Loading...
Toggle navigation
Home
About
About Journal
Historical Evolution
Indexed In
Awards
Reference Index
Editorial Board
Journal Online
Archive
Project Articles
Most Download Articles
Most Read Articles
Instruction
Contribution Column
Author Guidelines
Template
FAQ
Copyright Agreement
Expenses
Academic Integrity
Contact
Contact Us
Location Map
Subscription
Advertisement
中文
Table of Content
01 October 2005, Volume 25 Issue 10
Previous Issue
Next Issue
Network and distributed techno
Research on man-machine interaction of handheld mobile computing
CHEN Wen-guang,DONG Shi-hai,YUE Wei-ning,TAN Ji-zhi,WANG Heng
2005, 25(10): 2219-2223.
Asbtract
(
)
PDF
(1169KB) (
)
Related Articles
|
Metrics
Based on our research projects supported by the National Natural Science Foundation of China,some research results were described,including the model of multimodal interaction based on context awareness,Chinese characters multimodal inputted for the handheld mobile devices,and the principles of improving web interaction on the small screen terminals.An intelligent guide system TGH to test our above frameworks and methods was implemented.At the end of this paper,some conclusions about the research on man-machine interaction of handheld mobile computing were given.
Features and situation of man-machine interaction for the blind
ZHAO Yu,MAO Yu-hang
2005, 25(10): 2224-2225.
Asbtract
(
)
PDF
(679KB) (
)
Related Articles
|
Metrics
The features and situation of man-machine interaction for the blind were described,the development of main technologies was introduced.The software and hardware developed by the researchers in Tsinghua University and the overall scheme of man-machine interaction for the blind were introduced.
Thinking on man-machine interaction and man-machine harmonious environment
LIU Ke-jun
2005, 25(10): 2226-2227.
Asbtract
(
)
PDF
(329KB) (
)
Related Articles
|
Metrics
The development process of man-machine interface,man-machine interaction and man-machine harmonious environment were introduced.Their main contents were discussed.The development direction of man-machine interaction and the construction emphasis of man-machine harmonious environment in our country were indicated.
Build the man-machine interaction environment based on RS-232 protocol for the transplant of a embedded OS
HAN Xu,LIU Ke-jun,WANG Chen-hui,LIU Jun-cheng
2005, 25(10): 2228-2229.
Asbtract
(
)
PDF
(357KB) (
)
Related Articles
|
Metrics
According to the discussion and analysis to the embedded OS load,startup,and debug circumstances,a project for the build of the man-machine interaction environment was given,which used remote debug as its developing mode,and RS-232 protocol as its communication criterion.
Recognition of limited-length command with correct format
WANG Xiao-lan,ZHOU Xian-zhong
2005, 25(10): 2230-2232.
Asbtract
(
)
PDF
(572KB) (
)
Related Articles
|
Metrics
In some cases the phrase table of a speech recognition system is fixed,and the correct ratio is the most important thing.We introduced a method which is based on Viterbi algorithm and a new grammar rule named sentence-word constraint rule in this paper.And use it in the speech recognition experiment of air force flying commands.The result proved the improved algorithm is effective.
On the research of MPLS-based mobile Ad Hoc networks
XIONG Yan,LUO Xiao-hui,MIAO Fu-you,WANG Xing-fu
2005, 25(10): 2233-2235.
Asbtract
(
)
PDF
(607KB) (
)
Related Articles
|
Metrics
The goal of this paper is to provide fast-forwarding ability.QoS-provisioning functions and expansibility for mobile Ad Hoc networks.The MPLS-based techniques was pressented recently to dealt with the drawbacks of the standard IP forwarding in mobile Ad Hoc networks.This paper focuses on the MPLS-based mobile Ad Hoc networks and its architecture.A new MPLS signaling protocol of DMSP(Dynamic MPLS Signaling Protocol) supporting recovery in mobile Ad Hoc networks was also presented in this paper.Finally,the feasibility of the recovery technique of DMSP had been validated via simulations.Considering the limitation of the standard IP forwarding in mobile Ad Hoc networks,this paper researches MPLS based mobile Ad Hoc networks and describes its architecture.A new MPLS signaling protocol DMSP(Dynamic MPLS Signaling Protocol)supporting recovery in mobile Ad Hoc networks is also presented in this paper.At last,the performance of the recovery technique of DMSP has been analyzed,via simulations.Our goal is to provide fast-forwarding ability,Qo S functions and expansibility for mobile Ad Hoc networks.
Using ant algorithm to schedule tasks in grid
XU Zhi-hong,SUN Ji-zhou
2005, 25(10): 2236-2237.
Asbtract
(
)
PDF
(582KB) (
)
Related Articles
|
Metrics
The ant algorithm was put into grid to do task schedule in this paper,and every parameter of the algorithm was detected and the best parameters were selected for ant scheduling,the ant scheduling was designed and relized,task scheduling and resource management were combined,and attention to load balance and QoS was given,the results is satisfactory.
Research of network performance evaluation based on TFAHP and network simulation
TAO Yang,ZHANG Jing,ZHOU Xia
2005, 25(10): 2238-2240.
Asbtract
(
)
PDF
(604KB) (
)
Related Articles
|
Metrics
Based on fuzzy theory,an improved fuzzy AHP—TFAHP(Triangular Fuzzy Number Analytical Hierarchy Process) was given.TFAHP is more objective and reasonable;it is also briefer than AHP.On the basis of the introduction of network performance evaluation model based on TFAHP,the method of network performance evaluation using network simulation was proposed,including the following aspects: the determination of performance measurement,the network simulation design,the calculation of performance parameters and the analysis of result.And then,we applied this method to a real multimedia network.
Dynamic QoS multicast routing algorithm based on ant colony system
GUI Zhi-bo,WU Xiao-quan
2005, 25(10): 2241-2243.
Asbtract
(
)
PDF
(499KB) (
)
Related Articles
|
Metrics
Based on the self-organized capacity of ant colony,a distributed dynamic QoS multicast routing algorithm was presented for next-generation Internet in this paper.In this algorithm,ants started out the destination nodes in a multicast group and searched for multicast tree and selected the lowest cost path meeting its QoS constrains at every step of iteration,and then added this path into the current multicast tree.The multicast tree could be built distributedly in the "Pull" manner.Our tests indicate that as compared with other two algorithms,the presented algorithm gives better performance in terms of the total cost,and can quickly and effectively find globally optimal(or near optimal) solution for dynamic QoS multicast routing problem.
Research on communication strategies based on virtual circuit in micro-communication element architecture
YE Ya-lan,WU Shao-zhi,ZENG Jia-zhi,YANG Xia
2005, 25(10): 2244-2246.
Asbtract
(
)
PDF
(599KB) (
)
Related Articles
|
Metrics
After analyzing the deficiency of contemporary network architecture,the idea and concepts of micro-communication system were introduced.Through analyzing the work mechanism based on virtual circuit architecture,three communicational strategies based on virtual circuit were proposed,and the strategies were discussed in the later part of this paper.Finally,the application situation of three strategies was presented.
Adaptive traffic engineering of parallel paths based on genetic algorithm
ZENG Zhi-min,ZHANG Chen,FENG Chun-yan,DING Wei
2005, 25(10): 2247-2249.
