In order to realize the service process automation of OSS service management driven by service level agreements, on the basis of WfMC workflow reference model and service-oriented architecture, the service level agreements system architecture supporting workflow management was proposed. And by using BPEL of service oriented architecture, an application scenario instance of SLA system architecture was described.
    WLAN-Oriented AAA system for mobile IPv6
    Jun Li;;
    2006, 26(6):  1263-1266. 
    Asbtract ( )   PDF (931KB) ( )  
    Related Articles | Metrics
    A specific Authentication, Authorization and Accounting (AAA) system was developed in the light of WLANs link-layer access control to MIPv6 Node (MN). This system was composed of four parts, i.e. front-end wireless Access Point (AP) supporting 802.1x protocol, back-end authentication server, back-end web-based accounting management server and Diameter peers located on front-end and back-end separately. Functionalities such as EAP authentication methods, roaming inter administrative domain and accounting by traffic/time consumed were supported.
    Analysis and improvement of the Qos delay performance in VoWLAN
    2006, 26(6):  1267-1269. 
    Asbtract ( )   PDF (736KB) ( )  
    Related Articles | Metrics
    VoIP over Wireless LAN (VoWLAN) has become increasingly popular as a medium to connect portable devices to the network. Since voice packets are extremely delay sensitive, it is important to characterize the delay properties occur in a VoWLAN network. The multimedia packets access delay incurred was analyzed in the Access Point (AP) based on a prioritized M/G/1 analysis model, which was more accurate than the classical single Poisson-based model to calculate the mean multimedia packets access delay incurred in AP. Then an improved Point Coordination Function (PCF) polling-scheduling algorithm was developed for improving the WLAN's multimedia traffic application by reducing the access delay. Finally, simulation results based on OPNET were presented to show the effect of this method on WLAN's multimedia traffic application like VoIP, etc.
    DCF algorithm based on dynamic back-off threshold for WLAN
    ;;;
    2006, 26(6):  1270-1272. 
    Asbtract ( )   PDF (456KB) ( )  
    Related Articles | Metrics
    A novel dynamic RTS threshold based DCF algorithm named DDCF was provided for WLAN. DDCF sets different threshold of needed successful transmission for different CW. The theoretic analysis and simulation indicate that DDCF effectively promotes the performance of WLAN.
    Survey on data aggregation techniques in wireless sensor networks
    ;;;
    2006, 26(6):  1273-1278. 
    Asbtract ( )   PDF (1618KB) ( )  
    Related Articles | Metrics
    Aiming the severe energy and computing resource constraints of wireless sensor networks, data aggregation is an important approach that assists it in decreasing the energy consumption, eliminating data redundancy, increasing the energy efficiency of the useful information flow from the source to the sink and extending the network lifetime. Data aggregation can be incorporated with routing protocols or can be implemented as individual protocols/techniques that interact closely with routing protocols. Firstly, the backgrounds of aggregation were introduced. Then the main aggregation techniques were analyzed and reviewed, including aggregation routings, aggregate functions and data mining. Finally, the future research directions of data aggregation in wireless sensor network were pointed out.
    Desigh and emulation of satellite constellation communication networks architecture based on mobile networks
    2006, 26(6):  1279-1283. 
    Asbtract ( )   PDF (1089KB) ( )  
    Related Articles | Metrics
    As the on-board processing ability strengthens day by day, reducing the dependence of satellite constellation communication network to the ground network, and strengthening the ability of accessing IP service for the user segment, are the key questions which the future satellite constellation network will need to solve. The LEO satellite constellation network system structure based on the mobile network technology was proposed,the novel network strategy of satellite constellation network and the handoff model between satellite and ground were proposed, and the network performance simulation result based on the NS2 was submited. The simulation experiment indicates that, this method will be one effective method which can meet the future satellite constellation development need, and the handoff is the primary factor that influences the time delay of data transmission in satellite constellation communication networks.
    Improved QoS routing protocol in mobile Ad Hoc network—EQAODV
    ;;
    2006, 26(6):  1284-1288. 
    Asbtract ( )   PDF (1130KB) ( )  
    Related Articles | Metrics
    The new QoS routing protocol to ensure the QoS in mobile Ad Hoc network (MANET) was put forward. The new protocol was an expansion which is based on AODV protocol. With bandwidth as the prerequisite for QoS guarantee and the delay and packet lost rate as the optimized targets, it provided better assurance for QoS in MANET. The simulation results present that the new protocol improves the performance of MANET and make more advantage than AODV in QoS guarantee.
    Search-based Web Ontology system
    ;
    2006, 26(6):  1289-1291. 
    Asbtract ( )   PDF (568KB) ( )  
    Related Articles | Metrics
    In order to solve question which exists in the electronic commerce ontology application such as efficiency, maintenance and expansion and so on,according to the characteristics of electronic commerce, using various distributed ontology resources existing in the Web union search engine technology, a set of integrity solution was proposed, and the system role division, the duty which each system role should completed and the algorithm which each system role should realized were researched.
    Delay-constrained fast low-cost multicast routing algorithm
    LiXia Sun;
    2006, 26(6):  1292-1294. 
    Asbtract ( )   PDF (787KB) ( )  
    Related Articles | Metrics
    In order to satisfy the QoS requirements of real-time applications, the algorithm added delay constrains upon a non-delay-constrained multicast routing algorithm FLSPT was proposed to ensure that the accumulated delay from source to any destination along the tree does not exceed the pre-specified bound, as well as keep the outstanding performance on time complexity and cost of it. Simulation results show that, our algorithm outperforms DCSP in terms of cost and time complexity, and is more suitable for the dense mode, that is, multicast destination nodes are densely distributed in the area.
    Influence of wavelet base to the multifractal wavelet model
    ChunXiao Chen;;;
    2006, 26(6):  1295-1297. 
