Loading...

Table of Content

    01 August 2005, Volume 25 Issue 08
    Network and information security
    Design and implementation of a wireless network emulator based on Windows推
    LI Xue-jie,JIN Zhi-gang,LUO Yong-mei
    2005, 25(08):  1719-1721.  DOI: 10.3724/SP.J.1087.2005.01719
    Asbtract ( )   PDF (164KB) ( )  
    Related Articles | Metrics
    A new windows platform wireless emulator was proposed based on the ideas of NIST Net emulator. By means of analyzing and modifying the NDIS module of windows, this emulator was implemented by adding high accuracy timer based on RTC and wireless module. This emulator could emulate a large scale network by using some emulated nodes and some measurement nodes. Experiments validate the functions of the emulator and the accuracy of the emulator.
    Double security-based routing algorithms for sensor networks
    ZHANG Jin,SHEN Ya-min,DONG Ting,ZHU Wang-bin
    2005, 25(08):  1722-1725.  DOI: 10.3724/SP.J.1087.2005.01722
    Asbtract ( )   PDF (197KB) ( )  
    Related Articles | Metrics
    It is very difficult to get the security in sensor networks because of the limited resources of nodes and the wireless communication between nodes. A double security-based routing algorithms was proposed based on the existed security arrangement and low power consumption multipath.The existed security arrangement can provide security to some certain case and multipath can provide more security even when security arrangement failed. Theoretic analysis and simulation results show that the new algorithm has better performances.
    Immunology principle and its application investigation in intrusion detection
    ZHAO Lin-hui,DAI Ya-ping,XU Li-xin
    2005, 25(08):  1726-1729.  DOI: 10.3724/SP.J.1087.2005.01726
    Asbtract ( )   PDF (262KB) ( )  
    Related Articles | Metrics
    Immunology principle and its application in intrusion detection in recent years were reviewed. The research on antibody clonal selection theory, immune networks and danger theory were emphasized. The immune principle and algorithms used in intrusion detection were summarized and some of hotly debated issues were introduced. Based on the disadvantages of current methods, the development directions were discussed.
    Security architecture model for broadband wireless IP networks
    WU Zhen-qiang,MA Jian-feng
    2005, 25(08):  1730-1733.  DOI: 10.3724/SP.J.1087.2005.01730
    Asbtract ( )   PDF (217KB) ( )  
    Related Articles | Metrics
    Because of the asymmetry characteristic of BWIP networks, the existing security architecture frames can not completely satisfy the security requirement of the future BWIP networks, such as ISO/IEC7498-2, IPsec, WAP, 3GPP and CDSA. A kind of security architecture model which fits for the future BWIP networks was presented. The model integrated rationally with many technologies concerned in BWIP networks, for instance management, security Operation, AAA, PKI and the policy implement. Then a handling flow was described in detail of security architecture model for BWIP which flows out and in the model. Finally, some research directions of the security architecture for future BWIP were given.
    Database system model to strengthen safety
    WEN Jun-hao,XU Ling,LI Li-xin,XU Chuan-yun
    2005, 25(08):  1734-1736.  DOI: 10.3724/SP.J.1087.2005.01734
    Asbtract ( )   PDF (158KB) ( )  
    Related Articles | Metrics
    A secure model was proposed which not only relied on prevention controls but also incorporated detect intrusion and tolerant intrusion. The model can detect intrusions and locate and repair the damage caused by intrusion based on transactions, which protect the database system and provide secure services to legitimate clients. The techniques of both redundancy and diversity were utilized for secret data storage. Threshold secret share approach was presented to protect confidential data based on Chinese remainder theorem.
    Simplified implementation of ICMPv6 and NDP for small-embedded device
    WU Zhe, LU Gang, ZHANG Wei, LI Yi
    2005, 25(08):  1737-1739.  DOI: 10.3724/SP.J.1087.2005.01737
    Asbtract ( )   PDF (149KB) ( )  
    Related Articles | Metrics
    Resource limitations and cost constraints associated with small-embedded devices make it difficult to implement the entire IPv6 specification. And therefore, the simplification of functionality of protocols as well as the cutting of protocols plays an important role in the implementation. The backgrounds of ICMPv6 and NDP as well as the definitions and features of the small-embedded devices were introduced at first.Then some suggestions of simplified implementation of ICMPv6 and NDP for small-embedded devices were given. The implementation and tests of the protocol were described,and results of the tests were given at last.
    Research and implementation of the recommendatory policy-based search algorithm in P2P network
    CAO Jing-xia,YANG Jing,GU Jun-zhong
    2005, 25(08):  1740-1743. 
    Asbtract ( )   PDF (203KB) ( )  
    Related Articles | Metrics
    In DHT algorithm of structured P2P architecture, to increase the routing performance and decrease the maintenance cost when peers join/leave the network, a recommendatory policy-based search algorithm(RPSA) was put forward. RPSA improved the existed DHT algorithm,and the performance of it was validated on the P-Grid prototype system.
    Anomaly detection technique based on hidden Markov model
    AN Jing-qi,LIU Gui-quan,QIAN Quan
    2005, 25(08):  1744-1746.  DOI: 10.3724/SP.J.1087.2005.01744
    Asbtract ( )   PDF (148KB) ( )  
    Related Articles | Metrics
    An algorithm was given to making a kind of HMM(Hidden Markov Model) for anomaly detection. The application in anomaly detetction of the model was introduced from analyzing on support of sequence and sequence prediction.Factions which inflect results and efficiency were discussed by the experiments. And the experiments also show that the method can detect intrusion without any security knowledge.
    Theory and application of strand spaces model
    TAN Li-li,LIU Jing,XIE Hong-bo,TAN Xing-lie
    2005, 25(08):  1747-1749.  DOI: 10.3724/SP.J.1087.2005.01747
    Asbtract ( )   PDF (168KB) ( )  
    Related Articles | Metrics
    The basic notion of strand spaces model was introduced, then a equivalence formula checking secrecy of messages was given, and it was proven that a signed message by a confidential private key had its origin in a honest strand. Finally these two conclusions were used to check BAN modified version of CCITT X.509(3) protocol.
    Identity verification system using JPEG 2000 real-time quantization watermarking and fingerprint recognition
    JIANG Dan,XUAN Guo-rong,YANG Cheng-yun,ZHENG Yi-zhan,LIU Lian-sheng,BAI Wei-chao
    2005, 25(08):  1750-1752.  DOI: 10.3724/SP.J.1087.2005.01750
    Asbtract ( )   PDF (151KB) ( )  
    Related Articles | Metrics
    The proposed JPEG 2000 real-time quantization watermarking algorithm was used in an improved online bank pension distribution system. The system was based on fingerprint recognition and digital watermarking technologies. In the client side, real-time quantization watermark was embedded into the sampled fingerprint image in the JPEG 2000 coding pipeline; then the compressed bit-stream was sent to the server side. In the server side, the watermark was extracted from the compressed bit-stream in the JPEG 2000 decoding pipeline; then the decompressed fingerprint image and extracted watermark were used to verify users identification. Experiments showed when typical fingerprint image was compressed to 1/4~1/20 of its original size, the embedded watermark could be exactly extracted, and fingerprint recognition rate remained almost the same after lossy compression. The system has a better interaction performance in the band-limited network situation, and is very promising in the E-business applications.