Asbtract
(
)
PDF
(492KB) (
)
Related Articles
|
Metrics
The centralized traffic optimization based on dynamic parallel paths was discussed with genetic algorithm.The ATEPP(Adaptive Traffic Engineering of Parallel Paths) algorithm was proposed.The network congestion information and the link utilization were integrated into the proposed algorithm so that it can dynamically decide the optimized objectives and decide whether a pair of source and destination nodes used parallel paths.The evolution selection of genetic algorithm was simplified by the offered feasible and simple traffic assignment solutions.The simulation analysis shows that the proposed algorithm can reduce the solution space,decrease the complexity,increase the convergence speed and assure the optimization performance well.
Improvement of real-time protocols based on industrial ethernet
LU Chao,ZHANG Xi-huang
2005, 25(10): 2250-2254.
Asbtract
(
)
PDF
(1062KB) (
)
Related Articles
|
Metrics
eferring to a very popular fieldbus protocol Profibus DP,a real-time protocol based on Industrial Ethernet was presented.The real-time protocol improved the original Profibus DP Protocol,based on the IEEE802.2 Logical Link Control(LLC) sublayer to implement the Profibus DP functions on Ethernet.The design shows how real-time protocol can be implemented to satisfy the requirement of real communication at the device level in factory automation systems and maintain the compatibility and continuity with already existing Profibus DP applications.Moreover,some performance figures of real-time protocols were analyzed and the results of some simulation tests were given.
Research on application layer multicast middleware technology
FENG Rui-jiang,DOU Wen-hua
2005, 25(10): 2255-2257.
Asbtract
(
)
PDF
(852KB) (
)
Related Articles
|
Metrics
Since there is still a long way to go for the practical business of IP multicast,Application Layer Multicast(ALM) has been a perfect alternative approach.The actual researches have shown the feasibility to provide the fundamental functions of ALM to multicast application as the form of middleware.The key is describing these functions and defining one practical framework for middleware.Based on the analysis on the classical ALM systems,protocols and middlewares,this paper summarized the fundamental functions of ALM,and further presented a basic architecture of ALM middleware.
Network bottleneck measurement method based on heterogenous packet-pair train
XIAO Yu-feng,WEN Jun,HUANG Yu-qing
2005, 25(10): 2258-2260.
Asbtract
(
)
PDF
(549KB) (
)
Related Articles
|
Metrics
The bottleneck measurement method based on heterogenous packet-pair train was introduced.Firstly,the measurement condition of sub-path bottleneck bandwidth was defined,and then the algorithm for sub-path and whole path bottleneck measurement was designed.The approch is proved to be effiective through simulation. The bottlenect bandwidth and link can be found out in short time through this approach.
QoS routing optimal algorithm in Ad Hoc networks based on link existent time
LI Xin,XUE Xiao-ping
2005, 25(10): 2261-2263.
Asbtract
(
)
PDF
(523KB) (
)
Related Articles
|
Metrics
On the basis of analyzing the problem of QoS routing in the Ad Hoc networks,a new Qos routing optimal algorithm in Ad Hoc networks based on genetic algorithm was proposed in this paper.On the basis of considering other necessary QoS parameters,a peculiar QoS parameter in Ad Hoc networks—link existent time was taken into account in this new algorithm.Finally an example proves this algorithm has better foreground in Ad Hoc networks.
Analysis and test of time-delay in network control systems
GUI Fang,QUAN Shu-hai
2005, 25(10): 2264-2266.
Asbtract
(
)
PDF
(680KB) (
)
Related Articles
|
Metrics
Computer network is becoming message transmission channels of remote control systems,but random time-delay and losing data phenomenal that exist in the process of network transmission would decrease the performance of control systems,even make the system unstable.In order to find out changing rules of time-delay,time-delay of different protocols were analyzed and measured,and in this way,factors that influence time-delay were founded.Some suggestions on choice of transmission protocols in network control systems were provided.
Integrated test environment for layer 3 switches
TIAN Yuan
2005, 25(10): 2267-2268.
Asbtract
(
)
PDF
(441KB) (
)
Related Articles
|
Metrics
A designed goal for the general testing system on the basis of classified the network equipment testing was put forword.Through analyzed this goal,several key problems to be settled were proposed,and then answers to each question was put forward.After combined these answers,the final designed model for the testing system was proposed.At last,test items that could be tested in this system were introduced.After the practical testing,a comprehensive assessment was given.
Analysis of firewall rule configuration mistakes and its detecting algorithm
WANG Wei-ping,CHEN Wen-hui
2005, 25(10): 2269-2271.
Asbtract
(
)
PDF
(648KB) (
)
Related Articles
|
Metrics
Possible mistakes in the configuration process were analyzed.Firstly,several familiar types of mistakes in configuration were introduced,and the algorithm which can find mistakes was put forward.And then relevant layouts against different mistakes were provided.
Time-dependent extension logic of secure protocols
ZHAO Hua-wei,LI Da-xing,QIN Jing
2005, 25(10): 2272-2275.
Asbtract
(
)
PDF
(659KB) (
)
Related Articles
|
Metrics
Coffey&Saidha have proposed a logic system to formally analyze the timed-release public key protocols,which was called CS logic.CS logic added the time into logic structure,so it could be used to analyze the security of time-dependent secrets of timed-release public key cryptographic protocols.An extension of CS logic was proposed in this paper,which corrected some defects of CS logic,and extended the logic to analyze the symmetrical key cryptographic protocols.Finally a good formal analysis of a concrete protocol was given.
Survey of the security alerts correlation algorithms
GUO Shan-qing,YANG Xue-lin,ZENG Ying-pei,XIE Li,GAO Cong
2005, 25(10): 2276-2279.
Asbtract
(
)
PDF
(853KB) (
)
Related Articles
|
Metrics
security devices(e.g.firewalls,IDS’s,anti-virus tools etc) that have been widely adopted in enterprise environments may generate huge amounts of independent,raw attack alerts,which are characterized by high false positive ratio and false negative ratio.As a result,it is difficult for users to understand these alerts and respond correspondingly.Therefore,handling the huge number of alerts produced by security devices is becoming a critical and challenging task in network security research.A general approach for solving this problem is to do some correlation analysis with these alerts and build attack scenario.A general survey of the contemporary alerts correlation algorithms was given in this paper by a straight forward classification paradigm,and some problems for future research were addressed.
Design of agent-based coordinated-control framework
WANG Wen-qi,LI Wei-hua,SHI Xing-jian,WANG Gao-zu
2005, 25(10): 2280-2282.
Asbtract
(
)
PDF
(619KB) (
)
Related Articles
|
Metrics
A new architecture,agent-based coordinated-control framework(ABCCF) was proposed.This architecture provided security communication between agent and subsystems,the security message delivery protocol among subsystems,the uniform encryption and authentication policy and intelligent cooperative mechanism support at low layer.At the same time because of flexible definition of system control message,the architecture is extensibility.
Implementation of network processor-based content filtering
CHEN Hong-tao,CHEN De-ren,GU Xue-fei
2005, 25(10): 2283-2285.
Asbtract
(
)
PDF
(585KB) (
)
Related Articles
|
Metrics
Content filtering is an indispensable important part in the network security field.It analyses the information transported in application layer content protocol and controls the forwarding of the information based on the filtering rules.Network Processor is a new generation programmable processor of high speed for carrying out data processing and transmitting.With its obvious advantages in network data processing,the network processor becomes the essential component in high-speed network equipment which supports network functions,such as operation management、security and network monitoring,etc.Based on the advantage of network processor,this paper presented an implementation of an Intel IXP2400 network processor-based content filtering system.