    Asbtract ( )   PDF (705KB) ( )  
    Related Articles | Metrics
    Based on the Multifractal Wavelet Model (MWM),chosing four kinds of wavelets, such as Haar, Daubechies, Coiflets and Symlets, the influence which the wavelets had on the MWM was analysed. With the analysis and comparison between the real traffic and the synthesized traffic, the conclusion is that the synthesized traffic, which was got from the MWM with Haar wavelet, can correctly reflect the statistical characteristics of the real traffic.
    Test and simulation system of the Ad Hoc network based on height speed ethernet
    ;
    2006, 26(6):  1298-1300. 
    Asbtract ( )   PDF (605KB) ( )  
    Related Articles | Metrics
    A dynamic test and simulation system for mobile Ad Hoc network was designed for the importance and difficulty of testing Ad Hoc routing protocols. The system could make the mobile Ad Hoc networks test environment in large scale by using distributed architecture and virtual transmission. The network layer and the upper layer protocols were able to be tested and simulated on it. Moreover, the hided and the exposed nodes were be avoided by the system.
    Research on guaranteed task scheduling of real-time applications based on CAN-bus
    2006, 26(6):  1301-1303. 
    Asbtract ( )   PDF (571KB) ( )  
    Related Articles | Metrics
    CAN is an advanced serial communication protocol and adapts to kinds of distributed control systems. In real-time applications, standard CAN protocol uses static priority algorithm. It gives a low schedulable utilization. To study the dynamic priority algorithm on CAN-bus, a mixed traffic scheduler (MTS) based on exponential assignment was proposed. It gives attention to both hard and soft real-time messages.
    Research on application platform of embedded Internet based on IPv6
    2006, 26(6):  1304-1305. 
    Asbtract ( )   PDF (580KB) ( )  
    Related Articles | Metrics
    Based on the development status of embedded Internet technology and the main problem of embedded internet technology in IPv4 network, a solution to embedded internet based on IPv6 protocol was proposed. The framework of TCP/IPv6 protocol suite was designed in detail, and aim at the characteristics of embedded internet technology, message queue and memory allocation mechanism which combine static allocation and dynamic allocation quoted improve the TCP/IPv6 protocol suite. In the situation of short of system resource seriously, a universal embedded application platform was realized, which supports multi-user control the device at real time.
    Design and implementation of QoS module for VoIP gateway
    2006, 26(6):  1306-1307. 
    Asbtract ( )   PDF (531KB) ( )  
    Related Articles | Metrics
    How to improve the voice quality of VoIP gateway was presented,and the feasible solution for QoS was analyzed. Then an implementation of QoS module that supports DiffServ was proposed. The module had a clear framework and good expansibility, gave a solution to the problem that VoIP gateway without any QoS abilities, and could be used as a reference in the QoS module design and implementation of VoIP gateway. This solution has been adopted in the VoIP gateway with embedded Linux platform and it meets the quality of the voice well.
    GPRS remote monitoring system based on CORBA
    ;
    2006, 26(6):  1308-1310. 
    Asbtract ( )   PDF (557KB) ( )  
    Related Articles | Metrics
    In order to resolve the low efficiency and high cost problem of the traditional GSM monitor and control system, a brand-new GPRS monitor and control system based on CORBA technique was proposed which used the popular middleware technology of CORBA. It improved the current GPRS monitor and control system. And it is a success fulfillment that the CORBA technique is used in the GPRS monitor and control system.
    Multi-path transportation of media stream over Ad Hoc network
    ;;
    2006, 26(6):  1311-1314. 
    Asbtract ( )   PDF (892KB) ( )  
    Related Articles | Metrics
    A scheme to transfer media stream over Ad hoc network by multiple paths was proposed, that is to say, in Ad Hoc network, media stream was transferred by multiple paths in the mean time to improve throughput and decrease transmission delay. At the sender, images are split self-adaptively by using partial decompressing algorithm, and according to load balance algorithm, multiple paths were chosen to transfer split data by Multi-path Source Routing (MSR) protocol. At the receiver, received image data were buffered, merged, recovered, decompressed by JPEG algorithm and displayed timely. Demonstrated by experiments, in Ad Hoc network, transferring media stream by multiple paths can achieve better image quality and shorter transmission delay than by a single path.
    Information security
    Application of semantics comprehension on natural language in anti-spam
    ;
    2006, 26(6):  1315-1317. 
    Asbtract ( )   PDF (629KB) ( )  
    Related Articles | Metrics
    After analyzing the question of the absence of keyword's semantics in statistics-based spam classification, the ontology-based semantics comprehension on natural language was used to anti-spam in order to solve the question of the semantics. By analyzing the characteristics of the spam, the syntax analysis driven by keywords and the semantics inference based on ontology were designed. It solves the absence of the semantics of keywords and sentences in some degrees, and does some useful exploring for the way of spam filtering.
    Design of a kind of self-help certification authority
    2006, 26(6):  1318-1319. 
    Asbtract ( )   PDF (616KB) ( )  
    Related Articles | Metrics
    The value of CA depends on two aspects, authority and technology. Ordinary CA costs most on construction and maintenance in order to insure its authority. Enterprise CA can decrease its authority and focus on utilization of its technology to deal with security problems in application system because the character of enterprise application. Self-help CA is just a type of simplified CA that adapted to enterprise application. Self-help CA disposes RA and independent certificate database only reserve CA Server and can sign certificates at any moment. Self-help CA can be integrated with access control system of application and is easily used, cost in construction and maintenance is lower.
    Solution of authentication in video conferencing system
    Yanyan Xu;;
    2006, 26(6):  1320-1323. 
    Asbtract ( )   PDF (844KB) ( )  
    Related Articles | Metrics
    The security of videoconferencing system is becoming more and more important. Authentication is the most important part of the system’s secure mechanism. The paper summarizes the ways of authentication in present videoconferencing sytem and points out its weakness. A new solution which based smart IC card and improved Kerberos is put forward and its security is analysed.
    Study on disaster recovery model for information system
    ;;
    2006, 26(6):  1324-1327. 
