Loading...

Table of Content

    01 January 2007, Volume 27 Issue 1
    Network and communications
    Centroid-based distributed clustering scheme for wireless sensor networks
    JIANG Shao-feng; YANG Ming-hua; SONG Han-tao; WU Zheng-yu; WANG Jie-min
    2007, 27(1):  1-3. 
    Asbtract ( )   PDF (1052KB) ( )  
    Related Articles | Metrics
    Based on LEACH, we proposed a novel clustering algorithm Centroidbased Distributed Clustering Scheme(CDCS) for Wireless Sensor Networks(WSNs). In CDCS, each sensor firstly decided whether it was local tentative clusterheads on its own at any given time with a certain probability popt. The tentative clusterhead computed the centroid of cluster based on information of sensors within cluster; and then dynamically adjusted the structure of cluster, so that the total energy dissipation within the cluster was minimized. Theoretical analysis and simulation results show that CDCS prolong the lifetime of a sensor network by 32%~38% over that of LEACH in different scenes while still maintaining the simplicity of LEACH.
    Effective distributed clustering in wireless sensor networks
    2007, 27(1):  4-6. 
    Asbtract ( )   PDF (572KB) ( )  
    Related Articles | Metrics
    Clustering is a key technology to reduce the energy consumption in sensor networks and prolong the life of the whole networks. An effective distributed clustering was proposed. In this algorithm an initial time was set for each node, and the node whose time expired first became the cluster in the network. Take reasonableness into consideration, time decay was related to the connectivity of a node. Therefore, randomized way was used to avoid the influence of synchronization. At last, the algorithm was verified in emulation and the relationship between communication radius and average number of clusters was analyzed quantitatively.
    Code-based MAC algorithm for sensor networks
    2007, 27(1):  7-9. 
    Asbtract ( )   PDF (601KB) ( )  
    Related Articles | Metrics
    Message Authentication Code (MAC) for data authentication has been widely applied in traditional wired and wireless networks. But MACs generated by the traditional algorithms are usually too long to be used in sensor networks. This paper proposed a new MAC algorithm which fit well the sensor networks. The algorithm is efficiently length-reduced compared with the traditional ones. It uses bitwise operation and shift logical for data substitution, and generates a length-fixed MAC. Extensive analyses and simulations show that the proposed algorithm can efficiently reduce the communication overhead with high security.
    Feed-back clustering algorithm based on coarse data correlation in sensor networks
    2007, 27(1):  10-12. 
    Asbtract ( )   PDF (740KB) ( )  
    Related Articles | Metrics
    Large-scale sensor networks usually adopt hierarchical routing strategy. Aiming at wavelet data compression, a Feed-Back clustering algorithm based on Coarse data Correlation (FBCC) in sensor network was proposed. The clusters whose data have better correlations were formed by employing the coarse correlation among sensing data, then some reconstructed data from Sink were compared with the real data in the corresponding sensors and the optimized clusters were obtained. Theoretic analysis and simulation experiments show the proposed algorithm can make the wavelet data compression in sensor networks more efficient, such as smaller error, higher compression ratio. Moreover, it can prevent the data submergence in wavelet data compression.
    Strategy of constructing minimum energy clusters in wireless sensor networks
    2007, 27(1):  13-14. 
    Asbtract ( )   PDF (565KB) ( )  
    Related Articles | Metrics
    How to prolong the lifetime of Wireless Sensor Networks (WSNs) is one of the biggest challenges in designing and deploying WSNs. Because of the node energy limit, cluster-based techniques can greatly reduce the energy consumption. The whole cluster energy consumption was decided by the communication pattern and topology of cluster. In this paper, we firstly analyzed the model of energy dissipation for transporting data between cluster head and cluster member nodes; secondly proposed a method to establish a minimum energy relay link based on optimal number of hops to minimize communication energy, which may be significant in the design and implementation of WSNs.
    Grid resource reservation algorithm based on periodical double auction
    2007, 27(1):  15-18. 
    Asbtract ( )   PDF (802KB) ( )  
    Related Articles | Metrics
    To approach the problems in the existing auction based grid resource reservation methods, a periodical double auction based grid resource reservation algorithm was presented. According to the requirements of grid resource reservation and the characteristics of auction mechanism, a grid system model was first defined. Then, based on periodical double auction, we designed a resource auction mechanism for grid systems, and presented the grid resource reservation algorithm in detail. The optimal analysis and simulation result show the validity and availability of our algorithm.
    Adaptive semi-blind multiuser detection based on LMS
    2007, 27(1):  19-21. 
    Asbtract ( )   PDF (485KB) ( )  
    Related Articles | Metrics
    A semi-blind detector based on the MOE principle was designed by exploiting the spreading sequences of all known users. The LMS algorithm was combined with the improved Projection Approximation Subspace Tracking with Deflation (PASTd) algorithm to obtain the weight vector adaptively. As a result, the performance of the proposed algorithm is better than that of the LMS blind multiuser detection in terms of output SIR and BER. The computational complexity is reduced to avoid the problem of eigen-decomposition in conventional LMS algorithm. Simulation results demonstrate the effectiveness and superiority of the proposed algorithm.
    Retransmission-aware energy efficient routing protocol based on AODV
    2007, 27(1):  22-24. 
    Asbtract ( )   PDF (763KB) ( )  
    Related Articles | Metrics
    For unreliable ad hoc networks, a new energy efficient routing algorithm based on Ad hoc On Demand Distance Vector (AODV) called Retransmission-aware Energy-efficient AODV protocol (REAODV) was presented. According to the total energy consumption (including the retransmission energy cost), REAODV chose routings. Moreover, dynamic power control realized by cross-layer optimization was used to reduce the energy cost. Extensive simulations were conducted to evaluate the performance of the new routing algorithm compared to the AODV.
    Study on currency intelligence detection and control node of train network
    2007, 27(1):  25-26. 
    Asbtract ( )   PDF (839KB) ( )  
    Related Articles | Metrics
    With regard to the present obstruction and tied-application in the detecting and controlling of train network, the function and performance demands on control-node of train network were analyzed, and the hardware structure was designed by adopting international standard and modularized method. Also its analysis and adapter of application operation and control method using closed-loop feedback strategy was studied. Therefore, the currency, intelligentization of the detection and control on train network were realized. This study can not only save the developing cost and time but also reduce the difficulty of train network. The result verifies the validity of the study.
    Design of conformance testing based on MSTP protocol
    2007, 27(1):  27-29. 
    Asbtract ( )   PDF (741KB) ( )  
    Related Articles | Metrics
    Multiple Spanning Tree Protocol (MSTP) was designed to solve the problem of the slow astringency speed in Spanning Tree Protocol (STP) and no 802.1Q VLAN sharing in Rapid Spanning Tree Protocol (RSTP). This paper introduced the implementation technology of MSTP and discussed the design of the test method and test organization. A test instance and test result were also analyzed.