    Policy-driven network management architecture based on multi-agent
    ZHANG Peng-liang,YANG Jian-gang
    2005, 25(08):  1753-1755.  DOI: 10.3724/SP.J.1087.2005.01753
    Asbtract ( )   PDF (198KB) ( )  
    Related Articles | Metrics
    A policy-driven network management architecture based on multi-agent was presented after analysing the policy-based management and intelligent Agent-based management,and many features of the policy-based management and intelligent Agent technology was utilized in it.The architecture performs well in constructing a service-oriented and self-managed distributed management system.
    VPN security system based on mobile Agent
    HU Bao-fang,WANG Hong,ZHANG Xia
    2005, 25(08):  1756-1759.  DOI: 10.3724/SP.J.1087.2005.01756
    Asbtract ( )   PDF (200KB) ( )  
    Related Articles | Metrics
    Aimed at the security problem in network information exchange,combining Virtual Private Network(VPN) and mobile Agent technologies,a new VPN security architecture named VPNAgent System was presented which works at a virtual private network.The system has a mobile Agent named VPNClientAgent which is an analogy to the cumtoms Agent in real life.It works at the client,inspects the packets, signs the legal ones and guards them to the firewall.There is a static Agent named StaticAgent.The StaticAgent inspects the signature of the packets and the packets with valid signature can go through the firewall without decryption to improve the security of the packets.
    Graphics, image and multimedia
    FLIR image segmentation based on wavelet neural networks with adaptive learning
    LI Zhao-hui,CHEN Ming
    2005, 25(08):  1760-1763.  DOI: 10.3724/SP.J.1087.2005.01760
    Asbtract ( )   PDF (243KB) ( )  
    Related Articles | Metrics
    In the course of tracking IR motive targets, a large number of false alarm signals might appear in the target detection stage of an IR ATR system because of the non-prediction of IR targets signature. So the false alarm signals had to be filtered in the stage of holding down background clutters. A new FLIR image segmentation technique was presented based on wavelet neural networks, aiming to fusing both local characteristic of wavelet time-frequency and adaptive learning by neural networks, and resulting in the powerful abilities of approximation and tolerate error in IR image segmentation. This new algorithm was applied in a FLIR-ATR system, and got favorable results in achieving IR target contours and damping background noises.
    Face recognition based on uncorrelated weighted discriminant analysis
    LIANG Yi-xiong,GONG Wei-guo,PAN Ying-jun,LI Wei-hong
    2005, 25(08):  1764-1766.  DOI: 10.3724/SP.J.1087.2005.01764
    Asbtract ( )   PDF (147KB) ( )  
    Related Articles | Metrics
    A novel method based on weighted uncorrelated discriminant analysis for face recognition was proposed. First, the Fisher criterion was redefined by introducing a weighting of the contributions of individual class pairs to the overall criterion. Then, the weighted Fisher criterion was optimized under the conjugated orthogonal constrain, which can guarantee the derived projection directions were statistically uncorrelated. Experiments were carried out to compare the proposed method with classical Eigenfaces method and other LDA-based methods such as Fisherfaces and ULDA. The experimental results on the AR face database show the effectiveness of the proposed algorithm and its insensitivity to the variants of face expression, illumination and sessions.
    二维主成分分析方法的推广及其在人脸识别中的应用
    Generalization of 2DPCA and its application in face recognition
    CHEN Fu-bing,CHEN Xiu-hong,GAO Xiu-mei,YANG Jing-yu
    2005, 25(08):  1767-1770.  DOI: 10.3724/SP.J.1087.2005.01767
    Asbtract ( )   PDF (201KB) ( )  
    Related Articles | Metrics
    A human face recognition technique based on modular 2DPCA was presented. First, the original images were divided into modular images in proposed approach. Then the 2DPCA method could be directly used to the sub-images obtained from the previous step. There are three advantages for this way: 1)dimension reduction of discriminant features can be done conveniently; 2)singular value decomposition of matrix is fully avoided in the process of feature extraction, so the features for recognition can be gained easily; 3)as opposed to 2DPCA, the feature matrix of lower dimension can be employed, and higher (not less at least) correct recognition rate can be reached. Moreover, 2DPCA is the special case of modular 2DPCA. To test modular 2DPCA and evaluate its performance, a series of experiments were performed on three human face image databases: ORL and NJUST603 human face databases. The experimental results indicated that the performance of modular 2DPCA is superior to that of 2DPCA.
    Face alignment based on statistical models and Gabor wavelet
    YU Mian-shui,LI Shao-fa
    2005, 25(08):  1771-1773.  DOI: 10.3724/SP.J.1087.2005.01771
    Asbtract ( )   PDF (144KB) ( )  
    Related Articles | Metrics
    A face alignment scheme was proposed by integrating the Gabor-wavelet facial feature points tracking algorithm with the facial feature points localization method based on statistical mode AAM(Active Appearance Model). First the facial feature points were tracked with Gabor wavelet, then the result was used as the initial shape of the AAM. The local tracking errors of Gabor wavelet were corrected with the global constrained shape and texture information of AAM. Experiments prove that the method works well.
    Face image correction by average template
    LENG Yan,WANG Hui-yuan,WANG Zeng-feng
    2005, 25(08):  1774-1777.  DOI: 10.3724/SP.J.1087.2005.01774
    Asbtract ( )   PDF (154KB) ( )  
    Related Articles | Metrics
    An image preprocessing approach was presented to improve the robustness of face recognition-Image Correction By Average Template(ICBAT). ICBAT compared a face image with the average template, and constructed a weight through the difference of them,and it realized correction of the face image by adding the weight to it. Experiments show that the proposed method can greatly reduce the bright speckles and shadows of images caused by lighting and decrease the sensitivity of face recognition to the variations of facial expression and illumination. Meanwhile, this approach can increase the independence of recognition on the number of training samples.
    Face recognition with one training sample by repeatedly used face features
    LIAO Hong-wen,FENG Guo-can
    2005, 25(08):  1777-1779.  DOI: 10.3724/SP.J.1087.2005.01777
    Asbtract ( )   PDF (141KB) ( )  
    Related Articles | Metrics
    Face recognition for one training sample is one of the most challenge tasks. Many developed systems, that work very well when there are sufficient representative training samples, often become less effective or low accuracy for one training sample. After analysing the local facial features, several significant features to represent the human face were selected. Then a novel algorithm of feature extraction for single sample by exploiting repeatedly the selected face features was proposed following the Boosting methods. Finally, two face recognition systems were built by combining whole face features with local face features—— voting-based method with multi-features and mothod with repeatedly used features. The experiments show that the developed systems have good performance in comparison with the existing system.
    Analysis and research of a window-constrained real-time system with mutual frames
    ZHU Xiang-bin,JIN Yong-xian
    2005, 25(08):  1780-1782.  DOI: 10.3724/SP.J.1087.2005.01780
    Asbtract ( )   PDF (183KB) ( )  
    Related Articles | Metrics
    A key problem of real-time operating systems is real-time scheduling policy. Based on the research of Dynamic Window-Constrained Scheduling (DWCS), a periodic window-constrained real-time model with mutual frames was proposed. Firstly, the mode was analyzed and some conclusions about the schedulability of this model were got. In succession, a Dynamic Dual-Window-Constrained Scheduling(DDWCS) was proposed which use the characteristic of mutual frames to improve the schedulability of this model. To evaluate the performance of the new algorithm, extensive simulation studies have been done. These simulations apply DWCS algorithm to schedule the periodic window-constrained real-time model with mutual frames and use it as a baseline to compare with the proposed algorithm. Simulation results show that the new algorithm is better than the old algorithm.