Algorithm for hand shape matching based on feature fusion
GU Li,ZHUANG Zhen-quan,ZHENG Guang-yong,WANG Zai-jian
2005, 25(10): 2286-2288.
Asbtract
(
)
PDF
(793KB) (
)
Related Articles
|
Metrics
Hand shape recognition is an important measure in biometrics.And Hand Shape Matching(HSM) is the point of it.Currently,HSM are classified into two major kind: one is Characteristic Vectors Matching(CVM) method and the other is Point Pattern Matching(PPM) method.These two methods have distinct traits,not only the advantage but also the disadvantage.An algorithm for hand shape matching based on feature fusion which might integrate advantage of PPM and CVM was presented.Thus it can work more effectively and improve the accuracy and robustness of HSM.
Remote password authentication scheme based on smart card
WANG Meng,LU Jian-zhu,LI Xiao-feng
2005, 25(10): 2289-2290.
Asbtract
(
)
PDF
(365KB) (
)
Related Articles
|
Metrics
A remote password authentication scheme based on the RSA cryptography and smart card was presented.Compared with other schemes,our scheme has the following advantage: Each user can freely choose his own password and can renew the password himself in time according to the user’s need.Any authentication messages for clients are never saved in the servers.It is based on the RSA cryptography and one-way secure hash function,so its realization is simple and reliable.
Scalable Key management scheme based on member discovery protocol for IP multicast
WEI Chu-yuan,LI Tao-shen,WANG Gao-cai
2005, 25(10): 2291-2293.
Asbtract
(
)
PDF
(704KB) (
)
Related Articles
|
Metrics
On the basis of analyzing existed schemes,a key management scheme based on member discovery protocol for IP multicast was proposed.Aiming at realistic Internet-like topologies,the member discovery protocol was embeded in our protocol to output a member overlay tree.The multicast group which consisted of all end-users was divided into some virtual subgroups by group-constructing algorithm.Logical Key Hierarchy(LKH) protocol was adopted to implement key management in every subgroup.The group key was distributed to all subgroup security controllers by the group security controller.The protocol was a two-level key management protocol.The improved protocol possesses better scalablity than other schemes,better performance about group rekeying and can be applied to large multicast group.
Security analysis of a digital multisignature scheme
MO Le-qun,WANG Xiao-ming,YAO Guo-xiang
2005, 25(10): 2294-2295.
Asbtract
(
)
PDF
(478KB) (
)
Related Articles
|
Metrics
Lu et al.pointed out that there is the same weakness in the multisignature scheme proposed by Hurn and proposed by Ji et al.,that is,several members collude together,they can deny that they had taken part in process of signing some messages with others.To avoid this weakness,Lu et al.proposed improvements for the two multisignature schemes.In this paper,we first analyzed The scheme improved by Lu et al was analyzed.And showed that their scheme was still insecure,then a new multisignature scheme was proposed.The scheme propose not only can withstand the collude attack,but also has the property of forward secure.An adversary can not forge multisignature pertaining to the past even if has gotten the current all signatures’keys,that is,previous generated multisignature remains valid.
Research of establishing network RBAC based on MLS and attribute certificate
WANG Jian-jun,NING Hong,ZHU Zheng-jian
2005, 25(10): 2296-2298.
Asbtract
(
)
PDF
(581KB) (
)
Related Articles
|
Metrics
MLS was abroad applied in Information Management System.Shortage of MLS was analyzed,lacked agility,could not easily perfect security policy and extend function.RBAC could neatly change relation of access between subject and object,and modify security policy,by changing accessing purview of user.Idea and settle project of constructing RBAC were presented against security policy of MLS by analyzing characteristic and commonness between MLS and RBAC,it can improve efficiency for programmer,and can improve security of system and management efficiency by accredit user with attribute certificate in network.
Software and database
Real-time multi-agent system model applicable in Internet
LIU Yun-sheng,YI Wei-ming
2005, 25(10): 2299-2301.
Asbtract
(
)
PDF
(841KB) (
)
Related Articles
|
Metrics
A real-time Multi-Agent System model based on the Agent to Agent architecture was proposed in this paper,which can meet the demands of Internet applications. This paper focused on the collaboration among Agents,task scheduling and execution control.The real-time agent communication language and the communication mechanism of this model were also introduced briefly.
Concept maps-based integrating of Web-courseware and learning object repository
ZHOU Zhu-rong,WU Jing-hua,QIU Yu-hui
2005, 25(10): 2302-2305.
Asbtract
(
)
PDF
(830KB) (
)
Related Articles
|
Metrics
Web-courseware and learning object repository(LOR) are important in e-learning.They are dissociative and their structure is different.Knowledge representation was adopted in this paper to unify their structure.A model "LOR-concept map-web courseware" was put forward,doing research about how to integrate web-courseware and LOR.It is valuable to take advantage of web-courseware and LOR.It is also helpful to improve the efficiency of students’ learning by using resource.
Design and implementation of mobile agent-based LBS application platform
ZHONG Shi-ming,ZHANG Sheng,GU Zhi-li,ZHU Cai-lian
2005, 25(10): 2306-2309.
Asbtract
(
)
PDF
(1001KB) (
)
Related Articles
|
Metrics
The mobile agent can move freely from the one host to another in the network with heterogeneous software and hardware and has intelligent.The LBS system was built based on mobile agent because of these advantages.In the mobile network with limited bandwidth,it can provide the LBS users who hold the non-persistent equipments with information services in real-time and effective.The LBS systems in existence require the users keep in touch with the LBS servers stabilized in process of getting information from the network.And the client has to operate synchronized with the server.The mobile agent based LBS system can overcome these disadvantages.The discussions placed emphasis on the design of mobile agent server,the mobile agent message and event model,the mobile agent,the mobile agent transfer and the clients.At last,a prototype was implemented.
Mining web data with quantum Grover search algorithm
MU Wan-jun,YOU Zhi-sheng,ZHAO Ming-hua,YU jing
2005, 25(10): 2310-2311.
Asbtract
(
)
PDF
(537KB) (
)
Related Articles
|
Metrics
A kind of method of web data mining on association rule,authoritative Web pages and Weblog items with quantum Grover search algorithm and probability were given in this paper,and then the algorithm to be optimal in mining a large volumes of unsorted and unstructured Web data was dicussed.
Man/Standby switch and data synchronization technology oriented to communiction field
HE Xian-bo,LI Zhi-shu,TANG Ning-jiu,YIN Feng,WU Yun-bo
2005, 25(10): 2312-2314.
Asbtract
(
)
PDF
(606KB) (
)
Related Articles
|
Metrics
In communication system field,Main/Standby Switch is one of key technologies,which can ensure stabilization and reliability of communication network.A design of Main/Standby Switch oriented to communication applications was presented,and its key technologiy—data synchronization were studied.
Implementation of poisoning diagnosis expert system based on decision tree
TAN Yi-hong,CHEN Zhi-ping,LI Xue-yong
2005, 25(10): 2315-2317.
Asbtract
(
)
PDF
(599KB) (
)
Related Articles
|
Metrics
In order to judge the poisoning quickly through poisoning diagnosis expert system,after analyzing the failure of previous model of inference,a novel model of inference was put forward with which the expert system applies,and the particular method of implementation was introduced.This system firstly set up a decision tree according to the symptoms doctor known and thinking enough of its diagnostic contribution and diagnostic expense,and then found the result(the cause of poisoning) through repeatedly heuristic deduction.System test shows that it achieves the desired result.