    Multi-source information exchange in wireless networks with network coding
    Han LIU
    2007, 27(1):  30-34. 
    Asbtract ( )   PDF (1104KB) ( )  
    Related Articles | Metrics
    This paper shows that mutual exchange of independent information between nodes in a wireless network can be efficiently performed by using the network coding technology. Based on this conclusion, this paper provides a method for multi-source information exchange in wireless networks with network coding and analyzes the improvement of the network performance, including a better robustness and a higher throughput, introduced by this method. This paper also proposes a distributed scheme of this new method for the practical application.
    Implementation of Agent-oriented programming platform based on O-O
    zhangjing
    2007, 27(1):  35-37. 
    Asbtract ( )   PDF (597KB) ( )  
    Related Articles | Metrics
    This article discussed the problem that Object Oriented Programming (OOP) cannot simulate human behaviors exactly, and put forward a solution of extending OOP platform to Agent Oriented Programming (AOP) platform. In order to realize the extension of OOP platform to AOP platform, the implementation of Agent, AgentGroup and invoke-intercepted system on which the platform depends were discussed in detail.
    A new effective KeepAlive arithmetic used in embedded application
    2007, 27(1):  38-39. 
    Asbtract ( )   PDF (551KB) ( )  
    Related Articles | Metrics
    KeepAlive strategy is widely used in communications system. One important reason of using the strategy is that the physical link is unreliable. With KeepAlive strategy, many unexpected exceptions can be avoided. A new effective KeepAlive arithmetic was presented in the paper. The performance of the arithmetic was analyzed and computed, being integrated with 3G Base Station System (3G BSS). The result shows it is of high efficiency and practicability.
    Artificial intelligence
    Chaotic time series forecasting based on dynamic recurrent neural networks model
    2007, 27(1):  40-43. 
    Asbtract ( )   PDF (722KB) ( )  
    Related Articles | Metrics
    A Dynamic Recurrent Neural Networks (DRNN) model was presented in this paper to forecast chaotic time series. The input dimension of DRNN was decided by minimal embedding dimension. The training samples were generated by means of the stepping recursive phase points. It can improve precision and stability of prediction to use chaotic characteristic to deal with samples and mapping nonlinear function by DRNN. The DRNN model was applied to simulation of Lorenz system and shot-term forecasting of Shanghai stock index. Compared with the traditional standard BP neural network, this proposed model shows higher precision. Therefore, this research proves the effectiveness of the proposed model in the practical prediction of time series.
    Compound kernel function of support vector machines
    2007, 27(1):  44-46. 
    Asbtract ( )   PDF (633KB) ( )  
    Related Articles | Metrics
    Kernel functions are key part and the hard issue of Support Vector Machines (SVM). Different kernel can produce different SVM. SVM can deal with nonlinear problems in classification and Regression easily by using kernel functions. In the paper, we discussed the relationship between kernel functions and nonlinear mappings and mapped spaces. Then we introduced a rule of constructing kernel function. At last, we proposed a new kernel — compound kernel function. We applied the kernel in SVM and compared the kernel with other kernels in human face recognition experiment. Experimental results certify that the new kernel can achieve better performance than other kernels.
    SVM multi-class classification based on kernel clustering algorithm
    2007, 27(1):  47-49. 
    Asbtract ( )   PDF (600KB) ( )  
    Related Articles | Metrics
    The Method of multi-class classification based on Support Vector Machines (SVM) was researched, and a multi-class classified method based on kernel clustering algorithm was proposed. The original features were mapped to higher dimension applying kernel clustering; each group was classified by a SVM classifier. These binary classifiers were seen as the node of decision tree to construct a decision classifying tree. The algorithm of creating decision tree was given in this paper. The method of controlling overlap by overlap coefficient was proposed and it can overcome accumulating misclassification. Experiments show that with the approach in this paper, the speed and accuracy rate of handwritten Chinese character recognition can satisfy the functional need.
    A calculation method of Lyapunov exponent and its realization
    2007, 27(1):  50-51. 
    Asbtract ( )   PDF (526KB) ( )  
    Related Articles | Metrics
    An algorithm of Lyapunov exponent with different weights of periodic orbits was proposed. Periodic orbits of chaotic sequences were calculated statistically, then the Lyapunov exponents of different orbits were computed, and the mean Lyapunov exponent of chaotic attractor was got according to the weights of different periodic orbits. The effect of initial value on the mean Lyapunov exponent was discussed. The beginning iterative points do not need to abnegate, and the algorithm is applicable to complicated chaotic systems.
    Fuzzy clustering analysis based on genetic algorithm and its application
    2007, 27(1):  52-55. 
    Asbtract ( )   PDF (670KB) ( )  
    Related Articles | Metrics
    To overcome the sensitivity of initialization of the traditional Fuzzy Clustering, a Fuzzy Clustering arithmetic based on Genetic Algorithm (GA) was proposed in this paper. This arithmetic combined the rules of the accomplishment of the Genetic Algorithm and the rules of the traditional Fuzzy Clustering, so it can not only enhance the performance of Clustering Analysis, but also accelerate its constringency. The arithmetic was much more efficient than blindfold searching; in addition, its practicability and replantation were better than special arithmetic for given object. This method has been successfully used in the Human Resource Management (HRM) of a dairy-industry company and introduces a new way for employees' performance evaluation, and it is proved to be universal and effective.
    Distributed multi-sensor fusion for target recognition using weighted D-S evidence theory
    2007, 27(1):  56-57. 
    Asbtract ( )   PDF (569KB) ( )  
    Related Articles | Metrics
    Dempster-Shafer (D-S) evidence theory has been widely used in data fusion systems. A method based on the weighted D-S evidence theory was proposed for target recognition in the distributed multi-sensor system. First, the analysis of the system's formation model showed that the decision credibility of a sensor was jointly determined by two elements, namely the degree of support and the distance between it and the target. As the decision credibility can be presented by the corresponding weight of the weighted D-S evidence theory, it was obtained by a formula based on the two elements. Finally, the encouraging experimental results demonstrate the effectiveness of the method.
    Redundant Haar wavelet transform and time series forecasting based on improved lifting scheme
    2007, 27(1):  58-60. 