    Video clip retrieval based on keyframe sequence
    SHI Zhi-ping,LI Qing-yong,SHI Jun,SHI Zhong-zhi
    2005, 25(08):  1783-1785.  DOI: 10.3724/SP.J.1087.2005.01783
    Asbtract ( )   PDF (200KB) ( )  
    Related Articles | Metrics
    A keyframe merging-based video clip retrieval method was presented. Videos were segmented to sub-shots by features joint distribution histogram and the sub-shots were represented by keyframes.Finding the similar keyframes to any keyframes of an example video clip when retrieving,and all the similar keyframes were merged into clips.An efficient similarity model of video clips was put forward. The experimental results show that the proposed method is efficient.
    Study and implement of determining convex-concave features for vertices of polygon
    WANG Xue-ming
    2005, 25(08):  1786-1788.  DOI: 10.3724/SP.J.1087.2005.01786
    Asbtract ( )   PDF (148KB) ( )  
    Related Articles | Metrics
    By the study of several typic methods of determining convexo-concave features for vertices of polygon,the computation time complexity of these methods was analysed, and those methods were implemented in (VC++).
    New approach to cultural relic image retrieval
    WEI Na,GENG Guo-hua,ZHOU Ming-quan
    2005, 25(08):  1789-1791.  DOI: 10.3724/SP.J.1087.2005.01789
    Asbtract ( )   PDF (181KB) ( )  
    Related Articles | Metrics
    Concerning about the characteristic of the cultural relic images, a new approach was proposed to cultural relic image retrieval. For feature extraction, fuzzy color histogram based on segmented image was used. Fuzzy color histogram (FCH )considers the color similarity of each pixel’s color associated to all the histogram bins through fuzzy-set membership function. The strategy of using segmented image represented not only the color properties but also the shape properties. A new similarity measurement-mutual information distance was proposed. The proposed method was proved to be an effective one in terms of the evaluation parameter AVRR/IAVRR.
    Gait recognition based on the width of the body contour
    YE Bo,WEN Yu-mei
    2005, 25(08):  1792-1794.  DOI: 10.3724/SP.J.1087.2005.01792
    Asbtract ( )   PDF (211KB) ( )  
    Related Articles | Metrics
    An appearance-based approach to the problem of gait recognition was adopted. The width of the outer contour of the binarized silhouette of a walking person was chosen as the basic image feature. A statistical method which combined Principal Component Analysis(PCA) with Linear Discriminant Analysis(LDA) for feature transformation of spatial templates was proposed. This method was used to reduce data dimensionality and to optimize the class separability of different gait sequences. Our method is applied to three data-sets(NLPR,CMU,UMF), extensive experimental results demonstrate that the proposed algorithm performs an encouraging recognition rate with relatively lower computational cost.
    Gait recognition based on moment invariants
    LI Lei-sheng,XIAO De-gui
    2005, 25(08):  1795-1796.  DOI: 10.3724/SP.J.1087.2005.01795
    Asbtract ( )   PDF (131KB) ( )  
    Related Articles | Metrics
    A new method was described for gait recognition by using moment invariants. The body contour represented in 2D signature was transformed into moment invariants represented in 1D signature. The gait sequences could be represented by using moment invariants vectors. The vectors were normalized and used to recognize the gait. The results of the experiments show that the method have an encouraging recognition performance.
    Hierarchical semantic associative video model based on content
    LIU Hong-zhe,BAO Hong,XU De
    2005, 25(08):  1797-1780.  DOI: 10.3724/SP.J.1087.2005.01797
    Asbtract ( )   PDF (197KB) ( )  
    Related Articles | Metrics
    A hierarchical semantic associative video model was proposed which described video information in hierarchical concept tree,scene network and semantic object net. The concept tree could be constructed under different applications. Time information of video was represented by scene network. The contents of video shots were represented by semantic objects and their relations, and the semantic correlations between shots were represented by semantic relations among objects which were in different shots.Video can be retrieved by time information and other semantic information,and the results are convergented.
    Method for cell image segmentation based on scale space analysis and probability relaxation
    XIA Wei,TENG Qi-zhi,ZHANG Yi-qiong,LUO Dai-sheng
    2005, 25(08):  1801-1804.  DOI: 10.3724/SP.J.1087.2005.01801
    Asbtract ( )   PDF (214KB) ( )  
    Related Articles | Metrics
     A hybrid method was proposed for cell image segmentation based on histogram analysis using scale space approach and probability relaxation. Firstly, according to the properties of the histogram scale space of an original image and the result of the multiscale filtering, optimal thresholds were determined for classifying the cells image. Then an iterative probability relaxation operation is applied in order to optimize the coarse segmentation. In the postprocessing step, overlapped cells were spilt. To compare with maximum deviation method and region growing method, some results of segmentation were given. The results show that the proposed method is more effective.
    2-D maximum entropy method in image segmentation based on genetic quantum algorithm
    ZHOU Lu-fang,GU Le-ye
    2005, 25(08):  1805-1807.  DOI: 10.3724/SP.J.1087.2005.01805
    Asbtract ( )   PDF (130KB) ( )  
    Related Articles | Metrics
    With high computing complexity, traditional 2-D maximum entropy method is a defective method in image segmentation, although many algorithms have been proposed to bear on this problem. Considering GQAs (Genetic Quantum Algorithm) ability to retain the diversity of population and to converge rapidly, a 2-D maximum entropy method based on GQA was put forward. Compared with 2-D maximum entropy method based on classical genetic algorithm in experiments, this method was proved to perform better.
    Research of H.264/AVC intra-prediction mode selection algorithm
    PEI Shi-bao,LI Hou-qiang,YU Neng-hai
    2005, 25(08):  1808-1810.  DOI: 10.3724/SP.J.1087.2005.01808
    Asbtract ( )   PDF (144KB) ( )  
    Related Articles | Metrics
    H.264/AVC employed intra-prediction technique in space domain to enhance coding efficiency, but it increased prediction complexity drastically because of quite a few intra-prediction modes. A new Intra_44 mode selection algorithm based on rate distortion optimization(RDO) was proposed. It employed SATD(Sum of Absolute Transform Difference) of each block as a judgment and used correlation between prediction modes of adjacent blocks to filter out more than 65% less probable modes beforehand so as to avoid unnecessary computations. The new algorithm reduces the intra-prediction complexity greatly while maintaining coding performance very well.