    Asbtract ( )   PDF (1006KB) ( )  
    Related Articles | Metrics
    A robust disaster recovery system model was presented to make information systems own continuous service talent even under disaster condition. The safe communication ability was strengthened to guarantee the secure command on disaster recovery. The self-supervision talent was introduced to watch the integrality and the security of disaster recovery system itself. Real-time visible platform was suggested to makes disaster recovery systems easier to use, manage and maintain. This model suits critical security environments such as e-government and bank. A key e-government disaster recovery system of China has been constructed guided by the model. It is verified that the network convergence and application response time can satisfy the system requests through the practice and matching simulation.
    Cluster-based hybrid key management strategy for Ad Hoc network
    Jing Zhang;;
    2006, 26(6):  1328-1330. 
    Asbtract ( )   PDF (803KB) ( )  
    Related Articles | Metrics
    Ad Hoc networks have attracted more and more attention recently due to its character of self-organization. However,this character brings big challenges to it in the field of security. Key management is one of most importance things in security service. A new distributed coloring-based clustering method was introduced. Based on it, a hybrid key management scheme using the TGDH algorithm was proposed. The good performance of this strategy was proved by theoretical analysis.
    Application study of role-based access control under J2EE mode
    XiaoBao Liu;
    2006, 26(6):  1331-1333. 
    Asbtract ( )   PDF (587KB) ( )  
    Related Articles | Metrics
    By using the container-based security mechanism of J2EE, the system security of J2EE can be managed by RBAC (Role-based Access Control) without code modification of J2EE components. RBAC was realized simply by the deployment descriptor configure of J2EE container. RBAC security strategy, executed to protect J2EE system resource based on the security truss of container, was picked up from deploy descriptor. Because the development of J2EE component separates from security, the developers of components can be absorbed in the businesses logic of components. Therefore, the cost of system development and maintenance will fall down, and the components become transplantable.
    Key management scheme for large and dynamic multicast groups
    2006, 26(6):  1334-1336. 
    Asbtract ( )   PDF (760KB) ( )  
    Related Articles | Metrics
    Some existing key management schemes based on two-layered architecture were analyzed and their pros and cons were discussed. On the basis of integrating the characters of these methods and PE scheme, a new key management scheme was proposed and its rekey algorithm was designed. Through the comparison of key storage cost, computation complexity and communication efficiency between the scheme presented in this paper and other schemes, it is show that this scheme possesses a good communication efficiency and scalability, and it lowers the computation cost, thus can be applied to large multicast group.
    ITrace scheme based on traffic classification
    2006, 26(6):  1337-1339. 
    Asbtract ( )   PDF (571KB) ( )  
    Related Articles | Metrics
    Through the research on iTrace scheme, an iTrace scheme based on traffic classification was proposed. It classifies incoming traffic into intention traffic and regular traffic based on the value of intention-bit,then performs iTrace scheme with different probability respectively. The analysis shows that this scheme can reconstruct the entire attacking path when the configuration of the router is juggled; and need less time to reconstruct the attacking path than other method.
    Digital watermarking method based on discrete strong chaotic system and wavelet domain
    ;;
    2006, 26(6):  1340-1342. 
    Asbtract ( )   PDF (805KB) ( )  
    Related Articles | Metrics
    The discrete wavelet transform (DWT) has a localized characteristic in time-frequency domain and a transform mechanism that accords with human visual system. And chaotic sequence has such attributes as certainty、random-like and unpredictable. In order to make good use of the advantages of the two technologies, a mixed digit watermarking algorithm was presented. The new algorithm combined chaos sequence with DWT and utilized chaos mapping to generate a key , which could avoid the finite word length effects and improve its resistance to the attack of crypt analysis. The experimental results verify the validity of above algorithm. They also prove that it can overcomes attacks from reduction,compression and Gaussian noise and have a stronger resistance to the attack of crypt analysis than a single chaos system or a single DWT.
    Detecting DDoS attacks in source-end network with CUSUM algorithm
    ;
    2006, 26(6):  1343-1345. 
    Asbtract ( )   PDF (599KB) ( )  
    Related Articles | Metrics
    After characteristics and difficult problems in detecting DDoS attacks were analyzed in source-end network, a nonparametric change point detection method in statistics was introduced and D-WARD system, a representative source-end DDoS detection system, was improved with nonparametric recursive CUSUM algorithm. Experiments prove that the improved system is lower in false-positive rate and false-negative rate, which is more accurate and could adapt to more complex network environments.
    Proxy multi-signature and designated-receiver proxy multi-signature schemes
    2006, 26(6):  1346-1347. 
    Asbtract ( )   PDF (536KB) ( )  
    Related Articles | Metrics
    Proxy multi-signature scheme was first designed on ECDLP.This scheme can not only satisfy all the security requirements,but also avoid wasting time on inversion operations of its signature generation and verification.Then a new designated-receiver proxy signature scheme was proposed, and its security was analyzed.
    Research and implementation of certificate validation system based on DNS
    2006, 26(6):  1348-1350. 
    Asbtract ( )   PDF (566KB) ( )  
    Related Articles | Metrics
    For solving the interoperability during current certificate validation process of different CAs,the new system DNS-OCSP was proposed by incorporating DNS-style referral,which can construct a unified certificate validation mechanism between different CAs.The architecture of DNS-OCSP was presented,and the workflow of DNS-OCSP was illuminated.It has been shown that the DNS-OCSP is more accessible and scalable.
    Graphics and image processing
    The Summarization and Progress of Image Coding Based on Irregular Region
    2006, 26(6):  1351-1353. 
    Asbtract ( )   PDF (849KB) ( )  
    Related Articles | Metrics
    The irregular region image coding methods, as the newer ones in this field, have obvious potential of compressing regions of image, maintaining the image edges and textures, and enhancing the quality of the reconstructed image. After comparing these methods with the old ones, our techniques were presented, and the difficulties confronted were analyzed. In the end, prospects were put forward.
    Study and implementation on block-matching search algorithm for motion estimation
    Yi Lei;;
    2006, 26(6):  1354-1356. 