    Asbtract ( )   PDF (754KB) ( )  
    Related Articles | Metrics
    In the view of the boundary problem of wavelets analysis method, a redundant Haar wavelet transforms based on Lifting Scheme (Haar_RLWT) is proposed. The wavelet coefficient sequences decomposed by this novel method possesses time-invariant capability and eliminate the data distortion phenomenon around right boundary, which make it feasible that the traditional forecasting models such as Neural Networks combining with wavelets analysis can apply to the time series forecasting task. Further more, the application of Neural Network Ensembles improved the network generalization and enhanced the forecasting performance. Experiments stipulate that the forecasting effect and rousting of the hybrid forecasting model is superior to the traditional forecasting model.
    Study on practical fuzzy control system of traffic signal
    2007, 27(1):  65-67. 
    Asbtract ( )   PDF (584KB) ( )  
    Related Articles | Metrics
    A fuzzy control system structure for an urban junction was proposed. The traffic flow in the next cycle was estimated, and the maximum time of green light was adjusted dynamically. The fuzzy controller was responsible for controlling the length of the green time. A simulation experiment was carried out to measure the capability of above fuzzy controller at Beijing Jinsong East Intersection. The simulation shows that the fuzzy method outperforms the fixed-time method. The strategy can deal with more stochastic and more uncertain traffic flow.
    Database Technology
    Study of shape from shading algorithm based on the radial basis function network
    2007, 27(1):  68-70. 
    Asbtract ( )   PDF (736KB) ( )  
    Related Articles | Metrics
    After analyzing the shortcomings of some methods on smoothness and continuity for Shape From Shading (SFS), a new SFS algorithm based on the radial basis function model was proposed. Firstly it constructed a curved face equation, and then did self-learning by adjusting power gene and center and width of the radial basis function with restriction condition on reflect function, finally gained satisfactory curved face equation. Theoretical analysis and experimental results show that this algorithm improves a lot on veracity of shape recovering and smoothness and continuity of the curved face.
    Study on robot inverse calibration
    2007, 27(1):  71-73. 
    Asbtract ( )   PDF (886KB) ( )  
    Related Articles | Metrics
    An innovative robot calibration approach: inverse robot calibration based on neural network, was proposed in this paper, based on the analysis of traditional calibration approach. This method took the robot actual poses and corresponding joint errors as inputs and outputs of a feed-forward neural network respectively, so as to achieve the real-time joint errors in arbitrary pose through the neural network, and pose accuracy was improved only through correcting the joints angles. This calibration came down all error effects to joint errors and need not resolve the inverse kinematics model, and achieved arbitrary joint errors real-time compensation. Calibration results were compared with those obtained by traditional parametric methodologies. Simulation and experimental results show that this method is more effective compared with the traditional calibration methods, and avoids the complex modeling and parameters identification.
    Fast recovery of real-time database based on fuzzy dependency
    2007, 27(1):  74-76. 
    Asbtract ( )   PDF (574KB) ( )  
    Related Articles | Metrics
    In real-time database, there is a hard real-time request for operations on data. When data is corrupted, the traditional recovery technique (the operation of undo and redo based on log) is far away from satisfying the above request. A data recovery method based on fuzzy dependency was proposed to meet the request in real-time application. This method generated acceptable fuzzy values by making use of the dependency information generated by data mining techniques.
    A prototype selection algorithm based on voting mechanism
    2007, 27(1):  77-79. 
    Asbtract ( )   PDF (667KB) ( )  
    Related Articles | Metrics
    Prototype selection is an important step in data mining and pattern recognition; it is an efficient way to improve the classification accuracy and running efficiency. This paper proposed a new prototype selection algorithm based on voting mechanism, which could see that most of the selected prototypes are distributed among the classification border and are not outliers. And it is in favor of improving the classification accuracy and efficiency of the nearest neighbor classifier. Experiments on the proposed algorithm and some other famous prototype selection algorithms show the prototype selection algorithm based on voting mechanism has some advantages in improving both the classification accuracy and the data reduction rate.
    Applications of sequential learning ahead masking model to T cell epitope prediction
    2007, 27(1):  80-83. 
    Asbtract ( )   PDF (1168KB) ( )  
    Related Articles | Metrics
    The definition, the meaning and the state-of-art of T cell epitope prediction were firstly summarized. And then, the disadvantages of the prevailing T cell epitope prediction model based on the Back-Propagation Neural Networks (BPNN), including difficulties in presetting networks structure, converging and incremental learning, were investigated. In terms of the above-mentioned drawbacks, Sequential Learning Ahead Masking model (SLAM) and its fast incremental learning algorithm were deliberately chosen to predict T cell epitope. Meanwhile, the basic steps of constructing T cell epitope prediction model based on SLAM were advocated. Finally, a case study of predicting the binding capacities to MHC class II molecule encoded by gene HLA-DR4 (B1*0401) was given in detail. The application results show that T cell epitope prediction model based on SLAM has better learning performance and stronger incremental learning capabilities than that based on conventional BPNN.
    New method for deciding the sort of the test sample based on SVM decision tree
    2007, 27(1):  84-85. 
    Asbtract ( )   PDF (381KB) ( )  
    Related Articles | Metrics
    By giving the test sample many decision chances, a new method for deciding the sort of the test sample based on Support Vector Machine (SVM) decision tree was given. The new decision method reduces the degree of error accumulation. Experimental results show that the new decision method based on SVM decision tree yields higher precision than the traditional method.
    An improved structured multisignature scheme of both sequential and broadcasting algorithms
    2007, 27(1):  86-88. 
    Asbtract ( )   PDF (669KB) ( )  
    Related Articles | Metrics
    To improve the original structured multi-signature scheme based on ElGamal system, a new scheme was presented, which was more generalized and can be applied to all kinds of signing structures. The original scheme was analyzed and the insecure cases, such as conspiracy of inner members to cheat or deny, were pointed out. The improved scheme solves these problems by adding a signature-centre and a time-stamp.
    Design of an immune model based on fuzzy pattern recognition
    2007, 27(1):  89-91. 
    Asbtract ( )   PDF (573KB) ( )  
    Related Articles | Metrics
    To investigate the frangibility of the current Intrusion Detection Systems (IDSs),and to deal with the limitation in the tradition immune model based on exact mathematics, a new approach took a closer look at the more powerful way in which network information could be well managed by Fuzzy Pattern Recognition (F_PR).This paper studied natural adaptation and fuzzy phenomena instead of formal logic and conventional idea. According to the part of experimental results, the new scheme has higher detection efficiency.
    On-demand secure routing protocol based on ARAN
    2007, 27(1):  92-94. 
    Asbtract ( )   PDF (644KB) ( )  
    Related Articles | Metrics
    Based on Authenticated Routing for Ad-hoc Networks (ARAN), this paper presented an improved ARAN, abbreviated as Improved Authenticated Routing for Ad-hoc Networks (IARAN). This proposed protocol simplified the route discovery procedure and its packet structure in ARAN. And integrating the characteristics of Ad hoc civil applications, this new protocol made routing search simpler. Compared to ARAN, IARAN has obvious merits on routing performance, computing complexity, memory size flexibility and availability; therefore it can support use of nodes with limited CPU processing capability.