    Mixed features-based fast intra-prediction mode decision for H.264/AVC
    GE Xian-xian,ZHANG Jun-feng,HAO Chong-yang,WANG Yu,XI Ying-lai
    2005, 25(08):  1811-1814.  DOI: 10.3724/SP.J.1087.2005.01811
    Asbtract ( )   PDF (183KB) ( )  
    Related Articles | Metrics
    Due to the use of Rate Distortion Optimization(RDO) for the decision of multiple intra-prediction modes, a full search method used in reference software of H.264/AVC comes at a cost in greatly increased complexity at the encoder. In order to improve the time efficiency of the encoder, a mixed features-based on fast intra-prediction mode decision method aiming at 44 luminance blocks was proposed. DC mode was emphasized in this method, and it was combined with the mixed features of cost functions to form mixed decision information. Advance modes were filtered by virtue of these mixed features, and the decision approach was speeded up. The experiment results show that the new scheme is able to achieve a reduction of up to 30% encoding time for I frames of image sequences, with negligible Peak Signal-Noise Ratio (PSNR) loss and bit rate increase compared with the original H.264/AVC reference software.
    Database and aritficial intelligence
    Parallel processing techniques of multi-sensor data fusion
    XIA Xue-zhi,TU Kui,CHENG Jian-xun,ZHANG Zi-he
    2005, 25(08):  1815-1817.  DOI: 10.3724/SP.J.1087.2005.01815
    Asbtract ( )   PDF (143KB) ( )  
    Related Articles | Metrics
    Based on the analysis of the data fusion algorithms, a data fusion processing system based on the cluster was designed according to the algorithms feature and the mapping methods were given, which achieve real-time processing of large numbers of targets,and the conclusion of test in our laboratory was given.
    Improved clustering algorithm based on density and grid in the presence of obstacles
    YAN Xin,ZHOU Li-hua,CHEN Ke-ping,XU Guang-yi
    2005, 25(08):  1818-1820.  DOI: 10.3724/SP.J.1087.2005.01818
    Asbtract ( )   PDF (194KB) ( )  
    Related Articles | Metrics
    An improved grid diffusant clustering algorithm in the presence of obstacles called DCellO1 was proposed. Based on grid,it combined density-based clustering algorithm with seed-filling algorithm of graphics. It could construct arbitrary shape clustering in the presence of obstacles, and could obtain good clustering results when the objects distributed unevenly. The experiments prove the superiority and effectiveness of DCellO1.
    Dimensionality reduction for text document using difference-similitude matrix
    HUANG Xiao-chun,YAN Pu-liu,XIA De-lin,CHEN Jian
    2005, 25(08):  1821-1823.  DOI: 10.3724/SP.J.1087.2005.01821
    Asbtract ( )   PDF (153KB) ( )  
    Related Articles | Metrics
    Due to the huge amount of text documents and their vocabulary, document spaces are commonly of high dimensionality, and many automatical text categorization algorithms can not get their best performences directly. Difference-similitude Matrix-based (DSM) method reduces dimensionality to a great extend. Pre-classified collection is represented as a item-document matrix after preprocessing, then transmitted into a DSM, in which documents in the same classes are depicted with similitude while documents in different classes with difference. The method generates an item set of low dimensionality and a set of classification rules after dealing with the DSM. Results of experiments suggest that DSM-based method could achieve high attribute reduction degree and sample reduction degree with good classification quality.
    Efficient density-based clustering algorithm
    SHI Lu-kui,HE Pi-lian
    2005, 25(08):  1824-1826.  DOI: 10.3724/SP.J.1087.2005.01824
    Asbtract ( )   PDF (193KB) ( )  
    Related Articles | Metrics
    An efficient density-based clustering algorithm was presented based on DBSCAN(Density Based Spatial Clustering of Applications with Noise). In this method, objects were sorted by a certain dimensional coordinate at first. Then the new algorithm selected in order unlabelled points outside a core objects neighborhood as seeds to expand clusters so that the execution frequency of region queries could be decreased, and consequently the time cost was diminished. Transforming objects with a non-linear kernel function could effectively improve the clustering accuracy. The theoretic analysis demonstrates that the time complexity of this algorithm is approximately linear. Experimental results also show that the time efficiency and the clustering quality of the new algorithm are greatly superior to those of the original DBSCAN.
    Mining association rules based on consult measure
    LIN Jia-yi,PENG Hong, ZHENG Qi-lun,LI Ying-ji
    2005, 25(08):  1827-1829.  DOI: 10.3724/SP.J.1087.2005.01827
    Asbtract ( )   PDF (146KB) ( )  
    Related Articles | Metrics
    Some problems of the current measures for association rules were analyzed. A new measure named consult was defined and added to the mining algorithm for association rules. According to the value of consult, association rules were classified into positive, negative and invalid association rules. The new algorithm could find out the negative-item-contained rules. Finally, the algorithm was evaluated and analyzed through experiments and practices.
    Algorithm for single machne schedule with sequence dependent setup to minimize maximum tardiness
    LUO Xiao-chuan,WANG Cheng-en
    2005, 25(08):  1829-1832.  DOI: 10.3724/SP.J.1087.2005.01829
    Asbtract ( )   PDF (177KB) ( )  
    Related Articles | Metrics
    The NP-hard problem of scheduling N jobs on a single machine with due dates, sequence-dependent setup was addressed, where the objective was to minimize the maximum tardiness. An algorithm based on branchand-bound permutation schemes was developed including the implementation of lower and upper bounding procedures, and two dominance rules. Computational experiments demonstrate the effectiveness of the algorithm.
    Common knowledge-based pricing algorithm in electronic marketplaces
    HAN Wei,WANG Yun,WANG Cheng-dao,BAI Zhi-jiang
    2005, 25(08):  1833-1835.  DOI: 10.3724/SP.J.1087.2005.01833
    Asbtract ( )   PDF (136KB) ( )  
    Related Articles | Metrics
    The role of common knowledge of pricing game in electronic marketplaces was studied. By simply changing the demand function and allocation function, seller Agents can acquire the common knowledge about the constantly changing market, rather than inferred individual knowledge. Simulation results indicated that seller Agents tends to be more coordinated in their pricing behaviour and became more intelligent in concerning the problem of whether to cooperate or compete in a long term. Results also shows that common knowledge can improve market effectiveness.
    Research of individual intelligence information service algorithm in learning enterprises
    WU Yan-wen,WU Zheng-hong,LI Jin-ling
    2005, 25(08):  1836-1839.  DOI: 10.3724/SP.J.1087.2005.01836
    Asbtract ( )   PDF (203KB) ( )  
    Related Articles | Metrics
    The intelligent information service system architecture of learning enterprises was built based on SOA (Services Oriented Architecture). An individual intelligence information service algorithm (IIISA) was put up, and it was proved. The key parts of IIISA were introduced, including producing and dynamic optimizing main individual factors, constructing individual fuzzy neural network, matching the individual information by function.
    Role-based cooperating fuzzy comprehensive evaluation
    2005, 25(08):  1840-1842.  DOI: 10.3724/SP.J.1087.2005.01840
    Asbtract ( )   PDF (192KB) ( )  
    Related Articles | Metrics
    Aiming at several key issues in the fuzzy comprehensive evaluation, the structure of cooperating fuzzy comprehensive evaluation system(CFCES) was intorduced which used of CSCW technology. Analyzing the merits and demerits of both traditional concentrating and distributing control methods, gave formally a basic model of CFCES based on roles,A basic model of CFCES based on roles was given formally after analyzing the merits and demerits of both traditional concentrating and distributing control methods, and the implementing procedure of role-based cooperating components in CFCES was described.