    Asbtract ( )   PDF (821KB) ( )  
    Related Articles | Metrics
    An unsymmetrical cross-search algorithm (UDCS) was proposed based on motion vector distribution characteristics. Search steps of using small cross-search pattern to find small motion vectors in initial phase and unsymmetrical cross-search pattern to determine search large motion vectors in subsequent steps were brought forward. Finally, the architecture of the algorithm for implementation was introduced and performance was analyzed.
    Fast attractor image coding method based on wavelet transform
    2006, 26(6):  1357-1358. 
    Asbtract ( )   PDF (615KB) ( )  
    Related Articles | Metrics
    The natural image is not strongly alike, the direct compression is ineffective and compress speed is slow ,when decomposed with wavelet transform, it is divided into a number of sub-images of different frequency bands, and of different spatial orientations. The neighboring sub-images of the same orientation are strongly alike. The sub-images of different orientations, though few similarities were presented between them. Because the fractal dimension basically reflect a complications for variety of the image grey scale, so fractal dimension was used to evaluate the matching degree of similar image block. It's obtained an additional increase in compression ratio and reduced the code time.
    Applications of progressing mediano-cut algorithm in thermal paint image segmentation
    ;;
    2006, 26(6):  1359-1361. 
    Asbtract ( )   PDF (590KB) ( )  
    Related Articles | Metrics
    A method of thermal paint segmentation by using wavelet transformation and modified mediano-cut algorithm was presented. First a modified mediano-cut algorithm was given based on the mediano-cut algorithm. Then it decomposed the color image into three components and image edge detection based on wavelet transform respectively. Finally it composed three component edge to carry out image segmentation.
    Improvement of SPIHT algorithm based on lifting scheme
    ;;;
    2006, 26(6):  1362-1364. 
    Asbtract ( )   PDF (574KB) ( )  
    Related Articles | Metrics
    Due to the computational complexity of SPIHT, the integer-to-integer lifting scheme, which could simplify the computational process, was adopted instead of the normal wavelet transform. Wavelet coefficients were divided into blocks, based on which the spatial orientation trees were re-organized. The context-based model was constructed according to the correlativity of neighboring coefficients in blocks, and the outputting signals were encoded by adaptive arithmetic code to improve coding efficiency. Experiments show that the PSNR value is more than that of the original SPIHT at the same bit rate.
    Facial wrinkle simulation using convolution surface
    ;;
    2006, 26(6):  1365-1367. 
    Asbtract ( )   PDF (728KB) ( )  
    Related Articles | Metrics
    A new method to simulate wrinkles on individual face model was presented, which applied convolution surface to face modeling. A generic face mesh was deformed and the texture image was computed using image-based modeling technique. The deformed mesh was then convolved with a kernel function to generate a convolution surface, and wrinkles were generated by modulating the surface with a designed profile function. The pre-computed texture was mapped onto the convolution surface to enhance the realism. Experimental results show that our method can generate wrinkles with different patterns by regulating some parameters of the profile function.
    New genetic algorithm for image restoration
    2006, 26(6):  1368-1369. 
    Asbtract ( )   PDF (663KB) ( )  
    Related Articles | Metrics
    A new genetic algorithm for image restoration was presented by incorporating new chromosome coding method and simulated annealing. Experimental results justify our algorithm has better quality of the restored image and lower computational complexity.
    Effect analysis of fingerprint image preprocessing
    陈大海 ocean C
    2006, 26(6):  1370-1373. 
    Asbtract ( )   PDF (1132KB) ( )  
    Related Articles | Metrics
    The pretreatment of digital fingerprint is a key of the entire identification process, comprehensively analyzing the characteristic of every kind pretreatment method is helpful to improve the pretreatment algorithm. Through the experimental result of the various methods of pretreatment, the effects were illuminated; appraisal of every kind pretreatment method was given; the optimal scheme of enhanced fingerprints based on the Fourier transform and direction information was determined, and the standard of the comparing pretreatment algorithm was proposed.
    Novel macro-block layer rate control algorithm for H.264/AVC
    ;
    2006, 26(6):  1374-1377. 
    Asbtract ( )   PDF (747KB) ( )  
    Related Articles | Metrics
    To solve the issues of rate control model in H.264, a novel macro-block layer rate control strategy and implementation for H.264 were proposed. Firstly, a new concept of coding complexity measure was presented, so-called Mean Absolute Transform Quantized Distortion (MATQD). Then, the weighted prediction model for MATQD and an improved quadratic R-D model based on MATQD were proposed, respectively. Moreover, the whole procedure of rate control algorithm was proposed, especially when dealing with the allocation of texture bits for current macro-block, MATQDratio was used to compute the target bit and a weighted prediction model was presented for header bits. The experimental results show that our method is better rate control performance than that of JVT-G012 in JM8.5 in terms of control precision, bit fluctuation and image quality.
    Color image segmentation based on watershed transformation upon homogeneity image and two-step region merging
    ;;
    2006, 26(6):  1378-1380. 
    Asbtract ( )   PDF (767KB) ( )  
    Related Articles | Metrics
    A novel algorithm based on watershed for color image segmentation was presented. The original color image was initially smoothed using peer group filtering in order to preserve the location of the edges. A homogeneity image was defined, which integrated gradient with local second-order moment information, rendered more local information, and then was segmented using traditional watershed algorithm to yield mosaic image. A two-step region merging was carried out according to region area and Fisher distance. Color diversion increment deduced from relationship between information lost and the number of regions retained was adopted as automatic terminate strategy to refine the result of segmentation. Experiment results show the effectiveness of the method.
    Image single-pixel-precision edge detection algorithm based on LMS prediction
    ;;
    2006, 26(6):  1381-1382. 
    Asbtract ( )   PDF (739KB) ( )  
    Related Articles | Metrics
    To gain better effect of edge detection, an algorithm based on the idea of prediction was proposed with the help of LMS adaptive transversal filter theory which was commonly used in digital signal processing. Because the low frequency area of one image can be modeled as a stationary stochastic process, the LMS algorithm could be adopted. Besides edge detection, we also added an auxiliary criterion which could assure that the LMS algorithm have attained convergence after the oscillation caused by the edge encounter. This criterion can lead to single-pixel-precision results which was one important object of edge detection.