    LDC-mine:Algorithm for mining outlier based Local deviation coefficient
    2007, 27(1):  95-97. 
    Asbtract ( )   PDF (687KB) ( )  
    Related Articles | Metrics
    Outlier detection has always been a hot research field in Knowledge Discovery in Databases (KDD). Finding the rare abnormal behaviors or the outliers can be more interesting than finding the common patterns like credit card fraud, intrusion detection, etc. This paper provided a new Local deviation coefficient (LDC) factor and an algorithm for mining outlier based LDC-mine. The experiment shows that LDC-mine has higher efficiency of detecting outliers.
    Information security
    New research on DDoS/DRDoS attacks IP traceback based on HMAC
    2007, 27(1):  98-101. 
    Asbtract ( )   PDF (857KB) ( )  
    Related Articles | Metrics
    Based on the Keyed-Hashing for Message Authentication (HMAC) with Key Collection Exposure, Dynamic Probabilistic Packet Marking and modern algebraic theoretics, a new Authenticated IP Traceback Scheme against DRDoS/DDoS was proposed. The results show that the scheme can achieve greater astringency and higher efficiency by adopting a new dynamic probability value sequence, and prevent the marking information from being tampered by using HMAC for authentication, thus this scheme is secure and robust.
    Study on enhancing the capability of secure access in VPN system based on distributed security Agent
    2007, 27(1):  102-104. 
    Asbtract ( )   PDF (590KB) ( )  
    Related Articles | Metrics
    This paper discussed the capability limitation of bursting security remote access in traditional Virtual Private Network (VPN) system, and proposed a solution based on distributed security Agent which can enhance the bursting access capability in a VPN system. After describing the theory and the Sec-Agent modular of the solution, we demonstrated the application significance of the solution through comparison test.
    Research of hierarchy version control method aiming at time variance dimension
    2007, 27(1):  105-107. 
    Asbtract ( )   PDF (645KB) ( )  
    Related Articles | Metrics
    Common dimension version control method can solve the time variance problem caused by dimension record insertion, deletion and updating, but it cannot solve the time variance problem caused by the change, mergence, split and move of dimension record key. This paper introduced a hierarchy version control method based on common version control method, which can solve the latter time variance problem.
    Mining positively correlated frequent itemsets
    2007, 27(1):  108-110. 
    Asbtract ( )   PDF (748KB) ( )  
    Related Articles | Metrics
    Some uninteresting rules can be avoided by using the lift to judge the positive correlation between the antecedent and the consequent of an association rule, while generating association rules from frequent itemsets. However, neither can it ensure items in the antecedent or the consequent of a rule are positively correlated; nor can it reduce the time of mining frequent itemsets. An association rule is still uninteresting if there are negatively correlated items in its antecedent or consequent. So, this paper, based on mathematical expectation, brought up the concept of the positively correlated frequent itemsets, and improved the algorithm of mining frequent itemsets directly in FP-tree to mine positively correlated frequent itemsets. In this way, a solution to the above mentioned problems was got. Experiments show that this algorithm can decrease the number of generated frequent itemsets largely, and reduce the time consumption of mining frequent itemsets evidently. This algorithm has an excellent performance in big database, especially in dense database mining.
    Reputation system for wireless sensor networks based on β distribution
    2007, 27(1):  111-113. 
    Asbtract ( )   PDF (741KB) ( )  
    Related Articles | Metrics
    There are unique characteristics in wireless sensor networks. Security based on cryptography and authentication alone is not sufficient, because cryptography cannot prevent malicious or non-malicious attacks from internal adversaries or faulty nodes. Tools from different domains such as economics, statistics and data analysis were combined with cryptography for the development of trustworthy wireless sensor networks. A reputation model was proposed for wireless sensor networks, and the basic principle was that nodes maintain reputation for other nodes and such reputation can be used to evaluate their credibilities. A system was developed within this model employing a Bayesian formulation, specifically a β reputation system, for reputation representation, update and integration in wireless sensor networks.
    Research on attribute-based authorization and access control
    2007, 27(1):  114-117. 
    Asbtract ( )   PDF (1079KB) ( )  
    Related Articles | Metrics
    The open environment poses the unique security challenges to access control mechanism due to its distributivity, inherent heterogeneity and highly dynamic nature. Attribute-Based Access Control (ABAC) approach can provide flexibility, scalability and fine-grained access control to identity-based access control methods. Its appropriateness for this environment has been proven. In this paper, attribute-based access control mechanism, implementation architecture, and attributes management were discussed. By comparing and analyzing the key technologies, future research issues were suggested.
    Image encryption algorithm based on m-sequence integer modulation and image scrambling
    2007, 27(1):  118-121. 
    Asbtract ( )   PDF (1190KB) ( )  
    Related Articles | Metrics
    After analyzing the m-sequence generating principle, a new image position scrambling method named m-sequence transform and a new image value of pixels substitution method named m-sequence integer modulation were presented respectively. Encrypted effect of m-sequence transform was also studied. And based on those, a practical image encryption algorithm was put forward according to the characteristics of chaotic images. Then key spaces and security of the proposed algorithm were analyzed. Finally, the experimental results using this algorithm were shown in this paper.
    Research and implementation of information security virtual experiment system based on Web Service
    2007, 27(1):  122-124. 
    Asbtract ( )   PDF (788KB) ( )  
    Related Articles | Metrics
    Considering the requirement of information security experiment in local and the distance education, the information security virtual experiment platform based on the Web Service has been developed. Multi-virtual machines have been installed in a host computer and a network for the attack and defense simulation has been designed. The students may watch and analyze attack process using the protocol analysis software developed by us. The students may visit the on-line experimental system through Internet, and prepare an experiment through the CAI system and the on-line self-test system. The teachers may edit experiment project using the on-line experiment creating system. The private UDDI registration center has been established. The Web Service registration and the dynamic inquiry and the dynamic call on UDDI have been realized. The design can enhance the quality of service in the experiment system.
    Design and implementation of an attribute authority system
    2007, 27(1):  125-127. 
    Asbtract ( )   PDF (577KB) ( )  
    Related Articles | Metrics
    This paper has described the design and implementation of an Attribute Authority system, which is composed of "AB AA system", "AB ARA system" and "AB directory system". The Attribute Authority system is responsible for signing and issuing a tribute certificates, and other management functionalities.
    Intrusion detection method based on clonal network clustering
    2007, 27(1):  128-131. 