Modifying and testing of public opinion model based on StarLink
QU Qing-jun,YAO Yi-ping,LIU Bu-quan,SHI Cheng-gang
2005, 25(10): 2318-2319.
Asbtract
(
)
PDF
(575KB) (
)
Related Articles
|
Metrics
Public opinion is a simulation model based on Swarm and has an importantly practical background,but it cannot comply with mainly developing trends of system simulation such as interoperability and reusability.Because HLA has become main trend of distribution interaction simulation and StarLink is an excellent implementation platform of RTI,modifying public opinion based on StarLink is an optimal choice.First,this paper gives The modeling design of three class federates in public opinion model on the basis of explaining HLA(High Level Architecture) was discussed.Information flow between federates and inter-federates were analyzed.Finally,simulation scheme based on the federation was introduced.The experience result indicates that StarLink is able to support large and middle scale simulation system effectively.
Research on the specification framework and key technology of WS-DAI
WANG Wei,LIU Wei-dong,SONG Jia-xing
2005, 25(10): 2320-2322.
Asbtract
(
)
PDF
(689KB) (
)
Related Articles
|
Metrics
Data resources played a significant role in many grid applications.Web services provided implementation neutral facilities for describing,invoking and orchestrating collections of networked resources.With the background of OGSA-DAI and WSRF,a Web Service data access and integration specification for a collection of generic data interfaces presented by WS-DAI was introduced.The specification can be extended to support specific kind of data resources.The framework of the specification was analyzed.The paper also studied on the core of the abstract model in detail and an application example was presented.Finally the mapping to WSRF was discussed.
Research on text hierarchical clustering algorithm based on K-Means
YU Jing-hui,HE Pi-lian,SUN Yue-heng
2005, 25(10): 2323-2324.
Asbtract
(
)
PDF
(378KB) (
)
Related Articles
|
Metrics
A new text hierarchical clustering algorithm based on K-Means was presented,which combined features from both K-Means and agglomerative approach that allowed them to reduce the early-stage errors made by agglomerative method and hence improved the quality of clustering solutions.The experimental evaluation shows that,our algorithm leads to better solutions than agglomerative methods.
Hibernate persistence solution for passenger transport information management system based on J2EE
LI Min,HUANG Qiang,LI Hao,YIN Zhi-ben
2005, 25(10): 2325-2327.
Asbtract
(
)
PDF
(592KB) (
)
Related Articles
|
Metrics
Based on the construction of ITS in Chengdu,the design of data persistence layer of the passenger transport information management system was discussed in this paper.By comparing the main solutions for data persistence layer currently,the Hibernate solution on J2EE was put forward,and the advantages of the Hibernate solution were described.
New text clustering method based on statistical reduction dimension and Kohonen network
WANG Zhi-yong,WANG Zheng-ou
2005, 25(10): 2328-2330.
Asbtract
(
)
PDF
(742KB) (
)
Related Articles
|
Metrics
A new text clustering method based on WMI(words mutual information) statistical reduction dimension approach and Kohonen network(SOFM network) was proposed. This method considered the mutual information between text features and improved the efficiency of reduction dimension largely.Text clustering used Kohonen network whose learning rate was dropped with time.The experiments indicate that the clustering result obtained using this combined method has much higher precision than that using general reduction dimension approach.
Selection of software reliability model based on Kohonen network
WU Qin,HOU Chao-zhen,YUAN Ju-mei
2005, 25(10): 2331-2333.
Asbtract
(
)
PDF
(582KB) (
)
Related Articles
|
Metrics
Software reliability model selection is a important part of software reliability engineering.Now there is no model which is suitable for all users.Moreover,the accuracy of reliability measure for using different model is different.Model selection has been an emphasis in the research of model.In this paper,the clustering analysis was used as a tool for software reliability selection.On the basis of Failure data coded,Kohonen nets were used as a tool for clustering analysis.Twenty data sets were used to demonstrate the approach and efficiency.
Graphics and image processing
Regularization of visible virtual human images
CHEN Mei,ZHENG Fei
2005, 25(10): 2334-2335.
Asbtract
(
)
PDF
(455KB) (
)
Related Articles
|
Metrics
A first attempt was carried out in this paper to regularize VVH images.First,a control mesh constructed with triangles was built up;then a barycentric coordinates transform from graphic area was adopted to realize image coordinates transform.Such a hybrid algorithm is stable and easy to operate.The regularization effect is fairly good.
Filtering image impulse noise based on fuzzy rough neural network
ZHANG Dong-bo,WANG Yao-nan
2005, 25(10): 2336-2338.
Asbtract
(
)
PDF
(672KB) (
)
Related Articles
|
Metrics
A FRNN(Fuzzy Rough Neural Network) was introduced to keep up trade-off between noise attenuation and detail preservation in image processing.The FRNN is composed of fuzzy neurons and indifferentiable rough neurons.GA(Genetic Algorithm) which integrate mountain climbing is applied to tune the weight of the FRNN.The local search ability for optimum solution is improved in the later period of the learning process.The result of simulation indicates that the FRNN which integrate the ability to deal with fuzzy information and rough set information has better performance than BP network and RNN(Rough Neural Network) in image fusion for filtering.The FRNN is a sort of hybrid intelligent neural network which has good performance.
Method based on wavelet multiresolution analysis and KPCA for face recognition
LI Wei-hong,GONG Wei-guo,CHENG Wei-ming,LIANG Yi-xiong,YING Ke-zhong
2005, 25(10): 2339-2341.
Asbtract
(
)
PDF
(597KB) (
)
Related Articles
|
Metrics
Feature selection is very important for face recognition.The valuable facial low-frequency features can be obtained by wavelet multiresolution analysis and the non-linear features kernel principle component analysis(KPCA) can be extracted from initial face images.In this paper,an efficient method based on wavelet multiresolution analysis and KPCA was proposed for face feature selection and a linear support vector machine(SVM) classifier was designed for face recognition.Experimental results on UMIST face databases indicate the effectiveness of the proposed method.
Image-adaptive public watermarking technique based on DWT
ZHANG Xian-hai,YANG Yong-tian
2005, 25(10): 2342-2344.
Asbtract
(
)
PDF
(893KB) (
)
Related Articles
|
Metrics
A robust image-adaptive public watermarking technique based on discrete wavelet transform(DWT) was proposed in this paper.By taking full advantage of the masking characteristics of the human visual system(HVS),a binary watermark was embedded into the host image by modifying different wavelet subbands coefficients that were corresponded.The blind watermark was realized as the original image don’t be needed when extracting watermark.Modifying some parameters could get a best point.The experimental results show that the proposed algorithm provides higher embedding capacity and robust to common image processing operations and geometric distortions.So a conclusion can be made that the proposed technique is practical.
Robust wireless image transmission over OFDM muticarrier system
WANG Sa-shuang,DAI Ju-feng,HOU Chun-ping
2005, 25(10): 2345-2347.
Asbtract
(
)
PDF
(610KB) (
)
Related Articles
|
Metrics
The robust image transmission by combining scalable image coding with OFDM(orthogonal frequency division mutiplexing) modulation was considered.The output bit streams of the scalable image coder have different perceptual importance.It provided unequal error protection to these bit streams by adaptively assigning subchannel,bit rates and power according to instantaneous channel characteristics and maximize the bit rates of the system under a total power constraint and target BER’s.Further,if the important bit streams are given higher channel error protections on the basis of above adaptive allocation,the system performance can be improved greatly.