    Distortion of 3D head model with high-precision point cloud data
    Lei Gong
    2006, 26(6):  1383-1385. 
    Asbtract ( )   PDF (846KB) ( )  
    Related Articles | Metrics
    A novel approach for facial transformation based on guass transform was presented, which provided automatic metamorphosis among face images. It can eliminate Human intervention for feature specification caused by the facial marking. In addition, this method makes it possible to transform the 3D figures based on only one center and a few other parameters. The result of experiments indicates that this algorithm needs less control of users. It is convenient for users to control the definition of the gradual change. This algorithm can get a high operating speed, ideal smooth gradual change, and anticipative effect of distortion. The algorithm is excellently adaptable to the area of cartoon and face distinguishes.
    Study of visualization based on flexible algorithm vector fields
    吉晓娟 JiXiaoJuan
    2006, 26(6):  1386-1388. 
    Asbtract ( )   PDF (687KB) ( )  
    Related Articles | Metrics
    One weakness of Unsteady flow Line Integral Convolution(UFLIC) was time-consuming to generate frames, the improved method was proposed. The effect that reduced the time of advect frames was achieved by flexible algorithm and reuse and copy relative pathlines. The results show that our algorithm is fast than UFLIC based on the similar quality of frames.
    Artificial intelligence
    Method of word sense disambiguation based on bayes and machine readable dictionary
    WenRong Tan;;;
    2006, 26(6):  1389-1391. 
    Asbtract ( )   PDF (764KB) ( )  
    Related Articles | Metrics
    multi-senses of a word are widespread phenomenon in the natural language.The accuracy rate of sense ambiguation is the most important target of a software on the fields of machine translation, information indexing and text sorting.A method based on the bayes and machine readable dictionary was proposed, which could disambiguate by the training of a small-scale corpus and the definition of semantic in machine dictionary.The experimental results show that it has a high accuracy rate of word sense ambiguation when the scale of markup corpus has been limited.
    Definition-specification language to support heterogeneous database integration
    XingSheng Xie;;
    2006, 26(6):  1392-1395. 
    Asbtract ( )   PDF (838KB) ( )  
    Related Articles | Metrics
    Modern advanced applications typically run on top of numerous of distributed, heterogeneous databases. A Data integration is an application system, which integrates data from various data sources by providing users with uniform, and consistent accessing views to the data preexisting in these data sources. The resolution of potential conflicts due to structural and semantic heterogeneity of the integrated data is an essential part of the integration process performed by the data integration systm. A data mediator definition-specification language, the Specification Language for Data Integration (DISL), which supports the definition or expression of the complex data integration process and its semantics at a high level of abstraction was presented. After described the application architecture, the syntax and semantic of DISL language components, the method to specify the semantics of the integration process performed by a DISL-Mediator, were illustrated. The internal-architecture, the compile-time and run-time properties of DISL-Mediator were also discussed as well. The result shows that the DISL language,which provides a set of powerful language components, can be used conveniently to resolve potential data conflicts due to structural and semantic heterogeneity in data integraing, and to generate data integrating mediators automatically.
    Chinese character association measurement method and its application on Chinese text similarity analysis
    Zhao Yanbin
    2006, 26(6):  1396-1397. 
    Asbtract ( )   PDF (499KB) ( )  
    Related Articles | Metrics
    The research of text similarity analysis and text clustering is mostly based on feature words. Because Chinese text does not have a natural delimiter between words, it must solve two problems such as Chinese word segmentation and higher-level dimensions feature vector spaces. In order to reduce the higher complexity, a novel investigation method of text similarity analysis using the association of Chinese characters was probed without using feature words. The notation of Chinese Character Association Measurement was defined, and the Chinese Character Association Measurement matrix to represent the Chinese text documents was constructed. Then a Chinese text similarity algorithm based on Chinese Character Association Measurement Matrix is proposed. The experiment result shows the Chinese Character Association Measurement is better than the mutual information and the T test and the bi-gram frequency. Without Chinese word segmentation, so this algorithm is useful in massive Chinese data corpus.
    Smooth model switching scheme based on recurrent neural network model predictive control
    Fuyin Du
    2006, 26(6):  1398-1400. 
    Asbtract ( )   PDF (469KB) ( )  
    Related Articles | Metrics
    The control system of differ product conditions could be regarded as a multi-model control system. But model switching will result in transient response of the plant controlled. A method to establish multiples models of system using recurrent neural network and complete switch process based on model predictive control was proposed. Which avoid transient response of switch process and achieve model switching smoothly. Simulation performances indicate that the model switching scheme improve dynamic quality of switch process greatly.
    Adaptive genetic algorithm with missed gene detection and reparation policy
    ;
    2006, 26(6):  1401-1402. 
    Asbtract ( )   PDF (534KB) ( )  
    Related Articles | Metrics
    In order to get better performance of Genetic Algorithm(GA) and maintain generation's diversity, based on Haiming Distance, missed gene detection and reparation policy together with dynamic crossover and mutation operators were brought forward. The evaluation results of the testing functions show the modified algorithm has better performance in both speed and efficiency. It is also shown that modified algorithm not only has satisfied efficiency but also has enhanced the capability to converge to the best answer.
    High-dimensional data feature selection based on relevance analysis and GA
    ;;;
    2006, 26(6):  1403-1405. 
    Asbtract ( )   PDF (592KB) ( )  
    Related Articles | Metrics
    Feature selection is one of the important problems in the pattern recognition and data mining areas. For high-dimensional data feature selection not only can improve the accuracy and efficiency of classification, but also can discover informative feature subset. The new feature selection method combining filter and wrapper models was proposed, which first filters featured by feature relevance analysis, and realized the near optimal feature subset search on the compact feature subset by genetic algorithm; and the feature subset was evaluated by the classification inaccuracy of the perceptron model. The experiments show that the proposed algorithm can find the feature subsets with good linear separability, which results in the low-dimensional data and the good classification accuracy.