    Research of semantic caching based on large-scale transaction processing system
    XIANG Yang,YANG Shu-qiang,CAI Jian-yu,JIA Yan
    2005, 25(08):  1843-1845.  DOI: 10.3724/SP.J.1087.2005.01843
    Asbtract ( )   PDF (225KB) ( )  
    Related Articles | Metrics
    Aiming at several key issues in the fuzzy comprehensive evaluation, the structure of cooperating fuzzy comprehensive evaluation system(CFCES) was intorduced which used of CSCW technology. Analyzing the merits and demerits of both traditional concentrating and distributing control methods, gave formally a basic model of CFCES based on roles,A basic model of CFCES based on roles was given formally after analyzing the merits and demerits of both traditional concentrating and distributing control methods, and the implementing procedure of role-based cooperating components in CFCES was described.
    Scheme of interfusing relational database based on IIMS
    ZHANG Yuan-yuan,XIA Xue-ting,TAO Hong-cai
    2005, 25(08):  1846-1848.  DOI: 10.3724/SP.J.1087.2005.01846
    Asbtract ( )   PDF (124KB) ( )  
    Related Articles | Metrics
    A new scheme of interfusing relational database based on IIMS was proposed. With this scheme, a preliminary study of the way to build meta data for relational database was study, and a typical application case by using this scheme was given.
    Design and implementation of XML mapping rule based data migration method
    HU Xiao-peng,LI Xiao-hang,LI Gang
    2005, 25(08):  1849-1852.  DOI: 10.3724/SP.J.1087.2005.01849
    Asbtract ( )   PDF (178KB) ( )  
    Related Articles | Metrics
    Data migration is a mapping between source database and target database. The formal process of data migration was addressed and several principal mappings among the process were analyzed. An XML-based mapping rule representation method was fully discussed. Furthermore, an approach which can be used to retrieve XML mapping rule skeleton by parsing table object creation DDL script was intorduced. Finally, the method was applied in practice.
    Algorithm based on value reduction and decision tree to generate minimal rules
    LUO Qiu-jin,CHEN Shi-lian
    2005, 25(08):  1853-1855.  DOI: 10.3724/SP.J.1087.2005.01853
    Asbtract ( )   PDF (136KB) ( )  
    Related Articles | Metrics
    Value reduction in rough set theory and decision tree in data mining are effectively used in the classification, but each of them has shortcomings. Those two methods were combined to generate a new minimal method based on value core to pollard the decision tree. Then judgmental standards of rule reduction were proposed to decrease the quantity of reducted rules. In the end, the classing rules were dealed with by maximal method to ensure the consistency of the knowledge contained by the rules. The algorithm is efficient which was proved by the experiment.
    An efficient algorithm for mining association rules based on concept lattices
    XU Quan-qing,ZHU Yu-wen, LIU Wan-chun
    2005, 25(08):  1856-1857.  DOI: 10.3724/SP.J.1087.2005.01856
    Asbtract ( )   PDF (167KB) ( )  
    Related Articles | Metrics
    Among some association algorithms, Apriori algorithm should be made better in processing item and transaction sets, for example, its efficiency in creating frequent 2-item L2 is very low. Apriori algorithm was researched and its merits and defects were analysed. A new association rule algorithm, Apriori algorithm based on concept lattices (ACL), was put forward. It adopted concept lattices and equivalence relationship, made use of the theory of rough sets, and then calculated to gain frequent 2-item L_2. Experiment results show that ACL is an efficient algorithm, and outperforms previous methods.
    Design of intercepting ball in the robot soccer match
    GU Xiao-feng,ZHANG Dai-yuan
    2005, 25(08):  1858-1860.  DOI: 10.3724/SP.J.1087.2005.01858
    Asbtract ( )   PDF (158KB) ( )  
    Related Articles | Metrics
    The efficiency of the interception affects directly on the result of the soccer match in Robot World Cup. Base on the model of the intercepting soccer, the equation is deduced, then the position of the interception can be calculated with the root of the equation. Obtaining the root of the equation is the critical of improving the efficiency. Effective chord secant method(CSM) was used to determine the root of the quation quickly. Experiments results show that the efficiency of CSM is influenced greatly by the variation of the quation. The shape of the curves affects directly the speed of the convergence of CSM. In order to improve the convergence of CSM, an optimization is needed. Compared with the CSM before optimizing and dichotomy, the result has shown that the integrative effectiveness of the new method is much better. This new method also satisfies the need of the interception speed required in Robot World Cup.
    Software development and method
    Reconfiguration-oriented business models for enterprise information system
    WANG Zhong-jie,XU Xiao-fei,ZHAN De-chen
    2005, 25(08):  1861-1864.  DOI: 10.3724/SP.J.1087.2005.01861
    Asbtract ( )   PDF (194KB) ( )  
    Related Articles | Metrics
    It is necessary for enterprise information systems to dynamically adjust its structure and behaviors to adapt to the continuous changes of business environment. The reconfiguration ability of business models is a key factor which influences the reconfiguration ability of the whole enterprise information system. Based on the analysis of reconfiguration-oriented design principles, a business rules based business model was presented, and description method for every type of business rule was shown in detail. In this model, by continuous decomposition of business elements, frequently-changing parts in business models were clearly separated from stable parts, and expressed by business rules, which significantly improve flexibility of business models. Finally the modeling process for this kind of business model was briefly proposed.
    Network detecting control based on ActiveX technique
    ZHANG Nan,LI Zhi-shu,ZHANG Jian-hua
    2005, 25(08):  1865-1866.  DOI: 10.3724/SP.J.1087.2005.01865
    Asbtract ( )   PDF (127KB) ( )  
    Related Articles | Metrics
    A network packet detecting control was designed and realized based on ActiveX technique. By using this control, applications can capture and deal with network packet based on users command in all kinds of programming environments. The control provides programmer a unified interface to develop network applications which need capturing packet. It brings users great convenience.
    Research and implimentation of multi-attribute co-adaptive matchmaking mechanism
    ZHANG Deng-hui, GAO Ji
    2005, 25(08):  1867-1869.  DOI: 10.3724/SP.J.1087.2005.01867
    Asbtract ( )   PDF (137KB) ( )  
    Related Articles | Metrics
    Matchmaking is used to make a match between supply and demand in inadequacy information market. The complex and changeful market information make it more difficult to confirm precise specification. A specification optimal mechanism was designed by feedback. A utility-based similarity compare method was given. The performance of fixed value and dynamic value in optimal process was analysed. Finally, the mechanism’s validity was verified by a experiment.
    Semantic representation method of tournament scheduling constraints in Olympics
    PU Chuan-jiang,HUANG Bi-qing,LI Chun-ping
    2005, 25(08):  1870-1873.  DOI: 10.3724/SP.J.1087.2005.01870
    Asbtract ( )   PDF (246KB) ( )  
    Related Articles | Metrics
    Scheduling results for sport tournament in Olympics should satisfy the tournament routine, programming rules and demands of each sport. It should satisfy all constraints to the max. The tournament scheduling constraints in Olympics had characters of large numbers of quantity and category, dynamic alterability. The semantic representation method, established by constraint templates and constraint items based on the relation database, had flexible and extensible advantages. It realized the functions of representing, parsing, interacting and storing scheduling constraints, also resolved man-machine interactive and dynamic alterable problems.