Multiple bit planes embedding based binary phase-only filter watermarking
SANG Jun,WANG Cheng-liang,LI Zong-zhi,ZHU Wei-hua
2005, 25(10): 2348-2350.
Asbtract
(
)
PDF
(600KB) (
)
Related Articles
|
Metrics
The binary phase-only filter(BPOF) digital watermarking is a semi-fragile watermarking technique used for the image credibility authentication.In this technique,the magnitude bit planes and BPOF are obtained from the magnitude and phase of the discrete Fourier transform(DFT) of the image,respectively.And then,the BPOF is embedded into the magnitude as the watermark.Based on the brief analysis of embedding the BPOF(binary phase-only filter) watermark into single bit plane,the watermark embedding with multiple bit planes and analyzed its performances was discussed.The optimized scheme is obtained via simulation experiments: embedding the watermark into multiple magnitude bit planes,while extracting the watermark from the highest one of them,will improve the watermark performance markedly.
Design and implementation of fast face detection system
WU Tun-hua,ZHOU Chang-le
2005, 25(10): 2351-2353.
Asbtract
(
)
PDF
(629KB) (
)
Related Articles
|
Metrics
In order to detect faces in gray or color images at high speed and accuracy,some extension to the technology of real-time face detection were made and a rapid face detection system was designed and realized.The training subsystem is based on AdaBoost algorithm.The experiment results show that the extension to Viola’s technology is quite successful.The rapid face detection system is divided into two parts,training(or learning) subsystem and detecting subsystem.
Image retrieval based on salient points in compressed domain
ZHANG Wen-yin,NIE Zhen-li
2005, 25(10): 2354-2355.
Asbtract
(
)
PDF
(1115KB) (
)
Related Articles
|
Metrics
Compressed-domain image analysis and processing has been an active area in the fields of multimedia research.A fast image retrieval method based on salient points from DCT(Discrete Cosine Transform) compressed domain was presented in this paper,which direct computes the robust salient points from none-zero DCT coefficients without full decompression,so that a lot of computational cost was saved.Experimental results show that the image features obtained based on salient points are suited for image retrieval because of their powerful abilities to characterize the image.
Image de-noising based on fast basis pursuit algorithm
WANG Xiong-liang,WANG Zheng-ming
2005, 25(10): 2356-2358.
Asbtract
(
)
PDF
(652KB) (
)
Related Articles
|
Metrics
asis Pursuit is a novel method of signal sparse representation.Based on the core idea of Basis Pursuit and the modification of its algorithm,we extended the application of the Basis Pursuit method to image de-noising.Aiming at the hardship to solve one kind large-scale linear programming problem of Basis Pursuit,certain kind form of separable signal representation was considered.We construct dictionaries in column-wise and row-wise of the image,the dimension of the dictionary was greatly reduced.Then two-dimension problem was turning into two one-dimension problem.Finally,one new iterative method was presented to solve this problem.Thus the limitation of computation burden iswas well solved.Experiment results demonstrate that Basis Pursuit can be implemented speedy and stably,it can provide well de-noising results at the same time.
Improved fast fragment-based image completion and its application in remote sensing image processing
CHEN Fen,YAN Dong-mei,ZHAO Zhong-ming
2005, 25(10): 2359-2361.
Asbtract
(
)
PDF
(750KB) (
)
Related Articles
|
Metrics
Object removal from images and filling the left holes in a seamless manner is an important task for editing digital images.Based on Drori’s works on 2003,an improved fast fragment-based image completion algorithm was proposed for removing clouds and clouded shadows from remote sensing images.Compared with Drori’s algorithm,our method can remarkably reduce the computing time with almost identical results.
Real-time shadow rendering in Vega scene simulation
YANG Bing,LI Feng-xia,ZHAN Shou-y
2005, 25(10): 2362-2364.
Asbtract
(
)
PDF
(668KB) (
)
Related Articles
|
Metrics
Real-time shadow rendering seldom appears in most scene simulation systems developed in Vega or other high level APIs.A method integrating shadow generation into Vega scenes was presented.Shadow algorithms in virtual environment and the extended interface provided by Vega were studied first,and then shadow mapping algorithm was chosen to generate shadow in Vega scene.The algorithm was implemented in OpenGL,then shadow rendering was integrated into 3D scenes using Vega’s callback mechanism,and it makes the final results more realistic.
Digital image watermark algorithm in DCT domain with chaotic encryption
ZHENG Rong,JIN Cong,WEI Wen-fen,LI Bei
2005, 25(10): 2365-2366.
Asbtract
(
)
PDF
(742KB) (
)
Related Articles
|
Metrics
A digital image watermark algorithm in DCT(Discrete Cosine Transform) domain with chaotic encryption was presented.A two-value image that had been dealt with by shuffle was modulated by a random watermark sequence created by using Logistic map,and then it was embedded to the low frequency coefficients of original image.Experimental results demonstrate that the watermark is invisible and robust against common noise,crop and JPEG compress etc.
Unsupervised segmentation of SAR image based on multiscale stochastic model
XU Hai-xia,TIAN Zheng,MENG Fan
2005, 25(10): 2367-2369.
Asbtract
(
)
PDF
(811KB) (
)
Related Articles
|
Metrics
The presence of speckle in Synthetic Aperture Radar(SAR) images makes the segmentation of such images difficult,either by gray levels or by texture.According to the mechanism of SAR imaging,two unsupervised segmentation methods were proposed based on two class of multiscale stochastic model,namely multiscale autoregressive(MAR) model and multiscale autoregressive moving average(MARMA) model.These models capture the statistical information in a multiscale sequence of SAR image,which is then used to implement unsupervised segmentation of SAR image via multiresolution mixture algorithm.Experimental results over SAR images confirm the proposed segmentation methods are valid.
Image steganalysis based on statistical moments in the frequency domain of the histogram
GAO Jian-jiong,XUAN Guo-rong,SHI Yun-qing,CAI Pei-qi,YANG Zhi-qiang
2005, 25(10): 2370-2373.
Asbtract
(
)
PDF
(777KB) (
)
Related Articles
|
Metrics
This paper proposed an novel image steganalysis scheme which takes the statistical moments in the frequency domain of the histogram of wavelet subbands as features.Our theoretical analysis and experimental results shows that the statistical moments in the frequency domain of the histogram is more effective than that in the spatial domain of the histogram.The experimental results demonstrate that the proposed method is superior to existing steganalysis schemes.The test result on CorelDraw images: the detection rates of several data hiding methods are above 90%.
Fast fuzzy edge detection algorithm based on classifier
LU Ji-wen,ZHANG Er-hu
2005, 25(10): 2374-2375.
Asbtract
(
)
PDF
(651KB) (
)
Related Articles
|
Metrics
A new fast fuzzy edge-detection algorithm was presented by analyzing and improving Pal-King fuzzy edge detection method.Firstly,this algorithm enhanced the original image in fuzzy way and designed one classifier according to its and its 8-neighbor gray levels;secondly,classified each pixel into the proper edge class by computing and comparing its greatest fuzzy truth of membership;lastly,thinned the edge pixels detected and omit the noise edge pixels.This fast algorithm not only abandoned the complex iterative calculation of Pal-King method,but also conquered missing edge information which is low gray level and can detect various details by setting various parameters.Finally experimental results showed that this method improves the Pal-King algorithm efficiently and its calculation speed was about 20 times faster than Pal-King algorithm.