    Asbtract ( )   PDF (1080KB) ( )  
    Related Articles | Metrics
    Reasonable clustering analysis of data done by clonal network can be obtained when the strategy of immunity cloning is applied to network clustering. By expressing the magnanimity datum with a small-scale network, clonal network structure was adopted in training the intrusion detection so as to get the compressed data. What's more, the Minimal Spanning Tree in the term of Graph Theory was employed to perform clustering analysis on network structure and achieve the characterization of normal and abnormal data finally. This clustering algorithm can deal with network intrusion detection from mass unlabeled data, distinguish between normal and abnormal data and detect unknown attacks. The computer simulations on the KDD CUP99 dataset show that this algorithm can achieve higher detection rate of known or unknown attacks and lower false positive rate when compared with the previous algorithms.
    New semi-fragile watermarking for JPEG image authentication
    2007, 27(1):  132-134. 
    Asbtract ( )   PDF (736KB) ( )  
    Related Articles | Metrics
    This paper presented a watermarking scheme for JPEG image authentication. The watermark was generated based on the relative sign and magnitudes of Discrete Cosine Transform (DCT) coefficients which were invariant due to an important property of JPEG compression. Combined with an effective method to include all the coefficients either explicit or implicit, the proposed algorithm improved its security level against malicious attacks in transform domain, without embedding more watermarking information in the original image. At the same time, an identification of false tampered blocks in the proposed authentication algorithm improved the accuracy of locating tampered areas. Analysis and experimental results are provided to demonstrate that the watermarked image possesses good perceptual transparence, and that the proposed algorithm takes JPEG compression as an acceptable manipulation. Meanwhile, it is sensitive to other malicious attacks and can locate the tampered areas.
    Performance enhancement of DS/SS system using chaotic spreading sequence
    2007, 27(1):  135-138. 
    Asbtract ( )   PDF (848KB) ( )  
    Related Articles | Metrics
    In this paper, a chaotic sequence generator based on Logistic map and interleaver was proposed and used to generate spreading sequence. The generated chaotic sequence is balanced itself and has excellent correlation property and sidelobe property. When the sequence is applied to Direct Sequence/Spread Spectrum (DS/SS) system, Multiple Access Interference (MAI) can be mitigated by using the spreading sequences. The system capability and performance can be enhanced, and the information can be effectively encrypted. The Bit-Error Rate (BER) performance of spreading sequence from the proposed chaotic sequence generator was compared with that of the conventional m-sequence and Gold sequence. Results show that the new sequence has a noticeable improvement in BER performance in low Signal-to-Noise Ratio (SNR).
    Graphics and image processing
    Statistical three-class user authentication approach based on user's keystroke patterns
    2007, 27(1):  139-142. 
    Asbtract ( )   PDF (846KB) ( )  
    Related Articles | Metrics
    In order to overcome the deficiency of low veracity of the current user authentication approach based on statistics, a new user authentication approach based on keystroke sequences was proposed. The proposed approach classified the current registered users into three groups: intrusive, suspicious and normal according to the dispersion between the user's keystroke pattern and the standard model determined by training samples and then utilized a re-recognition process to identify the user belonging to the suspicious group. The parameter k related to the security and friendliness level was introduced, which can be dynamically determined by supervisors of hosts. The performance of the proposed approach was evaluated by experiments and theoretical analyses. The results show the superiority of the proposed approach in terms of the False Rejection Rate (FRR) and False Acceptance Rate (FAR) in comparison with current Bayesian method, and the FRR and FAR of the proposed approach is only 1.6% and 1.5% respectively.
    A Fast Auto-focusing Algorithm of Two-Layer Objects in Microscopy
    2007, 27(1):  143-145. 
    Asbtract ( )   PDF (1017KB) ( )  
    Related Articles | Metrics
    Aiming at the problem of large-scale microscopy images acquisition of two-layer object, an auto-focusing algorithm was proposed based on image edge and adjacent area forecasting. Using the edge area as focusing window and linear forecasting method, the system can acquire clear image of upper object with little interfererence of the background. The experimental results demonstrate that the proposed algorithm is superior in focusing speed, precision and capability of resisting background interference.
    Surface modeling based on 4-point subdivision scheme with two parameters
    2007, 27(1):  146-148. 
    Asbtract ( )   PDF (530KB) ( )  
    Related Articles | Metrics
    This paper expanded 4-point subdivision scheme with two parameters for curve design, presented the 4-point subdivision surface scheme with two parameters and analyzed the convergence of the scheme. The scheme can control limit surface shape through properly adjusting the two parameters. The limit surface may attain to C4 continuity. The scheme can be applied to the surface modeling which demands much higher continuity. On the condition of the given initial data, we can adjust and control the limit surface shape through selecting appropriate parameters. The method is effective in generating smooth surfaces.
    Automatic medical image segmentation based on gradient vector flow
    2007, 27(1):  149-151. 
    Asbtract ( )   PDF (937KB) ( )  
    Related Articles | Metrics
    Image segmentation is an important issue in medical imaging. In this paper, a fully automatic algorithm based on Gradient Vector Flow (GVF) was proposed. Firstly a scalar field was constructed from the GVF field. The scalar field can greatly simplify the selection of seeds and region growing process. Then a Region Adjacency Graph (RAG) based region merging algorithm was applied to get the final result from the initial segmentation. Several experimental results demonstrate that this method is efficient in multiple objects segmentation of medical images.
    Study on algorithm for skeleton features extraction of hand vein image
    2007, 27(1):  152-154. 
    Asbtract ( )   PDF (927KB) ( )  
    Related Articles | Metrics
    Biometric identification technology based on hand vein subcutaneous network structure appears as a promising technique for personal recognition. The contrast of hand vein image is enhanced by using Wiener filter, normalized mode, gray level stretching, sharpening and so on. After binary image was obtained, four-domain region growing algorithm was presented to differentiate and get rid of the noise areas. The quick thinning algorithm was adopted, which had many advantages such as complete thinning, fast speed, maintenance of minutiae, and so on. After hand vein image skeleton was analyzed, the method for extracting the crossing points was proposed to solve the problems met in the feature extraction. The burr, other kind of noise, was introduced by thinning algorithm. On the basis of the burr of the hand vein image, an algorithm for deburring was presented. The experiments show that the new algorithm could make the skeleton express geometric structure of the hand vein image.
    Shot boundary detection method based on SVD
    2007, 27(1):  155-156. 
    Asbtract ( )   PDF (711KB) ( )  
    Related Articles | Metrics
    The fundamental methods for shot boundary detection were briefly introduced at the beginning, and then a new method based on Singular Value Decomposition (SVD) was proposed. First, construct the video feature matrix and get the eigenvalue matrix through the transform of SVD. Second, map the eigenvalue matrix into vector space. Finally, detect the shot change by the angle of vectors. Experimental results demonstrate the method is superior to the frame-difference based double threshold shot boundary detection.