    Pretreatment method of data mining based on non-linear correlation analysis
    ;;
    2006, 26(6):  1406-1408. 
    Asbtract ( )   PDF (521KB) ( )  
    Related Articles | Metrics
    An estimation model for credit risk and the optimal portfolio in the commercial bank has become an extremely important subject to business dealing. A novel pretreatment method of Non-linear Correlation Analysis(NLCA) was presented in the data mining of credit risk evaluation and the optimal portfolio, and the aggregation character of the conjunction graph was studied , then the convergence and validity of the arithmetic of NLCA was put out, at last applying it to the real data.
    Innovative architectural component conceptual design based on genetic algorithm
    ;;
    2006, 26(6):  1409-1410. 
    Asbtract ( )   PDF (636KB) ( )  
    Related Articles | Metrics
    Analysing the characteristic of architectural component, genetic algorithm was brought forward to constrain and control its conceptual design. Traditional genetic algorithm is promoted. As far as the construction of fitness function, it adds the measure of symmetry, uniformity and smoothness. The experiment shows that the algorithm can improve the innovation of architectural component conceptual design.
    Combining Web usage and content mining to improve transaction identification
    ;;
    2006, 26(6):  1411-1414. 
    Asbtract ( )   PDF (928KB) ( )  
    Related Articles | Metrics
    For the traditional methods of transaction identification couldn't properly meet the need of pattern identification, a novel improved one aiming at overcoming these drawbacks was proposed. The new algorithm which combines content data of web pages, and applies document clustering algorithm in this process, could not only take the user browsing manners and tendency of information needs into account, but also avoid the influence of outside factor such as buffer and network latency. As a result, the algorithm after improvement could acquire user's browsing pattern more exactly.
    Method of pagerank planar linear convergence
    Lei Cong
    2006, 26(6):  1415-1417. 
    Asbtract ( )   PDF (723KB) ( )  
    Related Articles | Metrics
    In Application, because of the huge number of web pages that even reach to several hundreds of million, it has to spend much time on computing pagerank by power method. So it needs some skills to make the convergence of power method fast. Based on the proof of power method, a method to accelerate the process of computing eigenvector was put forward when using revised power method to calculate the pagerank according to assumption of eigenvector being planar linear expressed. And the new method can shorten time expending meanwhile not increase any space storage. At last test data shows this method which comes from theory gets good convergence result in practice.
    New algorithms for effectively creating conditional pattern bases of FP-Tree
    ;;
    2006, 26(6):  1418-1421. 
    Asbtract ( )   PDF (706KB) ( )  
    Related Articles | Metrics
    The frequent pattern approach is undoubtedly a great milestone in the history of mining association rules, which greatly improved the mining effectiveness. However, Paths in Frequent Pattern Tree(FP-Tree) are repeatedly scaned in creating conditional pattern base, which results in great unnecessary performance overhead. In order to solve this problem, the information for creating conditional pattern base of the items related to each node of the path was computed and stored in the traverse of each path from leaves to the root, which avoided repeat scan of a single path. It is showed from the results of experiments that the revised ones obviously outperform the previous ones.
    Parallel longest common subsequence algorithm based on pruning technology
    2006, 26(6):  1422-1424. 
    Asbtract ( )   PDF (724KB) ( )  
    Related Articles | Metrics
    Searching for the Longest Common Substring (LCS) of biosequences is one of the most important problems in Bioinformatics. Smith-Waterman algorithm and FASTA algorithm are currently the most widely used algorithms. FASTA algorithm runs faster than Smith-Waterman algorithm, but Smith-Waterman algorithm can obtain higher precision. A fast algorithm for LCS problem was presented. The algorithm seeks the successors of the identical character pairs in parallel according to a successor table and record their levels. Finally it traces back from identical character pair with the largest level and get the result of LCS.
    Multiseed clustering algorithm based on max-min distance means
    ;;;
    2006, 26(6):  1425-1427. 
    Asbtract ( )   PDF (590KB) ( )  
    Related Articles | Metrics
    A novel multiseed clustering algorithm was proposed aiming at shortcomings of k-means algorithm.This algorithm could find optimal initial starting points applying iterative max-min distance means and then combined the small clusters from given data set into final ones,for an elongated or large cluster could be considered as the union of a few small distinct hyperspherical clusters. Experimental results demonstrate that the improved algorithm can automatically obtain the number of initial clusters,be effective on data set of irregular shapes and lead to better solutions than k-means algorithm.
    Learning approach for neural network ensemble based on specimen reconstruct
    ;;;
    2006, 26(6):  1428-1430. 
    Asbtract ( )   PDF (556KB) ( )  
    Related Articles | Metrics
    Based the review of the research of neural network ensemble, a new negative correlation learning method was proposed,which was both easy to implement and had the less computation, the co-linearity problem was eliminated, the error of the neural network ensemble was reduced. In the end, gives an test to this method, which prove that the method can reduce the error of the neural network ensemble effectively and get an expected result.
    Application of SVM in EEG signal classification
    ;;
    2006, 26(6):  1431-1433. 
    Asbtract ( )   PDF (747KB) ( )  
    Related Articles | Metrics
    At first some energy features related to the frequency bands and special distribution are extracted. Then a classifier based on Support Vector Machines (SVM) was designed. To optimize the classifier, different kernel functions and parameters were discussed. The performance of classifier was compared with a RBF Neural Network classifier. The result indicates that the ideal accuracy can be achieved by the SVM and wavelet energy method in EEG classification. The schizophrenia can be separated from healthy through 16-channel's EEG. The research takes important practical value in the schizophrenic diagnose.
    Incremental support vector machine based on center distance ratio
    ;
    2006, 26(6):  1434-1436. 