Adaptive nonlinear deblurring of image interpolation
XIAO Yi-nan,WEN Yu-mei,LUO Yi
2005, 25(10): 2376-2378.
Asbtract
(
)
PDF
(758KB) (
)
Related Articles
|
Metrics
Linear space-invariant interpolation schemes,such as the nearest interpolation,the linear interpolation and the cubic interpolation,cannot produce sufficient resolution around edges and consequently the zoomed images become obscured.Here a high-pass rational filter is improved to remove this distortion.The edge-sensitive operator is generalized to a two dimensional form to efficiently deal with images.The results of processing show that the new filter operator can preserve the geometric regularity around edges in the enlarged images interpolated by the linear space-invariant schemes.This scheme of adaptive deblurring makes enlarged images gets higher resolution and better visual quality than other image interpolation enhancement schemes,such as unsharp masking and iterative recovery.
New fast Hough transform for line detection
U Hui-min,ZHENG Zhi-qiang
2005, 25(10): 2379-2380.
Asbtract
(
)
PDF
(393KB) (
)
Related Articles
|
Metrics
Hough Transform is the best method to detect curve,but the efficiency of conventional Hough Transform is low,and is not real-time.The paper designed a new fast Hough Transform for line detection based on analyzing the existing modified Hough Transform,and then validated that the new designing algorithm has better real-time performance by comparing the existing modified Hough Transform.
Medical image segmentation based on Mathematical Morphology
WANG Shu,LI Yong-ning,CHEN Kai-min,HUANG Ge
2005, 25(10): 2381-2382.
Asbtract
(
)
PDF
(739KB) (
)
Related Articles
|
Metrics
In this paper,the watershed algorithm to segment medical images was introduced. The two improved methods considering the over-segmentation phenomena of watershed algorithm were presented.First,get the original image through multi-scale morphological filter with auto-adapted determinations weights,and then,introduced a floating-point active image as the input of watershed algorithm.Experiments show that the algorithm is very simple,and can restrain the over-segmentation phenomena effectively,so can obtain good results.
Medical image retrieval based on texture features and semantic information
WANG Li-dong,TAI Xiao-ying,BA Te-er,ZHAO Jie-yu
2005, 25(10): 2383-2386.
Asbtract
(
)
PDF
(859KB) (
)
Related Articles
|
Metrics
This paper presented a method of medical images retrieval about sternums based on texture features combining with semantic information.The texture features were calculated with gray level co-occurrence matrix in different partitions.This paper also introduced an algorithm about color correlogram.A prototype system was implemented.Meanwhile,three experiments were designed to evaluate the effectiveness of the approach.The comparison of the retrieval results show that the approach proposed in the paper is effective.
Network and distributed techno
Optimizing multi-instance neural networks based on an improved genetic algorithm
CAI Zi-xing,SUN Guo-rong,LI Mei-yi
2005, 25(10): 2387-2389.
Asbtract
(
)
PDF
(796KB) (
)
Related Articles
|
Metrics
Multi-instance neural networks are a kind of neural networks to solve multi-instance learning problems.There is a function that is not differentiable in multi-instance neural networks,so the predictive accuracy is low if multi-instance neural networks are trained with the back-propagation approach.In order to achieve higher predictive accuracy,an improved genetic algorithm for optimizing multi-instance neural networks was presented.Convergence rate was increased and premature convergence was overcome by means of local search operator,suppress operator and adaptive calculations of probabilities for operators.Some experiments on well-known test data show that multi-instance neural networks that are optimized by the improved genetic algorithm heighten significantly predictive accuracy and computational expensiveness of the algorithm is less than other algorithms.
Structure learning method studying of stochastic fuzzy neural network
ZHANG Jun,LU Jing-jing
2005, 25(10): 2390-2391.
Asbtract
(
)
PDF
(342KB) (
)
Related Articles
|
Metrics
Based on input layer,latent layer and output layer correlation rule,the structure learning method of stochastic fuzzy neural network considered the effects on the latent layer function,which was very important for engineering applications.One key problem of this algorithm is how to get the best node number of latent layer.In this paper,a normal method to confirm the best node number was proposed.According to this theory,one simulation was presented.
New genetic algorithm syncretized the improved simulated annealing
YU Dong-mei,ZHANG Qiu-yu,YI Hua-wei
2005, 25(10): 2392-2394.
Asbtract
(
)
PDF
(606KB) (
)
Related Articles
|
Metrics
Based on the analysis of the advantages and disadvantages of the Genetic Algorithm and Simulated Annealing Algorithm,a new Genetic Algorithm was proposed.The genetic algorithm with optimum reservation strategy was served as the main flow of the new algorithm which syncretized the mechanism of improved simulated annealing.In order to get the global optimum solution,the improved simulated annealing took the double threshold value and kept the middle optimum solution to reduce the computing capacity and enhanced the convergence speed.Through the simulation test of function,the result indicates that the new algorithm can improve the convergence speed and the ability of jumping out the local optimum solution greatly.
Research of the genetic-clustering algorithm considering the condition of planar adjacency relationship
HE Xiang-yang,PENG Wen-xiang,XUE Hui-feng
2005, 25(10): 2395-2397.
Asbtract
(
)
PDF
(595KB) (
)
Related Articles
|
Metrics
The shortcomings about these days clustering algorithm considering the condition of planar adjacency relationship are analysised.The clustering algorithm considering the condition of planar adjacency relationship is defined again newly from the general clustering.In order to dealing with the clustering considering the condition of planar adjacency relationship,the concept adjacency matrix is defined.The genetic-clustering algorithm considering the condition of planar adjacency relationship is put forward,partitioning samples on the best-close distance and adjacency matrix,calculating cluster aim function on within-group sum of squares(WGSS) error,importing genetic algorithm.The algorithm is validated and compared with the FCM clustering outcome by examples.Algorithm testing show: the genetic-clustering algorithm considering the condition of planar adjacency relationship is completely feasible and availability.
Retrieve the oceanic chlorophyll-a concentration in case I water by support vector machine
JIANG Gang,XIAO Jian,ZHENG Yong-kang,SONG Chang-lin
2005, 25(10): 2398-2400.
Asbtract
(
)
PDF
(753KB) (
)
Related Articles
|
Metrics
That chlorophyll-a is an important factor when estimating ocean’s primitive productivity.The shortcomings of current methods used to retrieve chlorophyll-a concentration were analyzed.For the first time,least squares support vector machine based on statistic learning theory was used to do this work Experiments based on this method.SeaBAM data shows that using SVM method can receive the lowest error,avoid over fitting,and not need to design net-structure.SVM method has application value.It’s a hopeful tool in this kind of researching area.
Speaker recognition system based on ICA and VQ
QU Wei,LIU He-ping
2005, 25(10): 2401-2403.
Asbtract
(
)
PDF
(660KB) (
)
Related Articles
|
Metrics
The paper combined the speaker feature extracted by ICA with VQ technique to the ICA-VQ speaker recognition system with high performance.A speaker speech ICA synthesis model was presented to get the speaker speech feature bases with ICA algorithm,and the coefficients of the bases were used in designing codebooks.A novel distortion measurement including energy and a new centroid condition were given.In the simulation experiment of speaker verification,the EER contrast results of VQ with different sizes prove that VQ codebooks are efficient and the DET cures of various methods show that VQ is a more suitable method to speaker recognition with the coefficients of ICA feature bases.