    Aspect-oriented real-time system modeling method based on UML
    LIU Rui-cheng,ZHANG Li-chen
    2005, 25(08):  1874-1877.  DOI: 10.3724/SP.J.1087.2005.01874
    Asbtract ( )   PDF (182KB) ( )  
    Related Articles | Metrics
    Real-time systems could be modeled by using aspect-oriented programming (AOP) technology based on UML. Timing requirements could be separated from the systems and expressed as a time-aspect independence of the systems. So the time-aspect can be designed concurrently, and the time feature of the systems can be managed by the unified model. The time-aspect could be woven into systems to compose real-time systems based on the AOP technology only when needed for a particular application. Real-time systems could be modeled from the static structure, dynamic behaviors and weaving of the time-aspect. The model extends UML to meet the need of AOP technology and the time model, and improves the usability of the software. Finally an elevator case was given as an example.
    Design and implementation of semantic Web service reputation model
    CHEN Ding-jian,WU Jian,MA Man-fu,HU Zheng-guo
    2005, 25(08):  1878-1880.  DOI: 10.3724/SP.J.1087.2005.01878
    Asbtract ( )   PDF (152KB) ( )  
    Related Articles | Metrics
    Reputation evaluated the semantic Web service according to its past behavior. Through studying the characteristics of semantic Web service, a reputation model of semantic Web service was proposed, and the algorithm relevant to it was also researched deeply. This model has the advantage of adding the semantic information into the service reputation and integrating the evaluation of third party authority organization, which makes the reputation evaluation more efficient and exact. In addition, an application scenario of this model was also proposed, which integrated this reputation model into the current semantic Web service infrastructure, along with the class structure of reputation object.
    Population-redistribution GA for curve fitting
    ZHANG Zun-lin, YANG Guang
    2005, 25(08):  1881-1883.  DOI: 10.3724/SP.J.1087.2005.01881
    Asbtract ( )   PDF (146KB) ( )  
    Related Articles | Metrics
    In order to improve the poor local search capability and low convergence precision of GA when applied in curvefitting, a new improved GA, named Population Redistributing Genetic Algorithm (PRGA), was proposed. With the progress of GA, this new algorithm adjusted the distribution of the population according to the quality of the best solution, thus effectively improved GAs local search capability. According to the results of the experiments on simulated data, PRGA gives better results in curve fitting compared with simple GA and traditional numerical iterative method.
    Project management system based on the integrated architecture of Struts and Hibernate
    FENG Guo-shi,LI Zhi-sh
    2005, 25(08):  1884-1886.  DOI: 10.3724/SP.J.1087.2005.01884
    Asbtract ( )   PDF (208KB) ( )  
    Related Articles | Metrics
    Both Struts architecture and Hibernate architecture contribute to building a Web information system, but both of them have their respective benefits and drawbacks. Integrating the two architecture with the DAO pattern not only avoid their disadvantages while retain their advantages, but also make them more powerfull. The mechanism and the way to integrate the two architecture was discussed, and an efficient way was brought forth to develope a powerful and flexible information system by expatiateing the developing of a practical project management information system based on the integrated architecture.
    Development and design of WAP based on MVC pattern
    WU Yi-ting,YAO Lin
    2005, 25(08):  1887-1889.  DOI: 10.3724/SP.J.1087.2005.01887
    Asbtract ( )   PDF (167KB) ( )  
    Related Articles | Metrics
    Focusing on WAP technology and its application in mobile Internet, which is popular at present, there was a research about using mature MVC pattern on designing such applications. It gave a brief introduction of WAP, WAP network and MVC pattern, and also introduced MVC pattern to WAP system, which made WAP program optimized. A concrete application was given as an example lastly.
    An improved EFSM model for class test
    CHEN Yi, SANG Nan, LEI Hang
    2005, 25(08):  1890-1892.  DOI: 10.3724/SP.J.1087.2005.01890
    Asbtract ( )   PDF (148KB) ( )  
    Related Articles | Metrics
    Due to the variable interdependencies among the operations and preconditions, certain paths of an extended finite state machine (EFSM) may not be feasible. These infeasible paths complicate the class test generation process from EFSMs. By transforming UML state diagrams into extended finite state machines (EFSMs), an algorithm is presented to eliminate the infeasible paths in these EFSMs. Thus a class test model for object-oriented software can be constructed.The model is suitable for class testing by using control and data flow analysis techniques.
    Modeling of petri-net-based office automation workflow
    LU Xiao-feng,WANG Xin-fang,LI Yan,LI Ai-min
    2005, 25(08):  1893-1895.  DOI: 10.3724/SP.J.1087.2005.01893
    Asbtract ( )   PDF (146KB) ( )  
    Related Articles | Metrics
    Petri-net is a wise choice to model and analyze workflow for its solid mathematical foundations and explicit structures based on graphic. This paper discribes document management in the office automation system, presents a modeling of petri-net-based office automation workflow, tests its correctness, and finally improves the effectiveness and efficiency of office automation system.
    Design and implementation of Java Web browser component
    CHEN Yi-min,ZHANG Ji-chao,YUAN Yi
    2005, 25(08):  1896-1898. 
    Asbtract ( )   PDF (211KB) ( )  
    Related Articles | Metrics
     JEditorPane is a standard Java component,and it provides HTML 3.2 support but dose not support HTML 4.0 which is widely used now. It can not render the multimedia contained in HTML page. A design of Java Web browser component was presented based on a native browser. The component made use of native browser through a native process which invoked the real browser and communicated with Java process via(by) socket channel. By using Java AWT native interface, native browser was embedded into Java AWT/Swing application. This component provides the ability of rendering HTML page in Java application.
    Design and implementation of the smart card manager based on CTCA
    WANG Jiang
    2005, 25(08):  1899-1902.  DOI: 10.3724/SP.J.1087.2005.01899
    Asbtract ( )   PDF (186KB) ( )  
    Related Articles | Metrics
    Based on certificate storage criterion, encryption and decryption standard of China Telecom CA center and PKCS11 protocol, a smart card manager to solve the differentia of all kinds of smart card was designed. The smart card manager provides a standard interface to all the developers based on CTCA.The design and implementation of the manager model was given too.
    A novel niche genetic algorithm of accurate optimization performance
    ZHANG Zhao-zhong,ZHANG Wen-yin
    2005, 25(08):  1903-1905.  DOI: 10.3724/SP.J.1087.2005.01903
    Asbtract ( )   PDF (142KB) ( )  
    Related Articles | Metrics
    Based on crowding mechanism, a novel niche genetic algorithm was proposed which can record evolutionary direction dynamically during evolution. Simulation shows that the algorithm can not only keep population diversity but also find accurate solutions.
    Typical applications
    Three-dimension visualization research of flood routing simulation
    HAN Min,CHEN Ming
    2005, 25(08):  1906-1907.  DOI: 10.3724/SP.J.1087.2005.01906
    Asbtract ( )   PDF (200KB) ( )  
    Related Articles | Metrics
    The key of the utilization of flood resource is to know flood occurrence course and movement rule, and flood routing state can be reappeared. According to the research of three-dimension terrain simulation and visualization study of flood routing simulation, flood routing simulation system is established with GIS data, under (VC++) and OpenGL program environment. Flood routing simulation dynamically under given water level is realized, and strong base for the research of flood resources is established.