    Asbtract ( )   PDF (513KB) ( )  
    Related Articles | Metrics
    Although a Support Vector Machine (SVM) is applicable to a learning task with small training examples, all the training examples don't play an important role in the learning task, but a few ones called support vectors do. According to the relations of support vector, center distance ratio, margin vector and incremental learning, a new method called incremental support vector machine based on center distance ratio was presented. First of all, some support vectors were extracted by the method; then others were made up by the incremental learning method so all the support vectors were found. Compared to the CDRM+SVM, incremental support vector machine based on center distance ratio utilizes effectively center distance ratio and suits to incremental learning. So the new method improves the speed of SVM greatly, while the ability of SVM to classify is unaffected.
    Temporal error concealment algorithm for H.264/AVC based on correlation region
    HanBing Dang;;;;
    2006, 26(6):  1437-1439. 
    Asbtract ( )   PDF (535KB) ( )  
    Related Articles | Metrics
    The break of changes always exist in MVs (motion vectors) on the curves of video content split. Using interpolation formula simply to recover the lost MVs usually results in serious propagation error. The video content split prediction curve was proposed to minimize the errors based on Lagrange interpolation formula, the parameters of Lagrange interpolation formula were achieved by the use of neighbor blocks' MVs, and the lost macroblocks and the neighbor blocks were divided into several regions by the curve, the changes of motion vectors in each region were smooth. And then, the MVs of lost blocks were replaced by the average values of available motion vectors in every region. The simulation results show that the proposed algorithm can efficiently improve the visual quality of corrupted video.
    Algorithm for finding the critical paths based on dynamic programming
    ;
    2006, 26(6):  1440-1442. 
    Asbtract ( )   PDF (510KB) ( )  
    Related Articles | Metrics
    Critical paths are usually obtained by topological collating. A new algorithm for finding critical path by using dynamic programming and breadth-first search was put forward. The data structure of the algorithm is adjacency lists, and it doesn't need topological sorting. This algorithm with higher efficiency than traditional ones, and also with higher healthy.
    Typical applications
    Construction of NURBS surface in C# with OpenGL
    ;;
    2006, 26(6):  1443-1445. 
    Asbtract ( )   PDF (986KB) ( )  
    Related Articles | Metrics
    NURBS is useful in surface creation due to its uniformity in representation and flexibility in shape control. There are not standards and formal methods to develop OpenGL in C# up to now. An approach of modeling NURBS surfaces in C# was proposed. P/Invoke and OpenGL were used to construct NURBS surfaces from data clouds. An example is also presented and good result is attained.
    Modeling approach supporting model driven development for Web user interface
    ;;;
    2006, 26(6):  1446-1448. 
    Asbtract ( )   PDF (821KB) ( )  
    Related Articles | Metrics
    Model driven development is becoming a tendency in software engineering. However the characteristics of Web user interface with the custom-made but frequently renewing makes the conventional software developing environment not suitable for the requirement of Web user interface engineering design. Focus on the characteristics of Web application, an user-interface modeling approach was provided based on XML and interface template. Web user interfaces were described in direct-viewing style with graphics at the model level. The approach can be used to support model driven software engineering.
    Research on the acceleration principle of software reliability testing
    ;
    2006, 26(6):  1449-1451. 
    Asbtract ( )   PDF (762KB) ( )  
    Related Articles | Metrics
    The characteristics of software failure were analyzed compared with hardware failure on the basis of software failure principle. The principle of software reliability testing was discussed combined with the principle of software testing. Based on this the underlying acceleration of software reliability testing was studied, and a method of how to implement acceleration was proposed.
    Process-oriented performance evaluation applied in data-intensive large-scale systems
    Ying Liu;;
    2006, 26(6):  1452-1455. 
    Asbtract ( )   PDF (1054KB) ( )  
    Related Articles | Metrics
    A process-oriented performance evaluation was presented, which analysed the systems combined workload characteristic with resource utility by different nodes' roles. This way simplifies the complex system environment and the test result-set includes much more information than common ways. This method has been applied in some real systems with tens of nodes and several key problems in design and hidden troubles of equipments have been found in time.
    Research on mixed tactics-based dynamic offering algorithm
    Lu Pengyu
    2006, 26(6):  1456-1458. 
    Asbtract ( )   PDF (600KB) ( )  
    Related Articles | Metrics
    Although bargaining is an important activity during purchasing process, it is rarely seen in the current electronic stores. A few systems were designed with bargaining function based on some single trade-off tactics, such as Kasbah, electronic mall, and so on. A weakness of singles tactics is that the customers bargained with the system maybe find the its bargaining rules. This will reduce the utility of the system. To solve this problem, three basic tactics, just like Kasbah's, were defined in this paper. And a new mixed tactic was defined based on these basic ones. Then a dynamic offering algorithm was proposed. The experiment data indicates that the prices offered by this algorithm are irregular.
    Genetic algorithm for solving the complex pickup and delivery problem with time windows
    2006, 26(6):  1459-1462. 
    Asbtract ( )   PDF (707KB) ( )  
    Related Articles | Metrics
    The pickup and delivery problem with time windows requires that a group of vehicles satisfy a collection of customer requests. Each customer request requires the use of a single vehicle both to load a specified amount of goods at one location and to deliver them to another location. All requests must be performed without violating either the vehicle maximal capacity constrain, maximal travel distance limitation or the customer time window stipulated at each location. The general PDPTW was extended on three aspects, which were multi depots, multi load type and fully loaded. And a genetic algorithm suitable for solving complex PDPTW was proposed. As the experiment proved, when this algorithm is used for solving complex PDPTW, it can obtain preferable result and solve this problem effectively.
    Research on STK real-time control in the distributed simulation
    ChengGuo Liu;
    2006, 26(6):  1463-1465. 
    Asbtract ( )   PDF (565KB) ( )  
    Related Articles | Metrics
    The application of STK in the distributed simulation becomes the focus of aerospace simulation. At first, the structure of distributed simulation based on STK-RTI was proposed, and the time synchronization scheme was given. Then, the principle of network communication based on the STK/Connect module was introduced and its realization of programming. At the same time, the two schemes on driving STK in real time—SetTime scheme and Real-Time /X-Real-Time-scheme were proposed, and the principle of the two driving schemes was stated as well as their advantages and disadvantages. At last, based on the Real-Time /X-Real-Time scheme, an algorithm which can get the time of STK more efficiently and more exactly in real time was proposed.