Chinese named entity recognition system using statistics-based and rules-based method
XIANG Xiao-wen,SHI Xiao-dong,ZENG Hua-lin
2005, 25(10): 2404-2406.
Asbtract
(
)
PDF
(585KB) (
)
Related Articles
|
Metrics
his paper presented a Chinese named entity recognition system that combined the statistics-based and rules-based method.The whole process was divided into two steps.First to use the hidden Markov model for part-of-speech tagging,and then made use of match rules to amend and convert the result of the HMM step.The system also made an attempt at context-sensitive Chinese named entity recognition.In a named entity test organized by the 863 program,the precision,recall and F-score of the system reach 81.93%,78.20% and 80.02% respectively.
Cognitive cooperation in Multi-agent systems
SUN Juan,DOU Wan-chun
2005, 25(10): 2407-2409.
Asbtract
(
)
PDF
(560KB) (
)
Related Articles
|
Metrics
The accomplishment of a complex problem usually involves cooperation between participators with different knowledge background concerned.Traditional telecommunication based on RPC or RMI could no longer very well satisfy the demand for effective mutual operation and real-time communication in cognitive inspiration in heterogeneous environment.While Multi-agent technology provides support for a much more powerful,autonomous,and open computing model,which is more suitable for complex applications such as cooperative working in distributed environment.This paper identifies inter-dependency between different sub problems(through problem division) as the major factor that influences cooperative relations in Multi-agent systems,based on which we propose an efficient means to measure cooperation coefficient(degree) between different agents.Then cognitive cooperation between agents which aims at collecting the wisdom of the cognitive community for a systematic solution to the overall problem was analyzed using Rough Set Theory,DTMDP and Information Cogntion Theory.
Optimal strategy for simulated annealing mechanics in transiently chaotic neural networks
LI Xin-Yu,L Bing-chao
2005, 25(10): 2410-2412.
Asbtract
(
)
PDF
(553KB) (
)
Related Articles
|
Metrics
This paper analyzed that the dynamic characteristics of transiently chaotic networks(TCNN) quite sensitively depend on value of the self-feedback connection weights,and researched the annealing function that intensively influences the veracity and search speed of TCNN module.It is proposed an optimal strategy for value of the self-feedback connection weights that can accelerate the search speed and guarantee the assurance of the veracity of the optimal arithmetic.To demonstrate the validity of this optimal strategy,two examples of function optimization are given.
Handwritten digit recognition based on Adaboost
ZHAO Wan-peng,GU Le-ye
2005, 25(10): 2413-2414.
Asbtract
(
)
PDF
(584KB) (
)
Related Articles
|
Metrics
A handwritten digit recognition system based on Adaboost algorithm was introduced in this paper.Adaboost could construct a highly accurate classifier by combining many weak classifiers that just had slightly better accurate than random prediction.Experiment proved that the handwritten system based on Adaboost have low error rate and good ability of generalization.And it was integrated in a ocr software.
Real time path planning of mobile robot in dynamic world based on improved artificial potential field
KUANG Fei,WANG Yao-nan,ZHANG Hui
2005, 25(10): 2415-2417.
Asbtract
(
)
PDF
(576KB) (
)
Related Articles
|
Metrics
A path-planning method in dynamic surroundings which was based on improved artificial potential field was proposed in this paper.Because the exact movement information was hard to acquire,it is difficult to finish path planning of mobile robots in dynamic world.Searching the moving goal by gradient approximation method,the unreachable problem be solved.The results of simulation have verified that the method can solve the problem effectively,even though there are stochastic moving obstacles in the surroundings.
Study on preclassification for handwritten Chinese character based on neural net and fuzzy matching alg
LU Da,PU Wei,CHEN Qi-wei,XIE Ming-pei
2005, 25(10): 2418-2421.
Asbtract
(
)
PDF
(658KB) (
)
Related Articles
|
Metrics
To settle the recognition task of handwritten Chinese characters,the authors put forward a method for handwritten Chinese character preclassification before character recognition.In this method,Neocognitron was used in extracting stroke features,then uses the Supervised Extended ART(SEART) to create some preclassification groups,and uses matching algorithm of fuzzy prototypes of similarity measurement for character preclassification.The experiment shows this method is effective when used for handwritten Chinese character classification and characters of the testing set can be distributed into correct preclassification classes at a rate of 98.22%.
Realization of data analysis system for Internet negotiation based on SAS/IntrNet
FENG Yu-qiang,MA Xing-hui
2005, 25(10): 2422-2423.
Asbtract
(
)
PDF
(466KB) (
)
Related Articles
|
Metrics
The paper makes up SAS’s shortage in web application by combining SAS and Web application server together.At first,the paper introduced The basic principal of realizing SAS Web application using SAS/IntrNet was introduced,and then was expressed the flow of the program besides clarified the configuring method of configuration files.At last it solved three key problems of programming.During the process of analysis,the paper gave an example of this application—-the realization of Data Analysis System for Internet Negotiation.
Workflow authorization model based on RBAC for CSCD system
XU Hong-xue,LIU Yong-xian
2005, 25(10): 2424-2427.
Asbtract
(
)
PDF
(682KB) (
)
Related Articles
|
Metrics
This paper proposed a workflow authorization model based on RBAC(Role-Based Access Control) for collaborative design system.Different from traditional access control authorization models,this model provided the notion of temporal-spatial permission which represents the fact that can only perform certain operation on a task for a certain time interval and a certain spatial range of Internet/Intranet,namely the workflow authorization based on RBAC for collaborative design system not only relates with time,but also relates with Internet/Intranet address.It can not only ensure that only authorized users could execute a task,but also ensure that the authorization flow is synchronized with workflow and the dynamic change of spatial range of Internet/Intranet address.
BMP validation code based Web authorization system and its applications
LI Hui,NIU Yi
2005, 25(10): 2428-2430.
Asbtract
(
)
PDF
(555KB) (
)
Related Articles
|
Metrics
Web authorization system has been widely used on internet,but there’s still a serious problem in the internet services system if the authorization system only verify user name and password.This paper introduces A validation code based method which can enhance the security of web authorization system was introduced.Validation code was based on bitmap and created at random,and the image identification was the key to enhance the security.Web authorization system was applied to practice successfully in several projects,and it’s also applicable in other authorization systems for peer-to-peer communication.
Software performance data sampling and analysis based on hardware performance counter
CHENG Ke-fei,ZHANG Cong,WANG Lin-lin,ZHANG Qin
2005, 25(10): 2431-2433.
Asbtract
(
)
PDF
(547KB) (
)
Related Articles
|
Metrics
High performance analysis is a major topic in science computation and large-scale software system.Using a better data sampling method will gain better performance analysis.Traditional performance data are sampled by operation system based on rough granularity source code level,such as process time,memory usage percentage,etc.These data cannot show up hypostasis of software and provide a better effective proposition for optimization.This paper introduced a much more precise sampling method using CPU hardware performance counters(CHPC) to provide CPU data like instruction cycles,cache misses,branch prediction,and so on,and given detail scene of software status.With CHPC data,more accuracy software performance analysis and compiler optimization can be reached.
E-Government document retrieval based on semantic Web
YANG Fang,YANG Zhen-shan
2005, 25(10): 2434-2435.