    Clustering problem based on improved ant colony algorithm and its application in HRM system
    WENG Huai-rong,ZHANG Hong-wei,ZHONG Xiang,CHEN Wei-jing
    2005, 25(08):  1908-1912.  DOI: 10.3724/SP.J.1087.2005.01908
    Asbtract ( )   PDF (267KB) ( )  
    Related Articles | Metrics
     An employee performance evaluation clustering model, which based on Improved Ant Colony Algorithm, was put forward. Improved ant colony algorithm was based on ant colony algorithm and inducted random disturbing and sentience characters. The incretion in each path would be renewed in each searching time. Finally, the path which had the most incretion would be selected as the result. The realization of the model had been successfully used in the Human Resource Management of a dairy-industry company and introduced a new way in employee performance evaluation with the use of Active Server Pages and SQL Server 2000.
    Hybrid intelligent algorithm for parameter calibration
    HU Yin,XIAO Kun,LI De-hua
    2005, 25(08):  1913-1915.  DOI: 10.3724/SP.J.1087.2005.01913
    Asbtract ( )   PDF (145KB) ( )  
    Related Articles | Metrics
    Combined with fast convergence and high accuracy, a hybrid intelligent algorithm was proprosed to solve the parameter calibration of the nonlinear system. The results that computed by the improved least-square algorithm became the the original values of the genetic algorithm where gene range could be dynamically changed. The experiment shows that the hybrid algorithm is valid in practical application.
    Design of a FPGA-based fault-tolerant embedded system
    CHEN Guo-lin,ZHANG Li-sheng
    2005, 25(08):  1916-1918.  DOI: 10.3724/SP.J.1087.2005.01916
    Asbtract ( )   PDF (206KB) ( )  
    Related Articles | Metrics
    Using all kinds of soft IP cores, a complete embedded system was set up in the FPGA. Due to the flexibility of FPGA design, the TMR of the three MicroBlaze soft cpu cores and a voter was implemented on the FPGA. At the same time,the support of software fault tolerance by the way of the EDAC(Error Detection And Correction) and the protection of system stack were added. The experiment results show that the system is equipped with the ability of the tolerance of the effect caused by SEU(Single Event Upset).
    Applying experiment-design and support-vector-machines methods to new medicines preproduction推
    ZHU Juan-juan,ZHANG Shen-sheng,DU Tao
    2005, 25(08):  1919-1922.  DOI: 10.3724/SP.J.1087.2005.01919
    Asbtract ( )   PDF (211KB) ( )  
    Related Articles | Metrics
    In the traditional process of new-medicines’ preproduction, designing experiment schemes and analyzing data was usually manipulated artificially. It was too subjective. Aiming at these situations, a new-medicines’ preproduction system was presented, which was based on experiment-design and support-vector-machines methods. First, experiment-design method was introduced in order to gain scientific and logical experiment schemes. Then, support-vector-machines (SVM) method was adopted to establish regress models for those experimental data, which is an analyzing and modeling tool suiting small sample data. These models were used for predicting the experiments’ results and optimizing the schemes. In addition, an alternant optimizing method based on greedy search was introduced too. Finally, an example was given to validate that the whole set of methods was scientific and effective.
    Design and implementation of high-performance Linux kernel based on HTTP proxy
    LIANG Da-ming,CHEN De-ren,ZHENG Xiao-lin
    2005, 25(08):  1923-1925.  DOI: 10.3724/SP.J.1087.2005.01923
    Asbtract ( )   PDF (151KB) ( )  
    Related Articles | Metrics
    Traditional Linux HTTP Proxies were implemented in Linux user mode through using the network interface provided by the kernel. This disjunctive software architecture, under which the applications and the kernel were separated, seriously harmed the performance of HTTP proxies. In order to solve this problem, a A new approach was presented, in which an HTTP proxy was implemented in systems kernel mode. The design and implementation of the kernel mode HTTP proxy were given in details. According to our experimental results, kernel mode HTTP proxies performed much more effectively than user mode proxies.
    Application and study of massive-scale data paging mechanism in Web information system
    GOU Cheng-tu,ZHANG Jing,LI Jun-huai
    2005, 25(08):  1926-1929.  DOI: 10.3724/SP.J.1087.2005.01926
    Asbtract ( )   PDF (186KB) ( )  
    Related Articles | Metrics
     In Web development, Its difficult to transmit massive-scale data and to query in paging quickly by applying the Data Controls such as DataGrid of Microsoft VS.NET IDE and using the traditional paging-technology. In the development of someone enterprise Web Information system, several paging algorithms based on XML and storage process were proposed. Detailed description of these paging algorithms were given combined with an application instance. The tests manifest that the performance and executing speed are enhanced much in contrast with traditional paging technology.
    Network and distributed techno
    Research and application of an online vritual indoor wandering system based on X3D
    QIU Wei,ZHANG Li-chen
    2005, 25(08):  1930-1932.  DOI: 10.3724/SP.J.1087.2005.01930
    Asbtract ( )   PDF (170KB) ( )  
    Related Articles | Metrics
    New characteristics and applications of X3D-based specifications on the Internet was introduced. The key technologies to construct the online virtual indoor wandering system were demonstrated,and the X3D-based technology virtual indoorwandering system scene modeling and its application was presented. By using X3D technology, an online virtual indoor main scene has been designed, then an online extensible user-interactive platform was put forward accompanied by the ASP technology. It is a platform allows users design virtual indoor wandering system according to their personal choice.
    Typical applications
    Research of a new robot-soccer vision system
    CHEN Jing-hang,YANG Yi-min,CHEN Hao-jie
    2005, 25(08):  1933-1935.  DOI: 10.3724/SP.J.1087.2005.01933
    Asbtract ( )   PDF (170KB) ( )  
    Related Articles | Metrics
    In FIRA MiroSot robot-soccer game,vision system was a unique way throught which the whole system obtained the global information. The speed and precision of the recognition of the vision system directly affected the victory or defeat of the game. According to the disadvantage of the traditional vision system in the robot-soccer game, a new design of robot-soccer vision system was put forward based on multi-resolution analyse and FCM algorithm. Experiment results show that the design can improve the speed and precise of recognition in the game,and has well adaptability.
    Application of simulating technique in routing select of telephone network
    WANG You-quan,MEI Shun-liang
    2005, 25(08):  1936-1938.  DOI: 10.3724/SP.J.1087.2005.01936
    Asbtract ( )   PDF (169KB) ( )  
    Related Articles | Metrics
    Routing strategy has important effect on QoS of telephone network. By use of actual service process model of telephone network, routing select strategy of telephone network was analyzed, and the affect of different routing strategy on network service QoS was also evaluated quantificationally to provide reference for the selection of routing strategy of telephone network.