    Texture image segmentation based on Gabor wavelet using geodesic active contour model
    2007, 27(1):  157-159. 
    Asbtract ( )   PDF (655KB) ( )  
    Related Articles | Metrics
    A new method for texture image segmentation was proposed, and it had two advantages compared to Geodesic models. First, due to using Gabor wavelet to extract texture features, texture image can be segmented properly. Second, without re-initialization, the proposed method can avoid the additional computation problems due to the re-initialization of signal distance function. The segmentation tests for synthetic and natural texture images prove the proposed segmentation method is more accurate and faster compared to geodesic active contour models.
    Study on edge detection of multi-spectrum remote sensing image based on cloud
    2007, 27(1):  160-162. 
    Asbtract ( )   PDF (988KB) ( )  
    Related Articles | Metrics
    A new edge detection algorithm of multi-spectrum remote sensing image was proposed. First, growing image regions by vector angle similarity law and spatial-contextual information. Second, constructing multi-dimension cloud model based on bands, mapping the image objects to multiple cloud space, constructing boundary-clouds by Boolean calculation between two or more clouds and synthesizing multi-dimension vectors. Third, constructing fuzzy property facet and getting the optimal threshold through maximizing the entropy of fuzzy partition based on conditional probabilities and entropy of fuzzy partition. At last, we can get the edge of multi-spectrum image by fuzzy property facet and optimal threshold. Experiments testify that the algorithm could effectively detect edge of multi-spectrum remote sensing image.
    Infrared image segmentation based on fast Level Set method
    2007, 27(1):  163-165. 
    Asbtract ( )   PDF (732KB) ( )  
    Related Articles | Metrics
    To deal with the poor precision of the traditional infrared image segmentation and the poor real time application of the Level Set method that is only based on boundary information or area information, a new Level Set method, based on boundary information and area information simultaneity, for infrared image segmentation was proposed. The boundary information and area information were combined excellently by using adaptive coefficient T1 and T2,and at the same time, the precision of image segmentation was guaranteed and the time-consumption was also reduced. The simulation results and comparison with other methods show that this method can segment the infrared image not only accurately but also practically.
    Research of dynamic load-balancing algorithm for parallel graphics rendering
    2007, 27(1):  166-168. 
    Asbtract ( )   PDF (613KB) ( )  
    Related Articles | Metrics
    Load balancing is very important to the efficiency of parallel rendering. This paper brought forward a model of two phase mapping of dynamic load-balancing algorithm, and gave a method for measuring its performance. It gave one of the best assignment algorithms of multi-task, analyzed the performance of this algorithm, and acquired a result of an upper limited time of parallel rendering in theoretically. Some partitioning strategies of multitask were also given.
    Method for fingerprint image binarization using difference
    2007, 27(1):  169-171. 
    Asbtract ( )   PDF (737KB) ( )  
    Related Articles | Metrics
    Binarization is one important step in automatic digital fingerprint identification. Selection of threshold will greatly influence the effect of binarization, as well as the number of valid features. In this paper, we proposed a new phase remove smoothing and difference method for fingerprint image binarization, which moves the threshold of background and foreground toward 0 point. Experiments show that this method can reduce the sensitivity of threshold selection, and at the same time can keep the valid fingerprint features after binarization.
    Improved fingerprint feature extraction algorithm based on ARM
    2007, 27(1):  172-173. 
    Asbtract ( )   PDF (705KB) ( )  
    Related Articles | Metrics
    Real-time has always been the main criterion for embedded fingerprint identification system developing. How to process the fingerprint image fast and accurately is the key to fingerprint identification system. An improved fingerprint feature extraction algorithm based on ARM was presented, and this algorithm had been proved to be fast and accurate.
    Research on restoration of radial blurred image degraded by the motion in opposite direction
    2007, 27(1):  174-176. 
    Asbtract ( )   PDF (988KB) ( )  
    Related Articles | Metrics
    When the camera and the object go in opposite directions quickly, the image acquired looks like radial blurring from the center to the periphery, which influence the ability to recognize or track the object. Firstly, the paper set up an ideal relative motion-blurred model and analyzed the process of the acquiring image to find its special features and the main factors that have important influence on the radial blurred image. And then, the paper presented a method to simulate the radial blurred images, which were consistent with the actual images. Furthermore, the paper deduced the formula for restoring the radial blurred images. In the end, the formula is proved to be true through restoring a radial blurred image successfully.
    Endoscope show and measure of industrial computer tomography based on improved Snake model
    2007, 27(1):  177-179. 
    Asbtract ( )   PDF (795KB) ( )  
    Related Articles | Metrics
    Because the Industrial Computed Tomography(ICT) images have complex object edge, in this paper, the updated active contour model based on greedy algorithm was used in image segment. And, the endoscope show and measure of the 3D object in industrial computer tomography were realized. The experimental results confirmed that the algorithm was effective.
    Articles
    Study on the retrieve and re-use method of business process performance model repository
    2007, 27(1):  180-182. 
    Asbtract ( )   PDF (831KB) ( )  
    Related Articles | Metrics
    In this paper, the influences of enterprise strategy and external environment on business process performance model were discussed firstly, which lead to a classification standard and search method of related performance models. Then, a business process performance model repository was developed for the reuse of accumulated performance models and finally a case study was performed.
    Extension and verification of Petri-net models
    2007, 27(1):  183-185. 
    Asbtract ( )   PDF (501KB) ( )  
    Related Articles | Metrics
    Petri-net is a precise mathematic model which is suitable to describe concurrency, synchronism and non-determinism, and it has been widely used in the design of software/hardware systems. In this paper, we extended the basic simple Petri-net, advanced MCPN(Petri-net for model checking) which is more suitable for model checking, and transformed MCPN models into PROMELA — the input language of model checker SPIN. Then we can use the SPIN tools to do the model checking work in order to enhance the reliability of system design. We considered simultaneous firing of sets of transitions (Transitions in the set have no conflict with each other). Also we developed a method to handle the fairness problem effectively. Finally our approach is exemplified by a case study.
    Study of cadastral data loading based on MapObjects and ArcSDE C-API
    2007, 27(1):  186-188. 
    Asbtract ( )   PDF (560KB) ( )  
    Related Articles | Metrics
    To solve the problems in the process of developing the Cadastral Information Management System of Zhejiang Province, we proposed a new method of data loading of AutoCAD DWG, and developed a component based on MapObjects and ArcSDE C-API. Applications show that the component indicates the feasibility of setting conditions of data loading according to users' requirements.
    Design and implement of registering component by user in virtual laboratory
    2007, 27(1):  189-192. 