Asbtract
(
)
PDF
(556KB) (
)
Related Articles
|
Metrics
According to the E-Government documents characters,the weight of the terms in documents and queries were calculated based on E-Government thesaurus.Similarity between query and documents was obtained through computing the similarity between weigh terms of documents and query,and most matching documents were provided.At the same time E-Government document metadata is organized in semantic web.E-Government document can also be retrieved as searching for metadata in semantic web.The documents retrieved is approached in semantic web with metadata to benefit logic reasoning.
Realization of EPA wireless communication card based on Linux
WANG Jun,WANG Hong,XU Ai-dong,ZHOU Tong,TAN Cai-hong
2005, 25(10): 2436-2438.
Asbtract
(
)
PDF
(532KB) (
)
Related Articles
|
Metrics
The EPA profile that is the first industry Ethernet profile of China is constituted.Its characteristic is oriented engineer on Control Theory,simpleness and practicality.This paper expatiated the realization technique of EPA wireless communication card based on Linux,and successfully solved the problem of communication with IO card.It provided the feasibility of realization of EPA Control System based on WLAN.Simple testing shows that system works orderly and achieves anticipative aim.
Recovery of Case statement from binary code
SU Ming,ZHAO Rong-cai,Qi Ning
2005, 25(10): 2439-2440.
Asbtract
(
)
PDF
(562KB) (
)
Related Articles
|
Metrics
This paper presented a technique for recovering jump tables and their target address used in IA-64 bianry translation system,and focused on explaining the key part of this technique-slicing and expression substitution.
New mechanism of routing maintenance in Ad Hoc
TAO Kai-yong,TAO Yang
2005, 25(10): 2441-2443.
Asbtract
(
)
PDF
(589KB) (
)
Related Articles
|
Metrics
Many on-demand routing protocols in MANET establish a route only when required.This paper proposed a new routing maintenance mechanism to avoid route breaks.In this mechanism,every node on an active route detected a danger of link break to upstream node and re-establishs a new route before a route break.
Research on a case-based reasoning method using cost-sensitive learner and its applications
LUO Fei-fei,LIU Gui-quan,AN Jing-qi,ZHANG Ting-hui
2005, 25(10): 2444-2446.
Asbtract
(
)
PDF
(612KB) (
)
Related Articles
|
Metrics
This paper proposed a case-based reasoning method using cost-sensitive learning that can classify and forecast large-scale and high dimension data.While classifying,this method adjust attribute weight constantly,in order to reduce the misclassification cost.The method has made a better result on some intrusion detection research.
Knowledge discovery of sets information system and grey theory and theirs application in DRP
ZHONG Xiang,ZHANG Hong-wei,WENG Huai-rong,LUO Ying
2005, 25(10): 2447-2449.
Asbtract
(
)
PDF
(412KB) (
)
Related Articles
|
Metrics
How to use the degree of grey incidence of grey theory to improve the calculation of the inclusion degree in sets information system was discussed.This algorithm was implemented in the DRP(Distribution Resource Planning) of a large dairy farming corporation to forecast the reliability of customers’ credit.It is designed with the use of asp & xml and MS SQL Server 2000 database and provides a scientific method on evaluating credit ranks of the corporation’s customers.
Deploy P2P in wireless network with agent technology
CAI Rui,HE Yan-xiang,PENG Min,WEI Fu-ru
2005, 25(10): 2450-2552.
Asbtract
(
)
PDF
(780KB) (
)
Related Articles
|
Metrics
This paper expounded the importance,the availability,and the centeral difficults to expend the traditional P2P services to the wireless network surroudings.Based on analizing an existed structure-MobiShare,a new system structure using Agent technology was proposaled to realize the P2P services expending.The system applied CAS(Cell Administration Server) to manage the services provided by the mobile end devices in its regon,applied muti-Agent to detect the surrounding message to refresh the services’ description in time,applied mobile Agent moving arroud the system to realize the service discovery and collection.The conmmunication between heterogeneous agents was described by FIPA-ACL.At last some emulation experiment conclusions was given out to manifest the superiority of the system.
Precompiler handling errors for C language
SHI Hai-xin,SHE Kun
2005, 25(10): 2453-2555.
Asbtract
(
)
PDF
(490KB) (
)
Related Articles
|
Metrics
According to the principle of compiling,a precompiler handling errors for C language was designed and realized.Through scanning the source code,it can could find the specific format comments,and get error names,error messages and error numbers from them.Finally it generates generated the corresponding source codes handling errors.The precompiler improved improves the mechanism of handling errors in C language,and increased increases software development efficiency.
Motion planning for human arm based on depth buffer
ZHU Qi-jun,ZHAO Zheng
2005, 25(10): 2456-2458.
Asbtract
(
)
PDF
(675KB) (
)
Related Articles
|
Metrics
This dissertation proposed a new motion planning algorithm for human arm based on depth buffer(z-buffer).This method expanded the A* algorithm to three-dimensional space and detected collision taking advantage of a special computer graphics hardware-depth buffer.Thus it was addressed the problem of confined space motion planning for human arm.The simulation results show that this algorithm can realize the motion planning for a human arm with 3 links and 7 DOFs rapidly and effectively.
Dynamic modeling and 3-D simulation of water surface
CHEN Lu,SANG Nan,XIONG Guang-ze
2005, 25(10): 2459-2461.
Asbtract
(
)
PDF
(890KB) (
)
Related Articles
|
Metrics
CG water has been a major research topic for a long time now.Realistically simulating liquids has proven very difficult,due to the inherent complexity of the physical processes involved.Most photorealistic solutions use a form of raytracing and complex differential equations to approximate the optical behaviour and motion dynamics of a water body.Unfortunately,such physically accurate approaches often take many hours of render time per frame.With the advance of programmable 3D hardware,the article discussed methods such as wave physical generation by Perlin function and wave optical model by cubic environment mapping.A lot of the visual properties of water could be approximated by efficient techniques that,even though not physically correct,look convincing to the human eye,and it was pretty appropriate to interactive contexts such as video games,simulation and so on.
Parallel convex hull algorithm of planar point set based on PC cluster
HAO Xiao-zhu1HU Xiang-yun,DAI Guang-ming,ZHANG Rong,CHNEG Hong-jie
2005, 25(10): 2462-2464.
Asbtract
(
)
PDF
(585KB) (
)
Related Articles
|
Metrics
The convex hull problem is one of the fundamental problem in computational geometry,and wildly used in many fields.In this paper,A new parallel algorithm was proposed by combining improved fast convex hull algorithm of planar point set based on sorted simple polygon in this paper.The worst-case time complexity of the algorithm was O(n).The algorithm used in COW parallel computing system and MPI parallel environment.Compared with the original serial algorithm,this method was viable,accurate and highly efficient.
2025 Vol.45 No.4
Current Issue
Archive
Superintended by:
Sichuan Associations for Science and Technology
Sponsored by:
Sichuan Computer Federation
Chengdu Branch, Chinese Academy of Sciences
Honorary Editor-in-Chief:
ZHANG Jingzhong
Editor-in-Chief:
XU Zongben
Associate Editor:
SHEN Hengtao XIA Zhaohui
Domestic Post Distribution Code:
62-110
Foreign Distribution Code:
M4616
Address:
No. 9, 4th Section of South Renmin Road, Chengdu 610041, China
Tel:
028-85224283-803
028-85222239-803
Website:
www.joca.cn
E-mail:
bjb@joca.cn
WeChat
Join CCF