    Research on aggregation model of AOP based on CAR
    ;
    2006, 26(6):  1466-1467. 
    Asbtract ( )   PDF (633KB) ( )  
    Related Articles | Metrics
    Separation of Concerns is a hot topic in software design currently. By identifying、packaging and integrating different kinds of concerns,a system can be constructed with higher adaptability, maintainability and reusability. AOP technology is a good programming model for separating concerns now. A dynamic aggregation model of AOP based on CAR system was presented. Compared with other systems using static aggregation, dynamic aggregation makes aspect and common component aggregate and disaggregate at runtime, which improves the adaptability and reusability of system design.
    Solution of automatic test for interrupt-driven based embedded software
    ;;
    2006, 26(6):  1468-1471. 
    Asbtract ( )   PDF (817KB) ( )  
    Related Articles | Metrics
    As an important test method, automatic test technique would bring significant effect to the quality, cost and development cycle of software if it is introduced into the test process of embedded software. The characteristic and test requirement of a module based embedded software were analyzed. Subsequently, it presented an automatic test solution based on high reliable oriented embedded software which was driven by interrupts. At last it summarized the advantages and the coverage of auto test technique.
    Performance prediction method of Web application based on combined stress testing
    ;;;;
    2006, 26(6):  1472-1474. 
    Asbtract ( )   PDF (880KB) ( )  
    Related Articles | Metrics
    Predicting performance of Web application is a vital guidance for both QoS of Web application and configuration of server. A new approach based on combined stress testing was presented. While running a series of load testing on client-side, resource consuming on the server was also performed. Then the performance model was established and make prediction. Comparing with conventional load testing, this experimental results on a typical Web application system were showed the feasibility, accuracy and efficiency of this method.
    Model based on timed CPN for vehicles control of intersection
    ;
    2006, 26(6):  1475-1478. 
    Asbtract ( )   PDF (656KB) ( )  
    Related Articles | Metrics
    Compare with the model of classical Petri net, the model of vehicles traffic through intersection based on timed CPN was presented, and the vehicles traffic was described by time and space dimensions. The timed CPN model was built and simulated using CPN Tools, and the vehicles traffic process through intersection was implemented. The experimental results showed that the dynamic properties of vehicles traffic can be described by TCPN model well.
    Comprehensive evaluation system based on FCM and rough sets theory
    ;
    2006, 26(6):  1479-1481. 
    Asbtract ( )   PDF (563KB) ( )  
    Related Articles | Metrics
    Using fuzzy set and rough set theory, to investigate the clustering analyses and evaluation of weighting, and propose a new comprehensive evaluation system—the comprehensive evaluation system based on FCM Algorithm and weighting mining by rough sets (briefly FCM-WMRS).Then, to develop the system of the region technology ability evaluation of China. Finally, to process clustering analyses and weighting mining on the judgement of the region technology ability evaluation of China basing on the judge index system and involved data supported by the research group of continuous development Institute of Chinese Academy of Science.
    Research on the software architecture of fly simulation system
    ;;;;
    2006, 26(6):  1482-1484. 
    Asbtract ( )   PDF (798KB) ( )  
    Related Articles | Metrics
    The software architecture of a Fly Simulation System based on High Level Architecture was proposed with Matlab numeric models driving OGRE scene models. The two kernel components, Matlab_RTI adaptor and OGRE_RTI adaptor were investigated. And the system deployment solution about Fly Simulation System was presented. It shows that the system expansion and simulation reuse are strongly supported as the result of the basis of the standard simulation bus.
    Three dimensional registration techniques for augmented reality based on computer vision and magnetic tracking
    Jianhua Jin;
    2006, 26(6):  1485-1489. 
    Asbtract ( )   PDF (927KB) ( )  
    Related Articles | Metrics
    A vision based-on three dimensional registration method using three mark points was presented in detail, and then the magnetic three dimensional registration method was analyzed, finally an experimental platform and explains the result data was given. A good registration result is demonstrated in the augment system which is designed by the author.
    Design of data unilateral transmission based on USB 2.0
    2006, 26(6):  1490-1491. 
    Asbtract ( )   PDF (606KB) ( )  
    Related Articles | Metrics
    When transferring files between the different security domain, files are required to be only transferred from low security domain to high security domain. An unilateral transferring system was developed based on USB2.0 bus. Its data transmission scheme by combining USB2.0 interface device CY7C68013 and DAUL-PORT RAM was described. Experiment results verify that the system based on USB2.0 interface, DAUL-PORT RAM data buffer and technology of optical couplers insulation realizes high-speed, unilateral and reliable data transmission.
    Automatic temporal and spatial modeling of read request
    ;;
    2006, 26(6):  1492-1495. 
    Asbtract ( )   PDF (834KB) ( )  
    Related Articles | Metrics
    In order to improve I/O performance of parallel applications and parallel file systems, an automatic modeler was presented to model and predict for read request temporal and spatial series. It used autocorrelation function and Haar wavelet transform technology to automatically identify and build Autoregressive Integrated Moving Average (ARIMA) models of interarrival times. It used Markov modeler to model and forecast spatial series. Our prefetching method can combine ARIMA time series predictions and Markov model spatial predictions to adaptively determine when, what, and how many data blocks to be prefetched.
2024 Vol.44 No.4

Current Issue
Archive
Honorary Editor-in-Chief: ZHANG Jingzhong
Editor-in-Chief: XU Zongben
Associate Editor: SHEN Hengtao XIA Zhaohui
Domestic Post Distribution Code: 62-110
Foreign Distribution Code: M4616
Address:
No. 9, 4th Section of South Renmin Road, Chengdu 610041, China
Tel: 028-85224283-803
  028-85222239-803
Website: www.joca.cn
E-mail: bjb@joca.cn
WeChat
Join CCF