    Asbtract ( )   PDF (951KB) ( )  
    Related Articles | Metrics
    In order to resolve the problem of great workload resulted from developing and updating the experiment component in virtual laboratory based on component, a scheme of expanding the laboratory function was designed and implemented by taking the advantage of users' participation. The main techniques applied in this scheme are as the following: Applet signing technique, Java RMI technique, compiling a Java file in runtime, Java reflection and the technique of updating the XML file in JAXP. As a result, it is completed that the function of adding a new component by user and releasing it in Internet after it had been registered in the system, and it is possible that the virtual laboratory is easily expanded and participated.
    Hierarchical UI design approach supporting multi-device interaction
    2007, 27(1):  193-195. 
    Asbtract ( )   PDF (686KB) ( )  
    Related Articles | Metrics
    Focusing on the characteristics of multi-device user interfaces, a User Interface (UI) design approach supporting automated code generation was proposed. The hierarchical model for user interface model was built, and it took human-machine interaction as the core. It can support automatic code generation on different target platforms and provide an effective support to model driven software development.
    Study on temporal extending for business rules and constraints in information systems
    ZhaoJun Yang
    2007, 27(1):  196-198. 
    Asbtract ( )   PDF (606KB) ( )  
    Related Articles | Metrics
    Based on Object Constraint Language (OCL) and Event Condition Action (ECA), a temporal extending method was proposed for enterprise business rules and constraints, which used temporal operators and time intervals to refer to history information of temporal objects and temporal properties. The relationship between business objects and ECA rules was also analyzed.
    Multi-layer matching method on semantic Web services
    2007, 27(1):  199-201. 
    Asbtract ( )   PDF (744KB) ( )  
    Related Articles | Metrics
    Most existing semantic Web service discovery methods adopt match degree to select desired services, which are coarse in granularity, and neglect the match of Quality of Service (QoS). This study expanded Ontology Web Language for Services (OWL-S) language at first to increase the description of QoS, then proposed five layer three stage of matching process, and adopt semantic similarity to match. The discovery method can guarantee the precision and recall in matchmaking.
    Typical applications
    A new representation for the solution of resource constrained project scheduling
    2007, 27(1):  202-204. 
    Asbtract ( )   PDF (634KB) ( )  
    Related Articles | Metrics
    How to represent a solution of a resource constrained project scheduling is an import problem for the metaheuristic method. Only after understanding the relation between solution representation and objective function adequately, a good solution can be reached within fewer search steps. After analyzing the solution space in detail, a new solution representation based on the extra relation was provided as well as the theoretical basis of this representation. How to make use of the method to create a neighborhood was also introduced.
    Clustering-based feature selection in text categorization
    2007, 27(1):  205-206. 
    Asbtract ( )   PDF (575KB) ( )  
    Related Articles | Metrics
    Traditional text feature selection methods have a common characteristic that they evaluate features with some evaluation function individually. Because they do not consider the relationship among features, the selected feature subsets are redundant sometimes. This paper introduced a new feature selection method, which first used clustering to reduce redundancy among features and then used Information Gain to choose good features. The experimental results show that the new approach significantly improves classification accuracy.
    Query expansion based on local classification analysis
    2007, 27(1):  207-209. 
    Asbtract ( )   PDF (608KB) ( )  
    Related Articles | Metrics
    To solve the problem that local analysis for query expansion gets low precision in information retrieval, a new method was proposed. It analyzed the top-ranked documents retrieved for an original query, and inferred the possible classifications related to the query, then utilized co-occurrence with the query terms in the related classifications to expand the query. Experimental results indicate that the new method costs less retrieval time and gets higher precision compared with traditional methods such as global analysis and local analysis.
    Application of searching method for potential partners in agile manufacturing
    2007, 27(1):  210-212. 
    Asbtract ( )   PDF (579KB) ( )  
    Related Articles | Metrics
    In order to find the potential cooperative enterprises for agile manufacturing, a searching method for potential partners based on enterprises's capability matching and carrying capacity of machining task was proposed. Firstly, feature-based models for machining task and enterprise capability were made. The enterprises of matching for machining task features were searched from platform of network manufacturing. Then, the enterprises' carrying capacity of the machining task were calculated, and the enterprises, which had greater carrying capacity of the machining task were selected to form potential partners of the machining task. It was proved in the application that the method is of a sound effectiveness.
    Efficient data organization for large scale parallel numerical simulation
    2007, 27(1):  213-215. 
    Asbtract ( )   PDF (684KB) ( )  
    Related Articles | Metrics
    A new efficient data organization method was introduced in this paper which was based on a dataset I/O module developed for resolving the storing overhead problem of scientific simulation. The module exported Visualization Toolkit(VTK) XML data files for the simulation that supports random access, and portable data compression. The storing overhead was reduced significantly as well as the visualization speed was improved remarkably. The experimental results show that the data storage cost is reduced 70 percent and time consumption of loading data into the visualization system is reduced by nearly 90 percent. Another superiority of the data organization method is that out-of-core technology can be introduced into the visualization naturally to improve the data processing efficiency.
    Hybrid genetic algorithm based on external point method for constrained optimization
    2007, 27(1):  216-218. 
    Asbtract ( )   PDF (467KB) ( )  
    Related Articles | Metrics
    A new hybrid genetic algorithm was presented to handle constrained optimization. The traditional technique of a penalty term being added to the fitness function was not used, but the external point method was taken to keep those infeasible solutions created during the process of population initiation, crossover and mutation in the feasible region, and a new real-code genetic algorithm was proposed. The new approach was compared against other evolutionary optimization techniques in several benchmark functions. The results obtained show the hybrid genetic algorithm is a general, effective and robust method. Its performance outperforms some other techniques. The new method has paid attention to both the advantages of external point method and genetic algorithms. It not only has a rather high convergence speed, but also can locate the global optimum with a rather large probability.
    Formalizing multiple instance workflow patterns based on the π-calculus
    2007, 27(1):  219-220. 
    Asbtract ( )   PDF (570KB) ( )  
    Related Articles | Metrics
    Multiple instance workflow patterns are important workflow patterns. The π-calculus is a kind of mobile process algebra which can be used to model concurrent and dynamic systems. Having done the research of the π-calculus, the π-calculus was proposed as a formal foundation for workflow, furthermore multiple instance workflow patterns were described by using the π-calculus in detail.
    Research on junk SMS filtering system on mobile environment
    2007, 27(1):  221-224. 