    Study and implementation of the bulk FLASH memory bootloader based on DM642
    LI Xing-you,YOU Zhi-sheng
    2005, 25(08):  1939-1941.  DOI: 10.3724/SP.J.1087.2005.01939
    Asbtract ( )   PDF (151KB) ( )  
    Related Articles | Metrics
    The TMS320DM642 Digital Media Processor is based on the C64x CPU, a member of the C6000 DSP family. The DM642 integrates a number of peripherals to address the development of video and imaging applications. The development process and implementation methods of the multi-level bootloader for bulk Flash memory bootloading on DM642 Platform was introduced in detail,and a new way to develop top multimedia embedded system based on TMS320DM642 Digital Media Processor was given. It is proved that the way introduced here is practical and has a good prospect.
    Eliminating local and global self-intersections of offsets based on interval arithmetic and quad trees
    WAN Jian,XU Xiao-mei,YE Xiao-hua
    2005, 25(08):  1942-1943.  DOI: 10.3724/SP.J.1087.2005.01942
    Asbtract ( )   PDF (96KB) ( )  
    Related Articles | Metrics
    Eliminating offset self-intersection could improve the ability to handle the detail of parts and the precision to make the parts. All kinds of method used around world and presented approach based on interval arithmetic and quad tree was presented. This method is good for detecting both local and global interactions. At last, gave examples for this method.
    Watermarking algorithm for digital image based on DWT and SVD
    LIU Feng,SUN Lin-junLIU Feng,SUN Lin-jun
    2005, 25(08):  1944-1945.  DOI: 10.3724/SP.J.1087.2005.01944
    Asbtract ( )   PDF (161KB) ( )  
    Related Articles | Metrics
    A watermark algorithm for digital image based on DWT and SVD was proposed.It added gray images as the watermark and increased information capacity of the watermark.The algorithm can satisfy the transparence and robustness of the watermark system. The experiment based on this algorithm demonstrates that the watermark is robust to the common signal processing techniques including JEPG compressing,noise,low pass filter,median filter,contrast enhance.
    Background motion model parameters estimation based on extended Kanade-Lucas tracker
    2005, 25(08):  1946-1947.  DOI: 10.3724/SP.J.1087.2005.01946
    Asbtract ( )   PDF (108KB) ( )  
    Related Articles | Metrics
    Background affine model parameters estimation is a key problems in image registration between frames. Extended Kanade-Lucas tracker and RANSAC algorithm were combined to solve the background affine model parameters. Background features were detected using outlier voting frame. As solving an affine model only need three corresponding points, the algorithm can run in real time and generate reliable results.
    Intelligence perception
    Duplicated fault tolerance system based on active/standby fast-switching
    WU Juan, MA Yong-qiang,LIU Ying
    2005, 25(08):  1948-1951.  DOI: 10.3724/SP.J.1087.2005.01948
    Asbtract ( )   PDF (204KB) ( )  
    Related Articles | Metrics
    To shorten the time-delay of active/standby switching in the fault tolerance system, an active/standby fast-switching system was designed. In this system, the active and the standby used the same IP and MAC address in order to receive the network data simultaneously, however, the standby was prohibited to send any network data, both processes were transparent to upper layers.
    Typical applications
    Real-time synchronization algorithm based on blending of motions in VR
    WANG Yi-yuan,CHEN Fu-min
    2005, 25(08):  1951-1953.  DOI: 10.3724/SP.J.1087.2005.01951
    Asbtract ( )   PDF (100KB) ( )  
    Related Articles | Metrics
     In virtual reality, a fundamental motion library is built by using motion capture system. Then appropriate fundamental motions are selected from the library, and desired motions are synthesized from these fundamental ones. One of these motion editing techniques, motion blending, is the most practical and complex one. A real-time synchronization algorithm was presented based on blending module. The basic idea is to make the data set more flexible and to dynamically blend motions to avoid unexpected ones. As a result, complex virtual animations are created from above.
    A method for ship detection in SAR images based on fuzzy theory
    LI Chang-jun,HU Ying-tian,CHEN Xue-quan
    2005, 25(08):  1954-1956.  DOI: 10.3724/SP.J.1087.2005.01954
    Asbtract ( )   PDF (154KB) ( )  
    Related Articles | Metrics
     Automatic interpretation of synthetic aperture radar (SAR) images was one of the most important application fields in image processing. Focusing on the medium resolution SAR images and combining with the previous algorithms, a novel technique to detecting ship targets from coastal regions based on fuzzy theory was proposed. In this new method, the input image was first processed with improved fuzzy enhancement algorithm so as to alter the characteristics of the gray-level distribution; then, with the threshold method, the sea and land regions could be separated; following that, the maximum entropic algorithm was employed to further process the image and regions of interest which contained candidate ship targets could be extracted; Then ROIs were segmented and the features of ship targets were extracted. Finally the ship targets could be detected based on fuzzy reasoning technique.
    A low shape distortion algorithm for VSnakes
    LI Song,PING Xi-jian
    2005, 25(08):  1957-1958.  DOI: 10.3724/SP.J.1087.2005.01957
    Asbtract ( )   PDF (166KB) ( )  
    Related Articles | Metrics
    A low shape distortion algorithm for VSnakes was presented. Two new energy expressions were defined, one of them spaced the points more evenly on the contour,the other expression strengthened the curvature constraint of the candidate contour, which not only kept its shape similar to the current contour, but also made contour more smooth, thus reduced the shape distortion of contour. In addition, the contour-relaxation process was simplified to reduce the complexity of computation.
    Study of a 3D simulation system for analyzing flying security and accidents
    LU Hui-juan,GAO Bo-yong,ZHOU Guo-yu,SHEN Jun
    2005, 25(08):  1959-1961.  DOI: 10.3724/SP.J.1087.2005.01959
    Asbtract ( )   PDF (183KB) ( )  
    Related Articles | Metrics
    ased on 3ds MAX platform, simulation of the moving process of multiple aircrafts from various perspectives are realized in combination with 3D GIS by reading moving trace data (for example, data from black boxes), then a 3D simulation system for analyzing flying safety and accidents has been developed. This system could expedite the analysis of accidents and improve the accuracy of accident analysis.
    Real-time rendering based training system for fire
    LIU Kun, WANG Guang-sheng
    2005, 25(08):  1962-1964.  DOI: 10.3724/SP.J.1087.2005.01962
    Asbtract ( )   PDF (166KB) ( )  
    Related Articles | Metrics
    Real-time rendering based training system for fire includes three parts: Modeling and displaying for 3-Dimensional architecture map and interaction with users, fire hazards simulation, supervising for life saving and decision-making for succor. This paper presents approaches to the implementation of virtual training system for fire using some algorithms of real-time rendering, AI and PR, combining with hazards model of fire. On second thoughts, we advance a method, which uses virtual reality method, to implement a software system of fire hazard and training. We combine OpenGL with DirectX to realize C-S based virtual training system for fire in Windows.
2024 Vol.44 No.3

Current Issue
Archive
Honorary Editor-in-Chief: ZHANG Jingzhong
Editor-in-Chief: XU Zongben
Associate Editor: SHEN Hengtao XIA Zhaohui
Domestic Post Distribution Code: 62-110
Foreign Distribution Code: M4616
Address:
No. 9, 4th Section of South Renmin Road, Chengdu 610041, China
Tel: 028-85224283-803
  028-85222239-803
Website: www.joca.cn
E-mail: bjb@joca.cn
WeChat
Join CCF