    Asbtract ( )   PDF (890KB) ( )  
    Related Articles | Metrics
    This paper introduced a distributed Short Message Service (SMS) filtering system which was applicable on mobile network. This system has self-learning and knowledge updating capability and it can find junk SMS sender with a proper high credibility. The main algorithm used in this system is the Nave Bayesian classification algorithm. Some attributes such as the length of the SMS and rules found by statistics are added to attribute set, and experiments show that it results in a better performance than the traditional word based Bayesian approach. This paper also provided an approach to rank the suspicious SMS senders on their probabilities to be real junk SMS senders according to some measures.
    Study on the integration of SPC/EPC and its key technologies
    2007, 27(1):  228-230. 
    Asbtract ( )   PDF (610KB) ( )  
    Related Articles | Metrics
    Based on the analysis of the difference and coherence between Statistical Process Control (SPC) and Engineering Process Control (EPC), the integration model of SPC and EPC was set up. After analyzing the operation of the integration mode and studying the key technologies of combined control chart, process adjustment method based on Markov chain Monte Carlo (MCMC) approach, fuzzy quality diagnosis, starting and stopping rule of EPC, and the feasibleness of the integration mode were confirmed.
    Transcoding Scheme for MPEG-2 to H.264
    2007, 27(1):  231-233. 
    Asbtract ( )   PDF (606KB) ( )  
    Related Articles | Metrics
    A transcoding scheme for MPEG-2 to H.264 was provided. This scheme was composed of two parts: intra prediction and inter prediction. For the intra prediction part, 8×8 block DCT-HT transform-domain converse was used, and then intra mode decision was done in HT domain to obtain the optimum mode, so that good intra prediction was acquired. For the inter prediction part, Motion Vector (MV) got from Variable Length Decoding (VLD) in MPEG-2 stream was reused as Prediction Motion Vector (PMV) of H.264, then motion prediction mode and search region were reset, so that better prediction result was acquired. Experimental results show that this scheme is feasible.
    Localization of moving object in color video based on ASM
    2007, 27(1):  234-236. 
    Asbtract ( )   PDF (667KB) ( )  
    Related Articles | Metrics
    Active Shape Model (ASM) is a method for object localization based on statistic model. On the basis of the existing research of object tracking, this paper presented a method for localizing the moving object in color video based on ASM.This method made the best use of different color information in color video. To improve the generalization, it extended one-dimension search space to two-dimension neighborhood search space so that it performs very well when being applied to object localization. The experimental results show that the proposed method acquires much better precision and robustness than the conventional one.
    Motion object detection using wavelet transform and texture feature
    2007, 27(1):  237-239. 
    Asbtract ( )   PDF (686KB) ( )  
    Related Articles | Metrics
    Motion object detection is an important issue in the applications of computer vision. A new method to detect motion objects was presented, by comparing the texture diversity between the foreground image and the background image. The texture feature of an image block can be attained from its wavelet domain in different frequency. To adapt itself to the changing environment, an improved method to maintain the background was introduced. The experimental results show that the algorithm is fast and reliable, which meets the requirements of real-time motion object.
    Dual watermarking algorithm for copyright protection of digital images
    2007, 27(1):  240-241. 
    Asbtract ( )   PDF (730KB) ( )  
    Related Articles | Metrics
    A dual watermarking algorithm that accepted JPEG compression was presented. The original image was first segmented into blocks based on the texture property, and different embedding intensities were used to embed the watermarking into the Discrete Cosine Transform (DCT) domain of the original image to indicate ownership of the image. And then the invisible watermarking was embedded into the high frequence part to verify ownership of the image. The experiment shows that the proposed dual watermarking system can indicate and verify the ownership.
    Design and implementation of a mechanism to recover from failed network processes
    2007, 27(1):  242-245. 
    Asbtract ( )   PDF (1245KB) ( )  
    Related Articles | Metrics
    Based on the commercial PC/Linux platform, a new method combining rollback fault recovery technique with checkpointing technique was put forward and validated to resume failed server network processes when working in C/S model. The method was able to guarantee the consistency and persistency of connections of network communication, i.e., to guarantee that there are no stops and no stalls with network communications. The method can be used in permanent fault recovery, cluster system, load balancing field, etc.
    Colorized linear CCD image acquisition system for core image acquisition
    2007, 27(1):  246-248. 
    Asbtract ( )   PDF (636KB) ( )  
    Related Articles | Metrics
    According to the need of saving core resources in digital forms, a colorized linear CCD image acquisition system for core image scanner was designed and implemented. The design of the software and hardware was described in detail. Practical applications show that the shortcomings of low resolution and high cost in existing systems are overcome, which provides a reliable basis for consequent core image analysis.
    Research of anisotropic diffusion based image smooth and its application in 3D-reconstruction
    2007, 27(1):  249-251. 
    Asbtract ( )   PDF (765KB) ( )  
    Related Articles | Metrics
    This paper studied the way to remove the speckle noise in medical images by using anisotropic diffusion method. Based on anisotropic diffusion, a partial differential equation, of which the initial data was the input images, was transformed into differential forms and solved with iterations. Anisotropic diffusion can remove the speckle noise efficiently and preserve edges and local detail at the same time. The processed slices image would be further grouped by clustering and be reconstructed efficiently.
    Design and realization of a model on computer performance monitoring
    2007, 27(1):  252-253. 
    Asbtract ( )   PDF (985KB) ( )  
    Related Articles | Metrics
    Basing on Windows Management Instrumentation (WMI) and Middleware technology, a model of performance monitoring in multiple operating system environment has been given, for the defects which exist in some computer performance monitoring platforms. The practice in financial business proved that, by this model, the IT resources can be effectively managed and maintained. The platform constructed on this model can report many breakdown omens promptly, and has the automatic maintenance ability. In conclusion, this model is of universal significance.
    Design of USB interface for data recorder based on ARM
    2007, 27(1):  254-256. 
    Asbtract ( )   PDF (613KB) ( )  
    Related Articles | Metrics
    A kind of design and application for a 128MB memory data recorder based on LPC2214 of Philips was introduced, which could record the exchange data between the industrial control equipments and help the engineers to analyze the working state of the industrial control system. Practical application indicates the feasibility of this design scheme. Compared with the traditional data recorder, its 128MB memory make the recording time through RS-422 increase greatly. Instead of serial port, using USB interface can decrease the transmission time evidently.
2025 Vol.45 No.6

Current Issue
Archive
Honorary Editor-in-Chief: ZHANG Jingzhong
Editor-in-Chief: XU Zongben
Associate Editor: SHEN Hengtao XIA Zhaohui
Domestic Post Distribution Code: 62-110
Foreign Distribution Code: M4616
Address:
No. 9, 4th Section of South Renmin Road, Chengdu 610041, China
Tel: 028-85224283-803
  028-85222239-803
Website: www.joca.cn
E-mail: bjb@joca.cn
WeChat
Join CCF